| 2014 | A Predictive Differentially-Private Mechanism for Mobility Traces. Konstantinos Chatzikokolakis, Catuscia Palamidessi, Marco Stronati |
| 2014 | C3P: Context-Aware Crowdsourced Cloud Privacy. Hamza Harkous, Rameez Rahman, Karl Aberer |
| 2014 | CloudTransport: Using Cloud Storage for Censorship-Resistant Networking. Chad Brubaker, Amir Houmansadr, Vitaly Shmatikov |
| 2014 | Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications. Simon Oya, Carmela Troncoso, Fernando Pérez-González |
| 2014 | Dovetail: Stronger Anonymity in Next-Generation Internet Routing. Jody Sankey, Matthew K. Wright |
| 2014 | Exploiting Delay Patterns for User IPs Identification in Cellular Networks. Vasile Claudiu Perta, Marco Valerio Barbera, Alessandro Mei |
| 2014 | Forward-Secure Distributed Encryption. Wouter Lueks, Jaap-Henk Hoepman, Klaus Kursawe |
| 2014 | I Know What You're Buying: Privacy Breaches on eBay. Tehila Minkus, Keith W. Ross |
| 2014 | I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis. Brad Miller, Ling Huang, Anthony D. Joseph, J. D. Tygar |
| 2014 | Measuring Freenet in the Wild: Censorship-Resilience under Observation. Stefanie Roos, Benjamin Schiller, Stefan Hacker, Thorsten Strufe |
| 2014 | On the Effectiveness of Obfuscation Techniques in Online Social Networks. Terence Chen, Roksana Boreli, Mohamed Ali Kâafar, Arik Friedman |
| 2014 | Privacy Enhancing Technologies - 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings Emiliano De Cristofaro, Steven J. Murdoch |
| 2014 | Quantifying the Effect of Co-location Information on Location Privacy. Alexandra-Mihaela Olteanu, Kévin Huguenin, Reza Shokri, Jean-Pierre Hubaux |
| 2014 | Social Status and the Demand for Security and Privacy. Jens Grossklags, Nigel J. Barradale |
| 2014 | Spoiled Onions: Exposing Malicious Tor Exit Relays. Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, Edgar R. Weippl |
| 2014 | The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency. Casey Devet, Ian Goldberg |
| 2014 | Why Doesn't Jane Protect Her Privacy? Karen Renaud, Melanie Volkamer, Arne Renkema-Padmos |