PETS 2014 July 16, 2014 to July 18, 2014, Amsterdam,Netherlands

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Privacy in a Mobile World Dali Kaafar N/A
Exploiting Delay Patterns for User IPs Identification in Cellular Networks Alessandro Mei , Vasile Claudiu Perta , Marco Valerio Barbera N/A
Quantifying the Effect of Co-location Information on Location Privacy Jean-pierre Hubaux , Alexandra-mihaela Olteanu , Kévin Huguenin , Reza Shokri N/A
Crypto & Differential Privacy Seny Kamara N/A
Forward-Secure Distributed Encryption Jaap-henk Hoepman , Klaus Kursawe , Wouter Lueks N/A
The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency Ian Goldberg , Casey Devet N/A
A Predictive Differentially-Private Mechanism for Mobility Traces Catuscia Palamidessi , Konstantinos Chatzikokolakis , Marco Stronati N/A
Users and Privacy Simone Fischer-huebner N/A
Social Status and the Demand for Security and Privacy Jens Grossklags , Nigel Barradale N/A IncludeThinkstScapes
Why Doesn't Jane Protect Her Privacy? Melanie Volkamer , Arne Renkema-padmos , Karen Renaud N/A
PETS Keynote Address Delphine Christin N/A
User Perceptions of Privacy Martin Ortlieb N/A
Attacks to Privacy Vitaly Shmatikov N/A
I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis J. D. Tygar , Brad Miller , Ling Huang , A. D. Joseph N/A
I Know What You're Buying: Privacy Breaches on eBay Tehila Minkus , Keith W. Ross N/A
C3P: Context-Aware Crowdsourced Cloud Privacy Karl Aberer , Hamza Harkous , Rameez Rahman N/A
Do dummies pay off? Limits of dummy traffic protection in anonymous communications Carmela Troncoso , Fernando Perez-gonzalez , Simon Oya N/A
On the Effectiveness of Obfuscation Techniques in Online Social Networks Mohamed Ali Kaafar , Arik Friedman , Roksana Boreli , Terence Chen N/A
Anonymity Paul Syverson N/A
Dovetail: Stronger Anonymity in Next-Generation Internet Routing Matthew Wright , Jody Sankey N/A
Spoiled Onions: Exposing Malicious Tor Exit Relays Philipp Winter , Martin Mulazzani , Edgar Weippl , Sebastian Schrittwieser , Markus Huber , Richard Köwer , Stefan Lindskog N/A IncludeThinkstScapes
Censorship Resistance Rob Jansen N/A
Measuring Freenet in the Wild: Censorship-resilience under Observation Thorsten Strufe , Stefanie Roos , Benjamin Schiller , Stefan Hacker N/A
CloudTransport: Using Cloud Storage for Censorship-Resistant Networking Vitaly Shmatikov , Amir Houmansadr , Chad Brubaker N/A
Anonymous Communications Carmela Troncoso N/A
One Fast Guard for Life (or 9 months) Roger Dingledine , Nick Mathewson , Nicholas Hopper , George Kadianakis N/A
From Onions to Shallots: Rewarding Tor Relays with TEARS Rob Jansen , Andrew Miller , Paul Ford N/A
A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays Bryan Ford , Rob Jansen , Mainak Ghosh , Miles Richardson N/A
Representing Network Trust and Using It to Improve Anonymous Communication Paul Syverson , Aaron Johnson , Joan Feigenbaum , Aaron D. Jaggard N/A
HotPETs Keynote Address George Danezis N/A
The Surveillance State William Binney N/A
Law and Policy Jens Grossklags N/A
The ABCs of ABCs – An Analysis of Attribute-Based Credentials in the Light of Data Protection, Privacy and Identity Jaap-henk Hoepman , Merel Koning , Gergely Alpar , Paulan Korenhof N/A
Loopholes for Circumventing the Constitution: Warrantless Surveillance on U.S. Persons by Collecting Network Traffic Abroad Sharon Goldberg , Axel M. Arnbak N/A
Building Effective Internet Freedom Tools: Needfinding with the Tibetan Exile Community Michael Brennan , Katey Metzroth , Roxann Stafford N/A
Crying Wolf? On the Price Discrimination of Online Airline Tickets Wouter Joosen , Nick Nikiforakis , Nataliia Bielova , Thomas Vissers N/A
Analysis of OpenX-Publishers Cooperation Claude Castelluccia , Lukasz Olejnik N/A
Measuring the Leakage of Onion at the Root, A measurement of Tor's .onion pseudo-top-level domain in the global domain name system Aziz Mohaisen , Matthew Thomas N/A
Miscellaneous Konstantinos Chatzikokolakis N/A
Blogs and Twitter Feeds: A Stylometric Environmental Impact Study Rachel Greenstadt , Rebekah Overdorf , Travis Dutko N/A
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin Aniket Kate , Pedro Moreno-sanchez , Tim Ruffing N/A