default search action
Proceedings on Privacy Enhancing Technologies, Volume 2015
Volume 2015, Number 1, April 2015
- Apu Kapadia, Steven J. Murdoch:
Editors' Introduction. 1-3 - Aaron D. Jaggard, Aaron Johnson, Sarah Cortes, Paul Syverson, Joan Feigenbaum:
20, 000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables. 4-24 - Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar:
Know Thy Neighbor: Crypto Library Detection in Cloud. 25-40 - Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
Portrait of a Privacy Invasion. 41-60 - Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall:
Analyzing the Great Firewall of China Over Space and Time. 61-76 - Vasile Claudiu Perta, Marco Valerio Barbera, Gareth Tyson, Hamed Haddadi, Alessandro Mei:
A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients. 77-91 - Amit Datta, Michael Carl Tschantz, Anupam Datta:
Automated Experiments on Ad Privacy Settings. 92-112
Volume 2015, Number 2, June 2015
- Apu Kapadia, Steven J. Murdoch:
Editors' Introduction. 1-3 - Nikita Borisov, George Danezis, Ian Goldberg:
DP5: A Private Presence Service. 4-24 - Ghada Arfaoui, Jean-François Lalande, Jacques Traoré, Nicolas Desmoulins, Pascal Berthomé, Saïd Gharout:
A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing. 25-45 - David Fifield, Chang Lan, Rod Hynes, Percy Wegmann, Vern Paxson:
Blocking-resistant communication through domain fronting. 46-64 - Jamie Hayes, George Danezis:
Guard Sets for Onion Routing. 65-80 - Erik-Oliver Blass, Travis Mayberry, Guevara Noubir:
Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists. 81-98 - Mathias Humbert, Kévin Huguenin, Joachim Hugonot, Erman Ayday, Jean-Pierre Hubaux:
De-anonymizing Genomic Databases Using Phenotypic Traits. 99-114 - Tarik Moataz, Erik-Oliver Blass, Guevara Noubir:
Recursive Trees for Practical ORAM. 115-134 - Luís T. A. N. Brandão, Nicolas Christin, George Danezis, anonymous:
Toward Mending Two Nation-Scale Brokered Identification Systems. 135-155 - Konstantinos Chatzikokolakis, Catuscia Palamidessi, Marco Stronati:
Constructing elastic distinguishability metrics for location privacy. 156-170 - Joshua Juen, Aaron Johnson, Anupam Das, Nikita Borisov, Matthew Caesar:
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction. 171-187 - Peeter Laud:
Parallel Oblivious Array Access for Secure Multiparty Computation and Privacy-Preserving Minimum Spanning Trees. 188-205 - Markulf Kohlweiss, Ian Miers:
Accountable Metadata-Hiding Escrow: A Group Signature Case Study. 206-221 - Aggelos Kiayias, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, Qiang Tang:
Optimal Rate Private Information Retrieval from Homomorphic Encryption. 222-243 - Rajesh Krishnan, Ravi Sundaram:
Secure and scalable match: overcoming the universal circuit bottleneck using group programs. 244-262 - Melissa Chase, Emily Shen:
Substring-Searchable Symmetric Encryption. 263-281 - David Gugelmann, Markus Happe, Bernhard Ager, Vincent Lenders:
An Automated Approach for Complementing Ad Blockers' Blacklists. 282-298 - Reza Shokri:
Privacy Games: Optimal User-Centric Data Obfuscation. 299-315
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.