Privacy Enhancing Technologies A

17 papers

YearTitle / Authors
2014A Predictive Differentially-Private Mechanism for Mobility Traces.
Konstantinos Chatzikokolakis, Catuscia Palamidessi, Marco Stronati
2014C3P: Context-Aware Crowdsourced Cloud Privacy.
Hamza Harkous, Rameez Rahman, Karl Aberer
2014CloudTransport: Using Cloud Storage for Censorship-Resistant Networking.
Chad Brubaker, Amir Houmansadr, Vitaly Shmatikov
2014Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications.
Simon Oya, Carmela Troncoso, Fernando Pérez-González
2014Dovetail: Stronger Anonymity in Next-Generation Internet Routing.
Jody Sankey, Matthew K. Wright
2014Exploiting Delay Patterns for User IPs Identification in Cellular Networks.
Vasile Claudiu Perta, Marco Valerio Barbera, Alessandro Mei
2014Forward-Secure Distributed Encryption.
Wouter Lueks, Jaap-Henk Hoepman, Klaus Kursawe
2014I Know What You're Buying: Privacy Breaches on eBay.
Tehila Minkus, Keith W. Ross
2014I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis.
Brad Miller, Ling Huang, Anthony D. Joseph, J. D. Tygar
2014Measuring Freenet in the Wild: Censorship-Resilience under Observation.
Stefanie Roos, Benjamin Schiller, Stefan Hacker, Thorsten Strufe
2014On the Effectiveness of Obfuscation Techniques in Online Social Networks.
Terence Chen, Roksana Boreli, Mohamed Ali Kâafar, Arik Friedman
2014Privacy Enhancing Technologies - 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings
Emiliano De Cristofaro, Steven J. Murdoch
2014Quantifying the Effect of Co-location Information on Location Privacy.
Alexandra-Mihaela Olteanu, Kévin Huguenin, Reza Shokri, Jean-Pierre Hubaux
2014Social Status and the Demand for Security and Privacy.
Jens Grossklags, Nigel J. Barradale
2014Spoiled Onions: Exposing Malicious Tor Exit Relays.
Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, Edgar R. Weippl
2014The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency.
Casey Devet, Ian Goldberg
2014Why Doesn't Jane Protect Her Privacy?
Karen Renaud, Melanie Volkamer, Arne Renkema-Padmos