


default search action
Proceedings on Privacy Enhancing Technologies, Volume 2025
Volume 2025, Number 1, 2025
- Rob Jansen, Zubair Shafiq:
Editors' Introduction. 1-4 - Hao Cui, Rahmadi Trimananda, Athina Markopoulou:
Understanding Privacy Norms through Web Forms. 5-22 - Masanobu Kii
, Atsunori Ichikawa, Takayuki Miura:
Lightweight Two-Party Secure Sampling Protocol for Differential Privacy. 23-36 - Ghous Amjad, Kevin Yeo, Moti Yung:
RSA Blind Signatures with Public Metadata. 37-57 - Abhinaya S. B., Abhishri Agrawal, Yaxing Yao, Yixin Zou, Anupam Das:
"What are they gonna do with my data?": Privacy Expectations, Concerns, and Behaviors in Virtual Reality. 58-77 - Olena Hrynenko, Andrea Cavallaro:
Identifying Privacy Personas. 78-99 - Wolf Rieder
, Philip Raschke, Thomas Cory:
Beyond the Request: Harnessing HTTP Response Headers for Cross-Browser Web Tracker Detection in an Imbalanced Setting. 100-117 - René Raab
, Pascal Berrang, Paul Gerhart, Dominique Schröder:
SoK: Descriptive Statistics Under Local Differential Privacy. 118-149 - Chris Warin, Viktoriya Pak, Delphine Reinhardt:
Privacy Perceptions Across the XR Spectrum: An Extended Reality Cross-Platform Comparative Analysis of A Virtual House Tour. 150-168 - Sankha Das, Sayak Ray Chowdhury, Nishanth Chandran, Divya Gupta, Satya Lokam, Rahul Sharma:
Communication Efficient Secure and Private Multi-Party Deep Learning. 169-183 - Wei Sun
, Hadi Givehchian, Dinesh Bharadia:
Revealing Hidden IoT Devices through Passive Detection, Fingerprinting, and Localization. 184-197 - Dominika Woszczyk, Soteris Demetriou:
DiDOTS: Knowledge Distillation from Large-Language-Models for Dementia Obfuscation in Transcribed Speech. 198-215 - Jayshree Sarathy, Salil P. Vadhan:
Analyzing the Differentially Private Theil-Sen Estimator for Simple Linear Regression. 216-235 - Yatong Jiang, Tao Shang, Jianwei Liu:
Privacy-preserving Multiple Sequence Alignment Scheme for Long Gene Sequence. 236-249 - Christopher Harth-Kitzerow, Ajith Suresh
, Yongqin Wang, Hossein Yalame, Georg Carle, Murali Annavaram:
High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings. 250-272 - Mamtaj Akter, Jess Kropczynski, Heather Lipford, Pamela J. Wisniewski:
Examining Caregiving Roles to Differentiate the Effects of Using a Mobile App for Community Oversight for Privacy and Security. 273-289 - Dimitris Mouris, Christopher Patton, Hannah Davis, Pratik Sarkar, Nektarios Georgios Tsoutsos:
Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics. 290-319 - Daniel Collins, Simone Colombo, Loïs Huguenin-Dumittan:
Real-World Deniability in Messaging. 320-340 - Fredrik Meisingseth, Christian Rechberger, Fabian Schmid:
Practical Two-party Computational Differential Privacy with Active Security. 341-360 - Shiyu Li, Yuan Zhang, Yaqing Song, Fan Wu, Feng Lyu, Kan Yang, Qiang Tang:
EpiOracle: Privacy-Preserving Cross-Facility Early Warning for Unknown Epidemics. 361-378 - Lu Xian, Song Mi Lee-Kan, Jane Im, Florian Schaub:
User-Centric Textual Descriptions of Privacy-Enhancing Technologies for Ad Tracking and Analytics. 379-398 - Ismat Jarin, Yu Duan, Rahmadi Trimananda, Hao Cui, Salma Elmalaki, Athina Markopoulou:
BehaVR: User Identification Based on VR Sensor Data. 399-419 - Fredrik Meisingseth, Christian Rechberger:
SoK: Computational and Distributed Differential Privacy for MPC. 420-439 - Cong Zuo, Shangqi Lai, Shi-Feng Sun, Xingliang Yuan, Joseph K. Liu, Jun Shao, Huaxiong Wang, Liehuang Zhu, Shujie Cui:
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy. 440-455 - Byron Lowens, Sean Scarnecchia, Jane Im, Tanisha Afnan, Annie Chen, Yixin Zou, Florian Schaub:
Misalignments and Demographic Differences in Expected and Actual Privacy Settings on Facebook. 456-471 - Yasha Iravantchi, Pardis Emami Naeini, Alanson P. Sample:
SoK: (Un)usable Privacy: the Lack of Overlap between Privacy-Aware Sensing and Usable Privacy Research. 472-490 - Amogh Pradeep, Johanna Gunawan, Álvaro Feal, Woodrow Hartzog, David R. Choffnes:
Gig Work at What Cost? Exploring Privacy Risks of Gig Work Platform Participation in the U.S. 491-510 - Jan Lauinger, Jens Ernstberger, Andreas Finkenzeller, Sebastian Steinhorst:
Janus: Fast Privacy-Preserving Data Provenance For TLS. 511-530 - Arushi Arora, Christina Garman:
Improving the Performance and Security of Tor's Onion Services. 531-552 - Florine W. Dekker
, Zekeriya Erkin
, Mauro Conti
:
Topology-Based Reconstruction Prevention for Decentralised Learning. 553-566 - Kyoohyung Han, Seongkwang Kim, Yongha Son:
Private Computation on Common Fuzzy Records. 567-583 - Mounssif Krouka, Antti Koskela, Tejas D. Kulkarni:
Communication Efficient Differentially Private Federated Learning Using Second Order Information. 584-612 - Joann Qiongna Chen, Xinlei He, Zheng Li, Yang Zhang, Zhou Li:
A Comprehensive Study of Privacy Risks in Curriculum Learning. 613-631 - Echo Meißner, Frank Kargl, Benjamin Erb, Felix Engelmann:
PrePaMS: Privacy-Preserving Participant Management System for Studies with Rewards and Prerequisites. 632-653 - Sarah Abdelwahab Gaballah, Lamya Abdullah, Ephraim Zimmer, Sascha Fahl, Max Mühlhäuser, Karola Marky:
"It's Not My Data Anymore": Exploring Non-Users' Privacy Perceptions of Medical Data Donation Apps. 654-670 - Diego Castejon-Molina, Dimitrios Vasilopoulos, Pedro Moreno-Sanchez:
MixBuy: Contingent Payment in the Presence of Coin Mixers. 671-706 - Liron David, Avinatan Hassidim, Yossi Matias, Moti Yung:
The Battery Insertion Attack: Is Periodic Pseudo-randomization Sufficient for Beacon Privacy? 707-719 - Alex Berke, Badih Ghazi, Enrico Bacis, Pritish Kamath, Ravi Kumar, Robin Lassonde, Pasin Manurangsi, Umar Syed:
How Unique is Whose Web Browser? The role of demographics in browser fingerprinting among US users. 720-758 - Charles Gouert, Vinu Joseph, Steven Dalton, Cédric Augonnet, Michael Garland, Nektarios Georgios Tsoutsos:
Hardware-Accelerated Encrypted Execution of General-Purpose Applications. 759-775 - Zhaohui Wang, Bo Luo, Fengjun Li:
PrivacyGuard: Exploring Hidden Cross-App Privacy Leakage Threats In IoT Apps. 776-791 - Francesca Falzon, Evangelia Anna Markatou:
Re-visiting Authorized Private Set Intersection: A New Privacy-Preserving Variant and Two Protocols. 792-807 - Simon Koch
, Manuel Karl, Robin Kirchner, Malte Wessels
, Anne Paschke, Martin Johns:
The Impact of Default Mobile SDK Usage on Privacy and Data Protection. 808-823 - Sayan Biswas
, Mathieu Even, Anne-Marie Kermarrec, Laurent Massoulié, Rafael Pires, Rishi Sharma
, Martijn de Vos:
Noiseless Privacy-Preserving Decentralized Learning. 824-844 - Adda-Akram Bendoukha, Didem Demirag, Nesrine Kaaniche, Aymen Boudguiga, Renaud Sirdey, Sébastien Gambs:
Towards Privacy-preserving and Fairness-aware Federated Learning Framework. 845-865
Volume 2025, Number 2, 2025
- Rob Jansen, Zubair Shafiq:
Editors' Introduction. 1-4 - Chenxi Qiu, Ruiyao Liu, Primal Pappachan, Anna Cinzia Squicciarini, Xinpeng Xie:
Time-Efficient Locally Relevant Geo-Location Privacy Protection. 5-22 - Malika Izabachène, Jean-Philippe Bossuat:
TETRIS: Composing FHE Techniques for Private Functional Exploration Over Large Datasets. 23-38 - Ayush K. Varshney, Konstantinos Vandikas, Vicenç Torra:
Unlearning Clients, Features and Samples in Vertical Federated Learning. 39-53 - Minh-Ha Le, Niklas Carlsson:
DiffPrivate: Facial Privacy Protection with Diffusion Models. 54-70 - Tina Khezresmaeilzadeh
, Elaine Zhu, Kiersten Grieco, Daniel J. Dubois, Konstantinos Psounis, David R. Choffnes:
Echoes of Privacy: Uncovering the Profiling Practices of Voice Assistants. 71-87 - Ghada Almashaqbeh, Zahra Ghodsi:
AnoFel: Supporting Anonymity for Privacy-Preserving Federated Learning. 88-106 - Eva-Maria Maier, Leonie Maria Tanczer, Lukas Daniel Klausner:
Surveillance Disguised as Protection: A Comparative Analysis of Sideloaded and In-Store Parental Control Apps. 107-124 - Hussein Sheaib, Anja Feldmann, Ha Dao:
Unmasking the Shadows: A Cross-Country Study of Online Tracking in Illegal Movie Streaming Services. 125-139 - Jiang Zhang, Rohan Sequeira, Konstantinos Psounis:
SPINML: Customized Synthetic Data Generation for Private Training of Specialized ML Models. 140-156 - Marian Dietz, Florian Kerschbaum:
Private Shared Random Minimum Spanning Forests. 157-172 - David Rodriguez, Joseph A. Calandrino, José M. del Álamo, Norman Sadeh:
Privacy Settings of Third-Party Libraries in Android Apps: A Study of Facebook SDKs. 173-187 - Smirity Kaushik, Tanusree Sharma, Yaman Yu, Amna F. Ali, Bart Piet Knijnenburg, Yang Wang, Yixin Zou:
Privacy Perceptions and Behaviors Towards Targeted Advertising on Social Media: A Cross-Country Study on the Effect of Culture and Religion. 188-210 - Michael Rosenberg, Maurice Shih, Zhenyu Zhao, Rui Wang, Ian Miers, Fan Zhang:
ZIPNet: Low-bandwidth anonymous broadcast from (dis)Trusted Execution Environments. 211-225 - Ahmad Hassanpour, Amir Zarei, Khawla Mallat, Anderson Santana de Oliveira, Bian Yang:
The Impact of Generalization Techniques on the Interplay Among Privacy, Utility, and Fairness. 226-242 - Ayana Moshruba, Ihsen Alouani
, Maryam Parsa:
Are Neuromorphic Architectures Inherently Privacy-preserving? An Exploratory Study. 243-257 - Hassan Jameel Asghar, Zhigang Lu, Zhongrui Zhao, Dali Kaafar:
Practical, Private Assurance of the Value of Collaboration via Fully Homomorphic Encryption. 258-279 - Jake Chanenson
, Madison Pickering, Noah Apthrope:
Automating Governing Knowledge Commons and Contextual Integrity (GKC-CI) Privacy Policy Annotations with Large Language Models. 280-308 - Christian Böttger, Nurullah Demir, Jan Hörnemann, Bhupendra Acharya, Norbert Pohlmann, Thorsten Holz, Matteo Große-Kampmann, Tobias Urban:
Understanding Regional Filter Lists: Efficacy and Impact. 309-325 - Majed Almansoori, Rahul Chatterjee:
Can Social Media Privacy and Safety Features Protect Targets of Interpersonal Attacks? A Systematic Analysis. 326-343 - Stefan Dziembowski, Shahriar Ebrahimi, Parisa Hassanizadeh:
VIMz: Private Proofs of Image Manipulation using Folding-based zkSNARKs. 344-362 - Mattea Sim, Basia Radka, Emi Yoshikawa, Franziska Roesner, Kurt Hugenberg, Tadayoshi Kohno:
To Reveal or Conceal: Privacy and Marginalization in Avatars. 363-381 - Maximilian Weisenseel, Christoph Döpmann, Florian Tschorsch:
The Last Hop Attack: The Last Hop Attack: Why Loop Cover Traffic over Fixed Cascades Threatens Anonymity. 382-397 - Yan Pang, Tianhao Wang, Xuhui Kang, Mengdi Huai, Yang Zhang:
White-box Membership Inference Attacks against Diffusion Models. 398-415 - Jens Ernstberger, Jan Lauinger, Yinnan Wu, Arthur Gervais, Sebastian Steinhorst:
ORIGO: Proving Provenance of Sensitive Data with Constant Communication. 416-433 - Isita Bagayatkar, Youngil Kim, Gene Tsudik:
DB-PAISA: Discovery-Based Privacy-Agile IoT Sensing+Actuation. 434-449 - Rabiah Alnashwan, Prosanta Gope, Benjamin Dowling, Yang Yang:
PGUP: Pretty Good User Privacy for 5G-enabled Secure Mobile Communication Protocols. 450-478 - Jiahui Gao, Yagaagowtham Palanikuma, Dimitris Mouris, Duong Tung Nguyen, Ni Trieu:
SecureED: Secure Multiparty Edit Distance for Genomic Sequences. 479-493 - Michael Wrana
, Diogo Barradas, N. Asokan:
SoK: The Spectre of Surveillance and Censorship in Future Internet Architectures. 494-511 - Paul Syverson, Rasmus Dahlberg, Tobias Pulls, Rob Jansen:
Onion-Location Measurements and Fingerprinting. 512-526 - Ke Zhong, Sebastian Angel:
Oryx: Private detection of cycles in federated graphs. 527-542 - Tariq Bontekoe
, Hassan Jameel Asghar, Fatih Turkmen
:
Efficient Verifiable Differential Privacy with Input Authenticity in the Local and Shuffle Model. 543-563 - Zhifan Lu, Siyang Sun, Yixin Sun:
RPKI-Based Location-Unaware Tor Guard Relay Selection Algorithms. 564-581 - Varun Thakore, Saravanan Vijayakumaran:
MProve-Nova: A Privacy-Preserving Proof of Reserves Protocol for Monero. 582-606 - Virat Shejwalkar, Arun Ganesh, Rajiv Mathews, Yarong Mu, Shuang Song, Om Thakkar, Abhradeep Thakurta, Xinyi Zheng:
Recycling Scraps: Improving Private Learning by Leveraging Checkpoints]{Recycling Scraps: Improving Private Learning by Leveraging Checkpoints. 607-628 - Maximilian Kroschewski, Anja Lehmann, Cavit Özbay:
OPPID: Single Sign-On with Oblivious Pairwise Pseudonyms. 629-649 - Andreas Athanasiou, Konstantinos Chatzikokolakis, Catuscia Palamidessi:
Enhancing Metric Privacy With a Shuffler. 650-679 - Yaxi Yang, Xiaojian Liang, Xiangfu Song, Ye Dong, Linting Huang, Hongyu Ren, Changyu Dong, Jianying Zhou:
Maliciously Secure Circuit Private Set Intersection via SPDZ-Compatible Oblivious PRF. 680-696 - Jose Reis, Mehmet Ugurbil, Sameer Wagh, Ryan Henry, Miguel de Vega:
Wave Hello to Privacy: Efficient Mixed-Mode MPC using Wavelet Transforms. 697-718 - Muslum Ozgur Ozmen, Mehmet Oguz Sakaoglu, Jackson Bizjak, Jianliang Wu, Antonio Bianchi, Dave (Jing) Tian, Z. Berkay Celik:
Why Am I Seeing Double? An Investigation of Device Management Flaws in Voice Assistant Platforms. 719-733

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.