default search action
Proceedings on Privacy Enhancing Technologies, Volume 2017
Volume 2017, Number 1, January 2017
- Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. 1-3 - Zachary A. Kissel, Jie Wang:
Generic Adaptively Secure Searchable Phrase Encryption. 4-20 - Jesse Victors, Ming Li, Xinwen Fu:
The Onion Name System. 21-41 - Zachary Weinberg, Mahmood Sharif, Janos Szurdi, Nicolas Christin:
Topics of Controversy: An Empirical Analysis of Web Censorship Lists. 42-61 - M. Sadegh Riazi, Ebrahim M. Songhori, Ahmad-Reza Sadeghi, Thomas Schneider, Farinaz Koushanfar:
Toward Practical Secure Stable Matching. 62-78 - Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kâafar, Anirban Mahanti, Balachander Krishnamurthy:
Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning. 79-99 - Chen Chen, Adrian Perrig:
PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer. 100-117 - Mojtaba Eskandari, Bruno Kessler, Maqsood Ahmad, Anderson Santana de Oliveira, Bruno Crispo:
Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps. 118-131 - Chen Liu, Hoda Aghaei Khouzani, Chengmo Yang:
ErasuCrypto: A Light-weight Secure Data Deletion Scheme for Solid State Drives. 132-148 - Yongjun Zhao, Sherman S. M. Chow:
Are you The One to Share? Secret Transfer with Access Structure. 149-169 - Stephan Heuser, Bradley Reaves, Praveen Kumar Pendyala, Henry Carter, Alexandra Dmitrienko, William Enck, Negar Kiyavash, Ahmad-Reza Sadeghi, Patrick Traynor:
Phonion: Practical Protection of Metadata in Telephony Networks. 170-187
Volume 2017, Number 2, April 2017
- Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. 1-3 - Florentin Rochet, Olivier Pereira:
Waterfilling: Balancing the Tor network with maximum diversity. 4-22 - Yousra Javed, Mohamed Shehab:
Look before you Authorize: Using Eye-Tracking to Enforce User Attention towards Application Permissions. 23-37 - Anh Pham, Italo Dacosta, Bastien Jacot-Guillarmod, Kévin Huguenin, Taha Hajar, Florian Tramèr, Virgil D. Gligor, Jean-Pierre Hubaux:
PrivateRide: A Privacy-Enhanced Ride-Hailing Service. 38-56 - Zhe Zhou, Wenrui Diao, Xiangyu Liu, Zhou Li, Kehuan Zhang, Rui Liu:
Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU. 57-73 - Aaron Johnson, Rob Jansen, Nicholas Hopper, Aaron Segal, Paul Syverson:
PeerFlow: Secure Load Balancing in Tor. 74-94 - Vasilios Mavroudis, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, Giovanni Vigna:
On the Privacy and Security of the Ultrasound Ecosystem. 95-112 - Yao Li, Alfred Kobsa, Bart P. Knijnenburg, M.-H. Carolyn Nguyen:
Cross-Cultural Privacy Prediction. 113-132 - Justin Brookman, Phoebe Rouge, Aaron Alva, Christina Yeung:
Cross-Device Tracking: Measurement and Disclosures. 133-148 - Joshua Gancher, Adam Groce, Alex Ledger:
Externally Verifiable Oblivious RAM. 149-171 - William R. Marczak, Vern Paxson:
Social Engineering Attacks on Government Opponents: Target Perspectives. 172-185 - Giovanni Cherubin, Jamie Hayes, Marc Juarez:
Website Fingerprinting Defenses at the Application Layer. 186-203
Volume 2017, Number 3, July 2017
- Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. 1 - Dominik Schürmann, Fabian Kabus, Gregor Hildermeier, Lars C. Wolf:
Wiretapping End-to-End Encrypted VoIP Calls: Real-World Attacks on ZRTP. 4 - Hung Dang, Tien Tuan Anh Dinh, Ee-Chien Chang, Beng Chin Ooi:
Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute. 21 - Peter Ney, Ian Smith, Gabriel Cadamuro, Tadayoshi Kohno:
SeaGlass: Enabling City-Wide IMSI-Catcher Detection. 39 - Ruben Recabarren, Bogdan Carbunar:
Hardening Stratum, the Bitcoin Pool Mining Protocol. 57 - Kevin Corre, Olivier Barais, Gerson Sunyé, Vincent Frey, Jean-Michel Crom:
Why can't users choose their identity providers on the web? 75 - Linda Naeun Lee, David Fifield, Nathan Malkin, Ganesh Iyer, Serge Egelman, David A. Wagner:
A Usability Evaluation of Tor Launcher. 90 - Pedro Moreno-Sanchez, Tim Ruffing, Aniket Kate:
PathShuffle: Credit Mixing and Anonymous Payments for Ripple. 110 - Muhammad Haris Mughees, Zhiyun Qian, Zubair Shafiq:
Detecting Anti Ad-blockers in the Wild. 130 - Gilad Asharov, Daniel Demmler, Michael Schapira, Thomas Schneider, Gil Segev, Scott Shenker, Michael Zohner:
Privacy-Preserving Interdomain Routing at Internet Scale. 147 - Cédric Van Rompay, Refik Molva, Melek Önen:
A Leakage-Abuse Attack Against Multi-User Searchable Encryption. 168 - Anrin Chakraborti, Chen Chen, Radu Sion:
DataLair: Efficient Block Storage with Plausible Deniability against Multi-Snapshot Adversaries. 179
Volume 2017, Number 4, October 2017
- Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. 1-4 - Diogo Barradas, Nuno Santos, Luís E. T. Rodrigues:
DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams. 5-22 - Peeter Laud, Alisa Pankova, Roman Jagomägis:
Preprocessing Based Verification of Multiparty Protocols with Honest Majority. 23-76 - Wisam Eltarjaman, Rinku Dewri, Ramakrishna Thurimella:
Location Privacy for Rank-based Geo-Query Systems. 77-96 - Kovila P. L. Coopamootoo, Thomas Groß:
Why Privacy Is All But Forgotten. 97-118 - Qatrunnada Ismail, Tousif Ahmed, Kelly Caine, Apu Kapadia, Michael K. Reiter:
To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps' Privacy Permission Settings. 119-137 - Takao Murakami:
Expectation-Maximization Tensor Factorization for Practical Location Privacy Attacks. 138-155 - Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro:
What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy. 156-176 - Ágnes Kiss, Jian Liu, Thomas Schneider, N. Asokan, Benny Pinkas:
Private Set Intersection for Unequal Set Sizes with Mobile Applications. 177-197 - Niklas Büscher, Spyros Boukoros, Stefan Bauregger, Stefan Katzenbeisser:
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering. 198-214 - Giovanni Cherubin:
Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses. 215-231 - David Froelicher, Patricia Egger, João Sá Sousa, Jean Louis Raisaro, Zhicong Huang, Christian Mouchet, Bryan Ford, Jean-Pierre Hubaux:
UnLynx: A Decentralized System for Privacy-Conscious Data Sharing. 232-250 - Se Eun Oh, Shuai Li, Nicholas Hopper:
Fingerprinting Keywords in Search Queries over Tor. 251-270 - Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang:
Personalized Pseudonyms for Servers in the Cloud. 271-289 - Fatemeh Rezaei, Amir Houmansadr:
TagIt: Tagging Network Flows using Blind Fingerprints. 290-307 - Konstantinos Chatzikokolakis, Ehab ElSalamouny, Catuscia Palamidessi:
Efficient Utility Improvement for Location Privacy. 308-328 - Saba Eskandarian, Eran Messeri, Joseph Bonneau, Dan Boneh:
Certificate Transparency with Privacy. 329-344 - Adrià Gascón, Phillipp Schoppmann, Borja Balle, Mariana Raykova, Jack Doerner, Samee Zahur, David Evans:
Privacy-Preserving Distributed Linear Regression on High-Dimensional Data. 345-364 - Jeremy Martin, Travis Mayberry, Collin Donahue, Lucas Foppe, Lamont Brown, Chadwick Riggins, Erik C. Rye, Dane Brown:
A Study of MAC Address Randomization in Mobile Devices and When it Fails. 365-383 - Sazzadur Rahaman, Long Cheng, Danfeng Daphne Yao, He Li, Jung-Min "Jerry" Park:
Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation. 384-403 - Carmela Troncoso, Marios Isaakidis, George Danezis, Harry Halpin:
Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments. 404-426
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.