default search action
WPES@CCS 2018: Toronto, ON, Canada
- David Lie, Mohammad Mannan, Aaron Johnson:
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, WPES@CCS 2018, Toronto, ON, Canada, October 15-19, 2018. ACM 2018, ISBN 978-1-4503-5989-4
Session1: Web Privacy
- Martin Degeling, Jan Nierhoff:
Tracking and Tricking a Profiler: Automated Measuring and Influencing of Bluekai's Interest Profiling. 1-13 - Gábor György Gulyás, Dolière Francis Somé, Nataliia Bielova, Claude Castelluccia:
To Extend or not to Extend: On the Uniqueness of Browser Extensions and Web Logins. 14-27 - Jukka Ruohonen, Ville Leppänen:
Invisible Pixels Are Dead, Long Live Invisible Pixels! 28-32 - Michael Carl Tschantz, Serge Egelman, Jaeyoung Choi, Nicholas Weaver, Gerald Friedland:
The Accuracy of the Demographic Inferences Shown on Google's Ad Settings. 33-41
Session2: Secure Computation
- Deevashwer Rathee, Pradeep Kumar Mishra, Masaya Yasuda:
Faster PCA and Linear Regression through Hypercubes in HElib. 42-53 - Yongjun Zhao, Sherman S. M. Chow:
Can You Find The One for Me? 54-65 - Nikolaos P. Karvelas, Amos Treiber, Stefan Katzenbeisser:
Examining Leakage of Access Counts in ORAM Constructions. 66-70 - Thomas Schneider, Oleksandr Tkachenko:
Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases. 71-75
Session 3: Secure Cmmunication
- Hussein Darir, Hussein Sibai, Nikita Borisov, Geir E. Dullerud, Sayan Mitra:
TightRope: Towards Optimal Load-balancing of Paths in Anonymous Networks. 76-85 - Bogdan Kulynych, Wouter Lueks, Marios Isaakidis, George Danezis, Carmela Troncoso:
ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging. 86-103 - Sebastian Angel, David Lazar, Ioanna Tzialla:
What's a Little Leakage Between Friends? 104-108 - David Lu, Sanjit Bhat, Albert Kwon, Srinivas Devadas:
DynaFlow: An Efficient Website Fingerprinting Defense Based on Dynamically-Adjusting Flows. 109-113
Session 4: Data and Identity
- Kai Chih Chang, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Enhancing and Evaluating Identity Privacy and Authentication Strength by Utilizing the Identity Ecosystem. 114-120 - Shubhra Kanti Karmaker Santu, Vincent Bindschaedler, ChengXiang Zhai, Carl A. Gunter:
NRF: A Naive Re-identification Framework. 121-132 - Simson L. Garfinkel, John M. Abowd, Sarah Powazek:
Issues Encountered Deploying Differential Privacy. 133-137 - Christopher McKnight, Ian Goldberg:
Style Counsel: Seeing the (Random) Forest for the Trees in Adversarial Code Stylometry. 138-142
Session 5: Privacy Goals and Stategies
- Majed Alshammari, Andrew Simpson:
Privacy Architectural Strategies: An Approach for Achieving Various Levels of Privacy Protection. 143-154 - Eleanor Birrell, Anders T. Gjerdrum, Robbert van Renesse, Håvard D. Johansen, Dag Johansen, Fred B. Schneider:
SGX Enforcement of Use-Based Privacy. 155-167 - Joshua Tan, Mahmood Sharif, Sruti Bhagavatula, Matthias Beckerle, Michelle L. Mazurek, Lujo Bauer:
Comparing Hypothetical and Realistic Privacy Valuations. 168-182
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.