


default search action
Proceedings on Privacy Enhancing Technologies, Volume 2021
Volume 2021, Number 1, January 2021
- Aaron Johnson, Florian Kerschbaum:

Editors' Introduction. 1-4 - A. K. M. Mubashwir Alam, Sagar Sharma, Keke Chen:

SGX-MR: Regulating Dataflows for Protecting Access Patterns of Data-Intensive SGX Applications. 5-20 - Miguel Ambrona

, Dario Fiore, Claudio Soriente
:
Controlled Functional Encryption Revisited: Multi-Authority Extensions and Efficient Schemes for Quadratic Functions. 21-42 - Valentino Rizzo

, Stefano Traverso, Marco Mellia
:
Unveiling Web Fingerprinting in the Wild Via Code Mining and Machine Learning. 43-63 - Ashish Dandekar, Debabrota Basu, Stéphane Bressan:

Differential Privacy at Risk: Bridging Randomness and Privacy Budget. 64-84 - Arezoo Rajabi, Rakesh B. Bobba

, Mike Rosulek, Charles V. Wright, Wu-chi Feng:
On the (Im)Practicality of Adversarial Perturbation for Image Privacy. 85-106 - Stan Gurtler, Ian Goldberg:

SoK: Privacy-Preserving Reputation Systems. 107-127 - Jaewoo Lee, Daniel Kifer

:
Scaling up Differentially Private Deep Learning with Fast Per-Example Gradient Clipping. 128-144 - Leonardo Babun, Z. Berkay Celik, Patrick D. McDaniel, A. Selcuk Uluagac:

Real-time Analysis of Privacy-(un)aware IoT Applications. 145-166 - Mark Abspoel, Daniel Escudero, Nikolaj Volgushev:

Secure training of decision trees with continuous attributes. 167-187 - Sameer Wagh, Shruti Tople, Fabrice Benhamouda, Eyal Kushilevitz, Prateek Mittal, Tal Rabin:

Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning. 188-208 - Yuantian Miao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Benjamin Zi Hao Zhao, Dali Kaafar, Yang Xiang:

The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services. 209-228 - Theodor Schnitzler

, Muhammad Shujaat Mirza, Markus Dürmuth
, Christina Pöpper:
SoK: Managing Longitudinal Privacy of Publicly Shared Personal Online Data. 229-249
Volume 2021, Number 2, April 2021
- Aaron Johnson, Florian Kerschbaum:

Editors' Introduction. 1-4 - Takao Murakami, Koki Hamada, Yusuke Kawamoto

, Takuma Hatano:
Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces with Cluster-Specific Features. 5-26 - Hirak Ray, Flynn Wolf, Ravi Kuber, Adam J. Aviv:

"Warn Them" or "Just Block Them"?: Investigating Privacy Concerns Among Older and Working Age Adults. 27-47 - Jean-Pierre Smith, Prateek Mittal, Adrian Perrig

:
Website Fingerprinting in the Age of QUIC. 48-69 - Zhiyi Zhang

, Michal Król
, Alberto Sonnino, Lixia Zhang, Etienne Rivière:
EL PASSO: Efficient and Lightweight Privacy-preserving Single Sign On. 70-87 - Duc Bui, Kang G. Shin, Jong-Min Choi, Junbum Shin

:
Automated Extraction and Presentation of Data Practices in Privacy Policies. 88-110 - Martin Zuber, Renaud Sirdey:

Efficient homomorphic evaluation of k-NN classifiers. 111-129 - Yuchen Liu, Ziyu Xiang, Eun Ji Seong, Apu Kapadia

, Donald S. Williamson
:
Defending Against Microphone-Based Attacks with Personalized Noise. 130-150 - Rahel A. Fainchtein, Adam J. Aviv, Micah Sherr, Stephen Ribaudo, Armaan Khullar:

Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services. 151-172 - Devashish Gosain, Mayank Mohindra, Sambuddho Chakravarty:

Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs. 173-193 - Rasmus Dahlberg, Tobias Pulls, Tom Ritter, Paul Syverson:

Privacy-Preserving & Incrementally-Deployable Support for Certificate Transparency in Tor. 194-213 - Túlio A. Pascoal

, Jérémie Decouchant
, Antoine Boutet, Paulo Jorge Esteves Veríssimo:
DyPS: Dynamic, Private and Secure GWAS. 214-234 - Thomas Groß:

Validity and Reliability of the Scale Internet Users' Information Privacy Concerns (IUIPC). 235-258 - Giorgio Di Tizio

, Fabio Massacci
:
A Calculus of Tracking: Theory and Practice. 259-281 - Shikun Zhang, Yuanyuan Feng, Lujo Bauer

, Lorrie Faith Cranor, Anupam Das, Norman M. Sadeh:
"Did you know this camera tracks your mood?": Understanding Privacy Expectations and Preferences in the Age of Video Analytics. 282-304 - Se Eun Oh, Nate Mathews, Mohammad Saidur Rahman, Matthew Wright, Nicholas Hopper:

GANDaLF: GAN for Data-Limited Fingerprinting. 305-322 - David Froelicher, Juan Ramón Troncoso-Pastoriza, Apostolos Pyrgelis, Sinem Sav

, Joao Sa Sousa, Jean-Philippe Bossuat, Jean-Pierre Hubaux:
Scalable Privacy-Preserving Distributed Learning. 323-347 - Bargav Jayaraman, Lingxiao Wang, Katherine Knipmeyer, Quanquan Gu, David Evans:

Revisiting Membership Inference Under Realistic Assumptions. 348-368 - Varun Chandrasekaran, Chuhan Gao, Brian Tang, Kassem Fawaz

, Somesh Jha, Suman Banerjee:
Face-Off: Adversarial Face Obfuscation. 369-390 - Vikas Mishra, Pierre Laperdrix, Walter Rudametkin, Romain Rouvoy:

Déjà vu: Abusing Browser Cache Headers to Identify and Track Online Users. 391-406
Volume 2021, Number 3, July 2021
- Aaron Johnson, Florian Kerschbaum:

Editors' Introduction. 1-4 - Jan Tolsdorf

, Florian Dehling, Delphine Reinhardt, Luigi Lo Iacono:
Exploring mental models of the right to informational self-determination of office workers in Germany. 5-27 - Kerem Ayoz, Erman Ayday, A. Ercüment Çiçek:

Genome Reconstruction Attacks Against Genomic Data-Sharing Beacons. 28-48 - Glencora Borradaile, Kelsy Kretschmer

, Michele Gretes, Alexandria LeClerc
:
The Motivated Can Encrypt (Even with PGP). 49-69 - Jenny Tang, Hannah Shoemaker, Ada Lerner

, Eleanor Birrell:
Defining Privacy: How Users Interpret Technical Terms in Privacy Policies. 70-94 - Aditya Damodaran

, Alfredo Rial:
Unlinkable Updatable Hiding Databases and Privacy-Preserving Loyalty Programs. 95-121 - Sébastien Gambs, Frédéric Ladouceur, Antoine Laurent, Alexandre Roy-Gaumond:

Growing synthetic data through differentially-private vine copulas. 122-141 - Sumit Mukherjee, Yixi Xu, Anusua Trivedi, Nabajyoti Patowary, Juan Lavista Ferres:

privGAN: Protecting GANs from membership inference attacks at low cost to utility. 142-163 - Ellis Fenske, Dane Brown, Jeremy Martin, Travis Mayberry, Peter Ryan

, Erik C. Rye:
Three Years Later: A Study of MAC Address Randomization In Mobile Devices And When It Succeeds. 164-181 - Sylvain Chatel, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux:

SoK: Privacy-Preserving Collaborative Tree-based Model Learning. 182-203 - Ivan Evtimov, Pascal Sturmfels, Tadayoshi Kohno:

FoggySight: A Scheme for Facial Lookup Privacy. 204-226 - Alexander Heinrich

, Milan Stute, Tim Kornhuber, Matthias Hollick
:
Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System. 227-245 - Ilia Iliashenko, Vincent Zucca:

Faster homomorphic comparison operations for BGV and BFV. 246-264 - Viktoria Ronge, Christoph Egger

, Russell W. F. Lai
, Dominique Schröder, Hoover H. F. Yin
:
Foundations of Ring Sampling. 265-288 - Saba Eskandarian:

Fast Privacy-Preserving Punch Cards. 289-307 - Peter Story

, Daniel Smullen, Yaxing Yao, Alessandro Acquisti
, Lorrie Faith Cranor, Norman M. Sadeh, Florian Schaub:
Awareness, Adoption, and Misconceptions of Web Privacy Tools. 308-333 - Sebastian Linsner, Franz Kuntke, Enno Steinbrink

, Jonas Franken, Christian Reuter:
The Role of Privacy in Digitalization - Analyzing Perspectives of German Farmers. 334-350 - Emmanuel Syrmoudis

, Stefan Mager, Sophie Kuebler-Wachendorff, Paul Pizzinini, Jens Grossklags, Johann Kranz:
Data Portability between Online Services: An Empirical Analysis on the Effectiveness of GDPR Art. 20. 351-372 - Jooyoung Lee, Sarah Michele Rajtmajer, Eesha Srivatsavaya, Shomir Wilson:

Digital Inequality Through the Lens of Self-Disclosure. 373-393 - Yana Dimova, Gunes Acar, Lukasz Olejnik, Wouter Joosen, Tom van Goethem:

The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion. 394-412 - Peter Ney, Lee Organick, Jeff Nivala, Luis Ceze, Tadayoshi Kohno:

DNA Sequencing Flow Cells and the Security of the Molecular-Digital Interface. 413-432 - Abdul Wajid, Nasir Kamal, Muhammad Sharjeel, Raaez Muhammad Sheikh, Huzaifah Bin Wasim, Muhammad Hashir Ali, Wajahat Hussain, Syed Taha Ali, Latif Anjum:

A First Look at Private Communications in Video Games using Visual Features. 433-452 - Nathan Reitinger, Michelle L. Mazurek:

ML-CB: Machine Learning Canvas Block. 453-473
Volume 2021, Number 4, October 2021
- Aaron Johnson, Florian Kerschbaum:

Editors' Introduction. 1-5 - Iñigo Querejeta-Azurmendi, Panagiotis Papadopoulos, Matteo Varvello, Antonio Nappa, Jiexin Zhang, Benjamin Livshits:

ZKSENSE: A Friction-less Privacy-Preserving Human Attestation Mechanism for Mobile Devices. 6-29 - Adithya Vadapalli, Fattaneh Bayatbabolghani, Ryan Henry:

You May Also Like... Privacy: Recommendation Systems Meet PIR. 30-53 - Camille Cobb, Sruti Bhagavatula, Kalil Anderson Garrett, Alison Hoffman, Varun Rao, Lujo Bauer

:
"I would have to evaluate their objections": Privacy tensions between smart home device owners and incidental users. 54-75 - Konstantinos Chalkias, Shir Cohen, Kevin Lewi, Fredric Moezinia, Yolan Romailler:

HashWires: Hyperefficient Credential-Based Range Proofs. 76-95 - Rafa Gálvez

, Veelasha Moonsamy, Claudia Díaz:
Less is More: A privacy-respecting Android malware classifier using federated learning. 96-116 - Johannes Ernst

, Alexander Koch
:
Private Stream Aggregation with Labels in the Standard Model. 117-138 - José Cabrero-Holgueras, Sergio Pastrana:

SoK: Privacy-Preserving Computation Techniques for Deep Learning. 139-162 - Wenxiao Wang, Tianhao Wang, Lun Wang, Nanqing Luo, Pan Zhou, Dawn Song, Ruoxi Jia:

DPlis: Boosting Utility of Differentially Private Deep Learning via Randomized Smoothing. 163-183 - Alexandra Dirksen

, David Klein
, Robert Michael, Tilman Stehr, Konrad Rieck, Martin Johns:
LogPicker: Strengthening Certificate Transparency Against Covert Adversaries. 184-202 - Mahdi Nasrullah Al-Ameen, Huzeyfe Kocabas, Swapnil Nandy, Tanjina Tamanna:

"We, three brothers have always known everything of each other": A Cross-cultural Study of Sharing Digital Devices and Online Accounts. 203-224 - Aditya Hegde

, Helen Möllering, Thomas Schneider
, Hossein Yalame:
SoK: Efficient Privacy-preserving Clustering. 225-248 - Maximilian Hils, Daniel W. Woods, Rainer Böhme:

Privacy Preference Signals: Past, Present and Future. 249-269 - Felix Engelmann, Lukas Müller, Andreas Peter, Frank Kargl, Christoph Bösch

:
SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges. 270-290 - Christian Mouchet, Juan Ramón Troncoso-Pastoriza, Jean-Philippe Bossuat, Jean-Pierre Hubaux:

Multiparty Homomorphic Encryption from Ring-Learning-with-Errors. 291-311 - Brandon Broadnax, Alexander Koch

, Jeremias Mechler, Tobias Müller, Jörn Müller-Quade, Matthias Nagel:
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules. 312-338 - Thijs Veugen, Mark Abspoel:

Secure integer division with a private divisor. 339-349 - Wouter Lueks, Seda F. Gürses, Michael Veale

, Edouard Bugnion, Marcel Salathé, Kenneth G. Paterson, Carmela Troncoso:
CrowdNotifier: Decentralized Privacy-Preserving Presence Tracing. 350-368 - Anna Maria Mandalari, Daniel J. Dubois, Roman Kolcun, Muhammad Talha Paracha, Hamed Haddadi, David R. Choffnes:

Blocking Without Breaking: Identification and Mitigation of Non-Essential IoT Traffic. 369-388 - Logan Arkema, Micah Sherr:

Residue-Free Computing. 389-405 - Farzad Zafarani, Chris Clifton:

Differentially Private Naïve Bayes Classifier Using Smooth Sensitivity. 406-419 - Nguyen Phong Hoang, Arian Akhavan Niaki

, Phillipa Gill, Michalis Polychronakis:
Domain name encryption is not enough: privacy leakage via IP-based website fingerprinting. 420-440 - Elizabeth C. Crites, Anna Lysyanskaya:

Mercurial Signatures for Variable-Length Messages. 441-463 - Edwin Dauber, Robert F. Erbacher, Gregory Shearer, Michael J. Weisman, Frederica Free-Nelson, Rachel Greenstadt:

Supervised Authorship Segmentation of Open Source Code Projects. 464-479 - Henry Hosseini, Martin Degeling

, Christine Utz
, Thomas Hupperich:
Unifying Privacy Policy Detection. 480-499 - Daniel Smullen, Yaxing Yao, Yuanyuan Feng, Norman M. Sadeh, Arthur Edelstein, Rebecca Weiss:

Managing Potentially Intrusive Practices in the Browser: A User-Centered Perspective. 500-527 - Ghada Almashaqbeh, Fabrice Benhamouda, Seungwook Han, Daniel Jaroslawicz, Tal Malkin, Alex Nicita, Tal Rabin, Abhishek Shah, Eran Tromer

:
Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC. 528-548 - Alexandra Boldyreva, Tianxin Tang

:
Privacy-Preserving Approximate k-Nearest-Neighbors Search that Hides Access, Query and Volume Patterns. 549-574 - Sudheesh Singanamalla

, Suphanat Chunhapanya, Jonathan Hoyland
, Marek Vavrusa, Tanya Verma, Peter Wu, Marwan Fayed
, Kurtis Heimerl, Nick Sullivan, Christopher A. Wood:
Oblivious DNS over HTTPS (ODoH): A Practical Privacy Enhancement to DNS. 575-592

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














