default search action
WPES 2013: Berlin, Germany
- Ahmad-Reza Sadeghi, Sara Foresti:
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, WPES 2013, Berlin, Germany, November 4, 2013. ACM 2013, ISBN 978-1-4503-2485-4
Session 1A: privacy in social network and access control
- Lujo Bauer, Lorrie Faith Cranor, Saranga Komanduri, Michelle L. Mazurek, Michael K. Reiter, Manya Sleeper, Blase Ur:
The post anachronism: the temporal dimension of facebook privacy. 1-12 - Jan Camenisch, Günter Karjoth, Gregory Neven, Franz-Stefan Preiss:
Anonymously sharing Flickr pictures with facebook friends. 13-24 - Animesh Nandi, Armen Aghasaryan, Ishan Chhabra:
On the use of decentralization to enable privacy in web-scale recommendation services. 25-36 - Markulf Kohlweiss, Alfredo Rial:
Optimally private access control. 37-48
Session 1B: anonymity
- George Danezis, Carmela Troncoso:
You cannot hide for long: de-anonymization of real-world dynamic behaviour. 49-60 - Valentin Tudor, Magnus Almgren, Marina Papatriantafilou:
Analysis of the impact of data granularity on privacy for the smart grid. 61-70 - Ryan Henry, Ian Goldberg:
Thinking inside the BLAC box: smarter protocols for faster anonymous blacklisting. 71-82 - Tobias Pulls, Roel Peeters, Karel Wouters:
Distributed privacy-preserving transparency logging. 83-94
Session 2A: privacy of genomic data and of accesses
- Erman Ayday, Jean Louis Raisaro, Jean-Pierre Hubaux, Jacques Rougemont:
Protecting and evaluating genomic privacy in medical tests and personalized medicine. 95-106 - Emiliano De Cristofaro, Sky Faber, Gene Tsudik:
Secure genomic testing with size- and position-hiding private substring matching. 107-118 - Yizhou Huang, Ian Goldberg:
Outsourced private information retrieval. 119-130
Session 2B: privacy preserving computation
- Véronique Cortier, David Galindo, Stéphane Glondu, Malika Izabachène:
Distributed ElGamal à la Pedersen: Application to Helios. 131-142 - Florian Kerschbaum, Hoon Wei Lim, Ivan Gudymenko:
Privacy-preserving billing for e-ticketing systems in public transportation. 143-154 - Ayman Jarrous, Benny Pinkas:
Canon-MPC, a system for casual non-interactive secure multi-party computation using native client. 155-166
Session 3A: location privacy
- Michael Herrmann, Carmela Troncoso, Claudia Díaz, Bart Preneel:
Optimal sporadic location privacy preserving systems in presence of bandwidth constraints. 167-178 - Igor Bilogrevic, Kévin Huguenin, Murtuza Jadliwala, Florent Lopez, Jean-Pierre Hubaux, Philip Ginzboorg, Valtteri Niemi:
Inferring social ties in academic networks using short-range wireless communications. 179-188 - Md. Moniruzzaman, Ken Barker:
Redeem with privacy (RWP): privacy protecting framework for geo-social commerce. 189-200
Session 3B: anonymous communication
- Tao Wang, Ian Goldberg:
Improved website fingerprinting on Tor. 201-212 - Philipp Winter, Tobias Pulls, Jürgen Fuß:
ScrambleSuit: a polymorphic network protocol to circumvent censorship. 213-224 - Nethanel Gelernter, Amir Herzberg:
On the limits of provable anonymity. 225-236
Session 4A: privacy protocols, password security, and privacy in social media
- Michael Backes, Martin Gagné, Malte Skoruppa:
Using mobile device communication to strengthen e-Voting protocols. 237-242 - Henry Corrigan-Gibbs, Bryan Ford:
Conscript your friends into larger anonymity sets with JavaScript. 243-248 - Hong Liu, Eugene Y. Vasserman, Nicholas Hopper:
Improved group off-the-record messaging. 249-254 - Rishab Nithyanand, Rob Johnson:
The password allocation problem: strategies for reusing passwords effectively. 255-260 - Miltiadis Kandias, Vasilis Stavrou, Nick Bozovic, Dimitris Gritzalis:
Proactive insider threat detection through social media: the YouTube case. 261-266
Session 4B: identify and assess privacy risks
- Rinku Dewri, Prasad Annadata, Wisam Eltarjaman, Ramakrishna Thurimella:
Inferring trip destinations from driving habits data. 267-272 - Christopher J. Riederer, Augustin Chaintreau, Jacob Cahan, Vijay Erramilli:
Challenges of keyword-based location disclosure. 273-278 - Delfina Malandrino, Andrea Petta, Vittorio Scarano, Luigi Serra, Raffaele Spinelli, Balachander Krishnamurthy:
Privacy awareness about information leakage: who knows what about me? 279-284 - Xujing Huang, Pasquale Malacaria:
SideAuto: quantitative information flow for side-channel leakage in web applications. 285-290 - Frances Zhang, Fuming Shih, Daniel J. Weitzner:
No surprises: measuring intrusiveness of smartphone applications by detecting objective context deviations. 291-296
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.