


default search action
Proceedings on Privacy Enhancing Technologies, Volume 2024
Volume 2024, Number 1, January 2024
- Micah Sherr, Zubair Shafiq:

Editors' Introduction. 1-4 - Nurullah Demir, Tobias Urban

, Norbert Pohlmann, Christian Wressnegger:
A Large-Scale Study of Cookie Banner Interaction Tools and their Impact on Users' Privacy. 5-20 - Gonzalo Munilla Garrido, Vivek Nair, Dawn Song:

SoK: Data Privacy in Virtual Reality. 21-40 - Yohan Beugin

, Patrick D. McDaniel:
Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not Preserving). 41-57 - Lawrence Lim

, Wei-Yee Goh, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta:
QUICKeR: Quicker Updates Involving Continuous Key Rotation. 58-73 - Marina Blanton

, Dennis Murphy, Chen Yuan:
Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits. 74-97 - James K. Holland, Jason Carpenter, Se Eun Oh, Nicholas Hopper:

DeTorrent: An Adversarial Padding-only Traffic Analysis Defense. 98-115 - Simon Hanisch

, Julian Todt
, Jose Patino, Nicholas W. D. Evans, Thorsten Strufe:
A False Sense of Privacy: Towards a Reliable Evaluation Methodology for the Anonymization of Biometric Data. 116-132 - Yixin Zou

, Kaiwen Sun, Tanisha Afnan, Ruba Abu-Salma, Robin Brewer, Florian Schaub:
Cross-Contextual Examination of Older Adults' Privacy Concerns, Behaviors, and Vulnerabilities. 133-150 - Stefan Albert Horstmann

, Samuel Domiks, Marco Gutfleisch, Mindy Tran, Yasemin Acar, Veelasha Moonsamy, Alena Naiakshina:
"Those things are written by lawyers, and programmers are reading that." Mapping the Communication Gap Between Software Developers and Privacy Experts. 151-170 - Tom Biselli, Laura Utz, Christian Reuter:

Supporting Informed Choices about Browser Cookies: The Impact of Personalised Cookie Banners. 171-191 - Lorin Schöni

, Karel Kubicek
, Verena Zimmermann
:
Block Cookies, Not Websites: Analysing Mental Models and Usability of the Privacy-Preserving Browser Extension CookieBlock. 192-216 - Christopher B. Landis

, Joshua A. Kroll:
Mitigating Inference Risks with the NIST Privacy Framework. 217-231 - Amirhossein Adavoudi Jolfaei, Andy Rupp, Stefan Schiffner, Thomas Engel:

Why Privacy-Preserving Protocols Are Sometimes Not Enough: A Case Study of the Brisbane Toll Collection Infrastructure. 232-257 - Sebastian Zimmeck, Eliza Kuller, Chunyue Ma, Bella Tassone, Joe Champeau:

Generalizable Active Privacy Choice: Designing a Graphical User Interface for Global Privacy Control. 258-279 - Zengrui Liu, Umar Iqbal, Nitesh Saxena:

Opted Out, Yet Tracked: Are Regulations Enough to Protect Your Privacy? 280-299 - Adi Akavia, Ben Galili

, Hayim Shaul, Mor Weiss, Zohar Yakhini:
Privacy Preserving Feature Selection for Sparse Linear Regression. 300-313 - Srdan Krstic

, Hoang Nguyen Phuoc Bao, David A. Basin:
Model-driven Privacy. 314-329 - Azra Abtahi, Mathias Payer, Amir Aminifar:

DP-ACT: Decentralized Privacy-Preserving Asymmetric Digital Contact Tracing. 330-342 - Killian Davitt, Dan Ristea

, Duncan Russell, Steven J. Murdoch
:
CoStricTor: Collaborative HTTP Strict Transport Security in Tor Browser. 343-356 - Johannes Müller

, Balázs Pejó, Ivan Pryvalov
:
DeVoS: Deniable Yet Verifiable Vote Updating. 357-378 - Rachel McAmis, Mattea Sim

, Mia M. Bennett, Tadayoshi Kohno:
Over Fences and Into Yards: Privacy Threats and Concerns of Commercial Satellites. 379-396 - Nan Cheng, Naman Gupta, Aikaterini Mitrokotsa, Hiraku Morita

, Kazunari Tozawa:
Constant-Round Private Decision Tree Evaluation for Secret Shared Data. 397-412 - Emily Wenger, Xiuyu Li, Ben Y. Zhao, Vitaly Shmatikov:

Data Isotopes for Data Provenance in DNNs. 413-429 - Seny Kamara, Abdelkarim Kati, Tarik Moataz, Jamie DeMaria, Andrew Park, Amos Treiber:

MAPLE: MArkov Process Leakage attacks on Encrypted Search. 430-446 - Tushar M. Jois, Gabrielle Beck, Sofia Belikovetsky, Joseph Carrigan, Alishah Chator, Logan Kostick, Maximilian Zinkus, Gabriel Kaptchuk, Aviel D. Rubin:

SocIoTy: Practical Cryptography in Smart Home Contexts. 447-464 - Paul Vines, Samuel McKay, Jesse Jenter, Suresh Krishnaswamy:

Communication Breakdown: Modularizing Application Tunneling for Signaling Around Censorship. 465-477 - Chuan Yan, Fuman Xie, Mark Huasong Meng, Yanjun Zhang, Guangdong Bai:

On the Quality of Privacy Policy Documents of Virtual Personal Assistant Applications. 478-493 - Tsunato Nakai, Ye Wang, Kota Yoshida, Takeshi Fujino:

SEDMA: Self-Distillation with Model Aggregation for Membership Privacy. 494-508 - Sajin Sasy, Ian Goldberg:

SoK: Metadata-Protecting Communication Systems. 509-524 - Caelin Kaplan, Chuan Xu, Othmane Marfoq, Giovanni Neglia, Anderson Santana de Oliveira:

A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses. 525-548 - Zichen Gui

, Kenneth G. Paterson, Sikhar Patranabis, Bogdan Warinschi:
SWiSSSE: System-Wide Security for Searchable Symmetric Encryption. 549-581 - Sayan Biswas

, Catuscia Palamidessi:
PRIVIC: A privacy-preserving method for incremental collection of location data. 582-596 - François Hublet, David A. Basin, Srdan Krstic

:
User-Controlled Privacy: Taint, Track, and Control. 597-616 - Nerla Jean-Louis, Yunqi Li, Yan Ji, Harjasleen Malvai, Thomas Yurek, Sylvain Bellemare, Andrew Miller:

SGXonerate:Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE. 617-634 - Heba Aly, Yizhou Liu, Reza Ghaiumy Anaraky, Sushmita Khan, Moses Namara, Kaileigh Angela Byrne, Bart P. Knijnenburg:

Tailoring Digital Privacy Education Interventions for Older Adults: A Comparative Study on Modality Preferences and Effectiveness. 635-656
Volume 2024, Number 2, 2024
- Micah Sherr, Zubair Shafiq:

Editors' Introduction. 1-4 - Sebastian Hasler, Pascal Reisert, Marc Rivinius

, Ralf Küsters:
Multipars: Reduced-Communication MPC over Z2k. 5-28 - Gokulnath Pillai, Ajith Suresh

, Eikansh Gupta, Vinod Ganapathy, Arpita Patra:
Privadome: Delivery Drones and Citizen Privacy. 29-48 - Dimitris Mouris, Daniel Masny, Ni Trieu, Shubho Sengupta, Prasad Buddhavarapu, Benjamin M. Case:

Delegated Private Matching For Compute. 49-72 - Jiahui Gao, Ni Trieu, Avishay Yanai:

Multiparty Private Set Intersection Cardinality and Its Applications. 73-90 - Jan Charatan, Eleanor Birrell:

Two Steps Forward and One Step Back: The Right to Opt-out of Sale under CPRA. 91-105 - Minh-Ha Le, Niklas Carlsson:

StyleAdv: A Usable Privacy Framework Against Facial Recognition with Adversarial Image Editing. 106-123 - John Delaney, Badih Ghazi, Charlie Harrison, Christina Ilvento, Ravi Kumar, Pasin Manurangsi, Martin Pál, Karthik Prabhakar, Mariana Raykova:

Differentially Private Ad Conversion Measurement. 124-140 - Philip Scherer, Christiane Weis, Thorsten Strufe:

A Framework for Provably Secure Onion Routing against a Global Adversary. 141-159 - Elijah Robert Bouma-Sims

, Sanjnah Ananda Kumar, Lorrie Faith Cranor:
Exploring the Privacy Experiences of Closeted Users of Online Dating Services in the US. 160-181 - Yanzi Lin, Jaideep Juneja, Eleanor Birrell, Lorrie Faith Cranor:

Data Safety vs. App Privacy: Comparing the Usability of Android and iOS Privacy Labels. 182-210 - Sebastian Zimmeck, Daniel Goldelman, Owen Kaplan, Logan Brown, Justin Casler, Judeley Jean-Charles, Joe Champeau, Hamza Harkous:

Website Data Transparency in the Browser. 211-234 - Prashant Agrawal, Abhinav Nakarmi, Mahabir Prasad Jhanwar, Subodh Sharma, Subhashis Banerjee:

Traceable mixnets. 235-275 - Lennart Oldenburg

, Marc Juarez, Enrique Argones-Rúa, Claudia Díaz:
MixMatch: Flow Matching for Mixnet Traffic. 276-294 - Weijia He

, Nathan Reitinger, Atheer Almogbil, Yi-Shyuan Chiang, Timothy J. Pierson, David Kotz:
Contextualizing Interpersonal Data Sharing in Smart Homes. 295-312 - Wei Sun

, Tingjun Chen, Neil Gong:
SoK: Secure Human-centered Wireless Sensing. 313-329 - Bart Veldhuizen, Gabriele Spini

, Thijs Veugen, Lisa Kohl:
Extending the Security of SPDZ with Fairness. 330-350 - Arthur Américo, Allison Bishop, Paul Cesaretti, Garrison Grogan, Adam McKoy, Robert Moss, Lisa Oakley, Marcel Ribeiro, Mohammad Shokri:

Defining and Controlling Information Leakage in US Equities Trading. 351-371 - Florian M. Farke, David G. Balash

, Maximilian Golla, Adam J. Aviv
:
How Does Connecting Online Activities to Advertising Inferences Impact Privacy Perceptions? 372-390 - Faxing Wang, Shaanan Cohney, Riad S. Wahby, Joseph Bonneau:

NOTRY: Deniable messaging with retroactive avowal. 391-411 - Kavous Salehzadeh Niksirat

, Diana Korka
, Quentin Jacquemin, Céline Vanini
, Mathias Humbert, Mauro Cherubini, Sylvain Métille
, Kévin Huguenin
:
Security and Privacy with Second-Hand Storage Devices: A User-Centric Perspective from Switzerland. 412-433 - Henry Hosseini, Christine Utz, Martin Degeling, Thomas Hupperich:

A Bilingual Longitudinal Analysis of Privacy Policies Measuring the Impacts of the GDPR and the CCPA/CPRA. 434-463 - Iness Ben Guirat

, Debajyoti Das, Claudia Díaz:
Blending Different Latency Traffic With Beta Mixing. 464-478
Volume 2024, Number 3, 2024
- Micah Sherr, Zubair Shafiq:

Editors' Introduction. 1-3 - Dimitris Mouris

, Pratik Sarkar, Nektarios Georgios Tsoutsos:
PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries. 4-24 - Mazharul Islam, Sunpreet S. Arora, Rahul Chatterjee, Peter Rindal, Maliheh Shirvanian:

Compact: Approximating Complex Activation Functions for Secure Computation. 25-41 - Hamza Saleem, Amir Ziashahabi, Muhammad Naveed, Salman Avestimehr:

Hawk: Accurate and Fast Privacy-Preserving Machine Learning Using Secure Lookup Table Computation. 42-58 - Nan Wang, Dongxi Liu:

FlashSwift: A Configurable and More Efficient Range Proof With Transparent Setup. 59-74 - Erik Buchholz

, Alsharif Abuadbba
, Shuo Wang, Surya Nepal
, Salil S. Kanhere:
SoK: Can Trajectory Generation Combine Privacy and Utility? 75-93 - Sarah Abdelwahab Gaballah, Lamya Abdullah, Mina Alishahi, Thanh Hoang Long Nguyen, Ephraim Zimmer

, Max Mühlhäuser, Karola Marky:
Anonify: Decentralized Dual-level Anonymity for Medical Data Donation. 94-108 - Benjamin Mixon-Baca, Jeffrey Knockel, Diwen Xue, Tarun Ayyagari, Deepak Kapur, Roya Ensafi, Jedidiah R. Crandall

:
Attacking Connection Tracking Frameworks as used by Virtual Private Networks. 109-126 - Lanjing Liu, Lan Gao

, Nikita Soni, Yaxing Yao:
Exploring Design Opportunities for Family-Based Privacy Education in Informal Learning Spaces. 127-143 - Tanveer Khan, Mindaugas Budzys

, Khoa Nguyen, Antonis Michalas
:
SoK: Wildest Dreams: Reproducible Research in Privacy-preserving Neural Network Training. 144-164 - Xiuling Wang, Wendy Hui Wang:

GCL-Leak: Link Membership Inference Attacks against Graph Contrastive Learning. 165-185 - Jelle Vos, Sikha Pentyala, Steven Golob, Ricardo Maia, Dean F. Kelley, Zekeriya Erkin, Martine De Cock, Anderson Nascimento:

Privacy-Preserving Membership Queries for Federated Anomaly Detection. 186-201 - John Abascal, Stanley Wu, Alina Oprea, Jonathan R. Ullman:

TMI! Finetuned Models Leak Private Information from their Pretraining Data. 202-223 - Matthew Gregoire, Rachel Thomas

, Saba Eskandarian:
CheckOut: User-Controlled Anonymization for Customer Loyalty Programs. 224-245 - Yue Guo, Antigoni Polychroniadou, Elaine Shi, David Byrd, Tucker Balch:

MicroSecAgg: Streamlined Single-Server Secure Aggregation. 246-275 - Connor Bell, Saba Eskandarian:

Anonymous Complaint Aggregation for Secure Messaging. 276-296 - Evan Krul

, Hye-young Paik, Sushmita Ruj, Salil S. Kanhere:
SoK: Trusting Self-Sovereign Identity. 297-313 - Arka Rai Choudhuri, Sanjam Garg, Aarushi Goel, Sruthi Sekar, Rohit Sinha:

SublonK: Sublinear Prover PlonK. 314-335 - Aamir Hamid, Hemanth Reddy Samidi, Primal Pappachan, Tim Finin, Roberto Yus:

GenAIPABench: A Benchmark for Generative AI-based Privacy Assistants. 336-352 - Alexander Heinrich

, Leon Würsching, Matthias Hollick
:
Please Unstalk Me: Understanding Stalking with Bluetooth Trackers and Democratizing Anti-Stalking Protection. 353-371 - Hui-Po Wang, Dingfan Chen, Raouf Kerkouche, Mario Fritz:

FedLAP-DP: Federated Learning by Sharing Differentially Private Loss Approximations. 372-390 - Tingting Tang

, Yue Niu, Salman Avestimehr, Murali Annavaram:
Edge Private Graph Neural Networks with Singular Value Perturbation. 391-406 - Ana-Maria Cretu, Daniel Jones, Yves-Alexandre de Montjoye, Shruti Tople:

Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting. 407-430 - Asmaa El fraihi

, Nardjes Amieur, Walter Rudametkin, Oana Goga:
Client-side and Server-side Tracking on Meta: Effectiveness and Accuracy. 431-445 - James Choncholas

, Pujith Kachana, André Mateus, Gregoire Phillips, Ada Gavrilovska:
Snail: Secure Single Iteration Localization. 446-460 - Muslum Ozgur Ozmen, Habiba Farrukh, Z. Berkay Celik:

Physical Side-Channel Attacks against Intermittent Devices. 461-476 - Liangqin Ren, Zeyan Liu

, Fengjun Li, Kaitai Liang, Zhu Li, Bo Luo:
PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption. 477-494 - Md. Jakaria

, Danny Yuxing Huang
, Anupam Das:
Connecting the Dots: Tracing Data Endpoints in IoT Devices. 495-522 - Pietro Tedeschi

, Siva Ganesh Ganti, Savio Sciancalepore
:
Selective Authenticated Pilot Location Disclosure for Remote ID-enabled Drones. 523-539 - Soumaya Boussaha, Lukas Hock, Miguel Bermejo, Rubén Cuevas Rumín, Ángel Cuevas Rumín, David Klein, Martin Johns, Luca Compagna, Daniele Antonioli, Thomas Barber:

FP-tracer: Fine-grained Browser Fingerprinting Detection via Taint-tracking and Entropy-based Thresholds. 540-560 - Soha Jiwani, Rachna Sasheendran, Adhishree Abhyankar, Elijah Robert Bouma-Sims

, Lorrie Cranor:
Crumbling Cookie Categories: Deconstructing Common Cookie Categories to Create Categories that People Understand. 561-588 - Charlotte Moremen

, Jordan Hoogsteden, Eleanor Birrell:
Generational Differences in Understandings of Privacy Terminology. 589-605 - Martin Aumüller, Christian Janos Lebeda, Boel Nelson

, Rasmus Pagh:
PLAN: Variance-Aware Private Mean Estimation. 606-625 - Eyal Kushnir, Guy Moshkowich, Hayim Shaul:

Secure Range-Searching Using Copy-And-Recurse. 626-644 - Olivier Sanders, Jacques Traoré:

Compact Issuer-Hiding Authentication, Application to Anonymous Credential. 645-658 - Tianxi Ji, Erman Ayday, Emre Yilmaz, Pan Li:

Privacy-Preserving Fingerprinting Against Collusion and Correlation Threats in Genomic Data. 659-673 - Robin Kirchner

, Simon Koch
, Noah Kamangar, David Klein, Martin Johns:
A Black-Box Privacy Analysis of Messaging Service Providers' Chat Message Processing. 674-691 - Sajin Sasy, Adithya Vadapalli, Ian Goldberg:

PRAC: Round-Efficient 3-Party MPC for Dynamic Data Structures. 692-714 - Nathan Reitinger, Bruce Wen, Michelle L. Mazurek, Blase Ur:

What Does It Mean to Be Creepy? Responses to Visualizations of Personal Browsing Activity, Online Tracking, and Targeted Ads. 715-743 - Micha Horlboge, Erwin Quiring

, Roland Meyer, Konrad Rieck:
I still know it's you! On Challenges in Anonymizing Source Code. 744-760
Volume 2024, Number 4, 2024
- Micah Sherr, Zubair Shafiq:

Editors' Introduction. 1-4 - Kevin Liao, Henry Corrigan-Gibbs, Dan Boneh:

Divisible E-Cash for Billing in Private Ad Retargeting. 5-23 - Julian Todt

, Simon Hanisch
, Thorsten Strufe:
Fantômas: Understanding Face Anonymization Reversibility. 24-43 - Jenny Tang, Léo Alvarez, Arjun Brar, Nguyen Phong Hoang, Nicolas Christin

:
Automatic Generation of Web Censorship Probe Lists. 44-60 - Kanav Gupta, Neha Jawalkar, Ananta Mukherjee, Nishanth Chandran, Divya Gupta, Ashish Panwar, Rahul Sharma:

SIGMA: Secure GPT Inference with Function Secret Sharing. 61-79 - Vincent Guan, Florent Guépin, Ana-Maria Cretu, Yves-Alexandre de Montjoye:

A Zero Auxiliary Knowledge Membership Inference Attack on Aggregate Location Data. 80-101 - Muhammad Shujaat Mirza, Corban Villa

, Christina Pöpper:
Media talks Privacy: Unraveling a Decade of Privacy Discourse around the World. 102-122 - Héber Hwang Arcolezi, Sébastien Gambs:

Revealing the True Cost of Locally Differentially Private Protocols: An Auditing Perspective. 123-141 - Mir Masood Ali, David G. Balash

, Monica Kodwani, Chris Kanich, Adam J. Aviv
:
Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies. 142-166 - David Hasselquist, Ethan Witwer, August Carlson, Niklas Johansson, Niklas Carlsson:

Raising the Bar: Improved Fingerprinting Attacks and Defenses for Video Streaming Traffic. 167-184 - Sebastian Linsner, Kilian Demuth

, Marc Fischlin, Christian Reuter:
Decision-based Data Distribution (D³): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios. 185-208 - Nirajan Koirala, Jonathan Takeshita, Jeremy Stevens, Taeho Jung:

Summation-based Private Segmented Membership Test from Threshold-Fully Homomorphic Encryption. 209-225 - Christian Badertscher, Mahdi Sedaghat, Hendrik Waldner:

Unlinkable Policy-Compliant Signatures for Compliant and Decentralized Anonymous Payments. 226-267 - Xiuling Wang, Wendy Hui Wang:

Subgraph Structure Membership Inference Attacks against Graph Neural Networks. 268-290 - Pascal Tippe, Adrian Tippe:

Onion Services in the Wild: A Study of Deanonymization Attacks. 291-310 - Kejsi Take, Jordyn Young, Rasika Bhalerao, Kevin Gallagher, Andrea Forte, Damon McCoy, Rachel Greenstadt:

What to Expect When You're Accessing: An Exploration of User Privacy Rights in People Search Websites. 311-326 - Pengzhi Huang, Thang Hoang, Yueying Li, Elaine Shi, G. Edward Suh:

Efficient Privacy-Preserving Machine Learning with Lightweight Trusted Hardware. 327-348 - Muhammad Abu Bakar Aziz, Christo Wilson

:
Johnny Still Can't Opt-out: Assessing the IAB CCPA Compliance Framework. 349-363 - Haoyu He, Isaiah J. King, H. Howie Huang:

Maui: Black-Box Edge Privacy Attack on Graph Neural Networks. 364-380 - Ka-Ho Chow, Sihao Hu, Tiansheng Huang, Fatih Ilhan

, Wenqi Wei, Ling Liu:
Diversity-driven Privacy Protection Masks Against Unauthorized Face Recognition. 381-392 - Daniel Hugenroth, Alberto Sonnino, Sam Cutler, Alastair R. Beresford:

Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones. 393-412 - Tess Despres, Marcelino Ayala Constantino

, Naomi Zacarias Lizola, Gerardo Sánchez Romero, Shijing He, Xiao Zhan, Noura Abdi, Ruba Abu-Salma, Jose Such, Julia Bernd
:
"My Best Friend's Husband Sees and Knows Everything": A Cross-Contextual and Cross-Country Approach to Understanding Smart Home Privacy. 413-449 - Imane Fouad, Cristiana Santos, Pierre Laperdrix:

The Devil is in the Details: Detection, Measurement and Lawfulness of Server-Side Tracking on the Web. 450-465 - Xiaoxin Shen, Eman Alashwali, Lorrie Cranor:

What Do Privacy Advertisements Communicate to Consumers? 466-502 - Alexandra Boldyreva, Zichen Gui

, Bogdan Warinschi:
Understanding Leakage in Searchable Encryption: a Quantitative Approach. 503-524 - Johannes Müller

, Jan Oupický
:
Post-quantum XML and SAML Single Sign-On. 525-543 - Rachel Crowder, George Price, Thomas Groß:

Simply tell me how - On Trustworthiness and Technology Acceptance of Attribute-Based Credentials. 544-564 - Alexandra Boldyreva, Virendra Kumar, Jiahao Sun:

Provable Security Analysis of Butterfly Key Mechanism Protocol in IEEE 1609.2.1 Standard. 565-582 - Ferran Alborch Escobar

, Sébastien Canard, Fabien Laguillaumie, Duong Hieu Phan
:
Computational Differential Privacy for Encrypted Databases Supporting Linear Queries. 583-604 - Hidayet Aksu, Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi, Adam Sealfon, Avinash V. Varadarajan:

Summary Reports Optimization in the Privacy Sandbox Attribution Reporting API. 605-621 - Jiahui Gao, Son Nguyen, Ni Trieu:

Toward A Practical Multi-party Private Set Union. 622-635 - Christoph U. Günther

, Krzysztof Pietrzak:
Deniability in Automated Contact Tracing: Impossibilities and Possibilities. 636-648 - Yunang Chen, David Heath, Rahul Chatterjee, Earlence Fernandes:

Scalable Metadata-Hiding for Privacy-Preserving IoT Systems. 649-664 - Debajyoti Das, Claudia Díaz, Aggelos Kiayias, Thomas Zacharias

:
Are continuous stop-and-go mixnets provably secure? 665-683 - Abdullah Çaglar Öksüz, Anisa Halimi, Erman Ayday:

AUTOLYCUS: Exploiting Explainable Artificial Intelligence (XAI) for Model Extraction Attacks against Interpretable Models. 684-699 - Emma Tosch, Luis Garcia, Cynthia Li, Chris Martens:

Privacy Policies on the Fediverse: A Case Study of Mastodon Instances. 700-733 - Noé Zufferey

, Kavous Salehzadeh Niksirat
, Mathias Humbert, Kévin Huguenin
:
Our Data, Our Solutions: A Participatory Approach for Enhancing Privacy in Wearable Activity Tracker Third-Party Apps. 734-754 - Philip Scherer, Christiane Weis, Thorsten Strufe:

Provable Security for the Onion Routing and Mix Network Packet Format Sphinx. 755-783 - Tamir Tassa, Avishay Yanai:

The Multiple Millionaires' Problem: New Algorithmic Approaches and Protocols. 784-796 - Kilian Demuth

, Sebastian Linsner, Tom Biselli, Marc-André Kaufhold, Christian Reuter:
Support Personas: A Concept for Tailored Support of Users of Privacy-Enhancing Technologies. 797-817 - Yixin Wu, Xinlei He, Pascal Berrang, Mathias Humbert, Michael Backes, Neil Zhenqiang Gong, Yang Zhang:

Link Stealing Attacks Against Inductive Graph Neural Networks. 818-839 - Xun Yuan, Yang Yang, Prosanta Gope, Aryan Mohammadi Pasikhani, Biplab Sikdar:

VFLGAN: Vertical Federated Learning-based Generative Adversarial Network for Vertically Partitioned Data Publication. 840-858 - Denis Obrezkov:

Privacy Protection Behaviors from a New Angle: Exploratory Analysis on a Russian Sample. 859-871 - Yasha Iravantchi, Thomas Krolikowski, William Wang, Kang G. Shin, Alanson P. Sample:

PrivacyLens: On-Device PII Removal from RGB Images using Thermally-Enhanced Sensing. 872-891 - Minjun Long, David Evans:

Evaluating Google's Protected Audience Protocol. 892-906 - Rune Fiedler, Christian Janson:

A Deniability Analysis of Signal's Initial Handshake PQXDH. 907-928 - Francisco Caravaca

, José González Cabañas, Ángel Cuevas, Rubén Cuevas:
Overprofiling Analysis on Major Internet Players. 929-946 - Pascal Berrang, Paul Gerhart, Dominique Schröder:

Measuring Conditional Anonymity - A Global Study. 947-966

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














