Title |
Speakers |
Summary |
Topic Types |
Privacy in a Mobile World |
Dali Kaafar
|
N/A |
|
Exploiting Delay Patterns for User IPs Identification in Cellular Networks |
Alessandro Mei
,
Vasile Claudiu Perta
,
Marco Valerio Barbera
|
N/A |
|
Quantifying the Effect of Co-location Information on Location Privacy |
Jean-pierre Hubaux
,
Alexandra-mihaela Olteanu
,
Kévin Huguenin
,
Reza Shokri
|
N/A |
|
Crypto & Differential Privacy |
Seny Kamara
|
N/A |
|
Forward-Secure Distributed Encryption |
Jaap-henk Hoepman
,
Klaus Kursawe
,
Wouter Lueks
|
N/A |
|
The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency |
Ian Goldberg
,
Casey Devet
|
N/A |
|
A Predictive Differentially-Private Mechanism for Mobility Traces |
Catuscia Palamidessi
,
Konstantinos Chatzikokolakis
,
Marco Stronati
|
N/A |
|
Users and Privacy |
Simone Fischer-huebner
|
N/A |
|
Social Status and the Demand for Security and Privacy |
Jens Grossklags
,
Nigel Barradale
|
N/A |
IncludeThinkstScapes
|
Why Doesn't Jane Protect Her Privacy? |
Melanie Volkamer
,
Arne Renkema-padmos
,
Karen Renaud
|
N/A |
|
PETS Keynote Address |
Delphine Christin
|
N/A |
|
User Perceptions of Privacy |
Martin Ortlieb
|
N/A |
|
Attacks to Privacy |
Vitaly Shmatikov
|
N/A |
|
I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis |
J. D. Tygar
,
Brad Miller
,
Ling Huang
,
A. D. Joseph
|
N/A |
|
I Know What You're Buying: Privacy Breaches on eBay |
Tehila Minkus
,
Keith W. Ross
|
N/A |
|
C3P: Context-Aware Crowdsourced Cloud Privacy |
Karl Aberer
,
Hamza Harkous
,
Rameez Rahman
|
N/A |
|
Do dummies pay off? Limits of dummy traffic protection in anonymous communications |
Carmela Troncoso
,
Fernando Perez-gonzalez
,
Simon Oya
|
N/A |
|
On the Effectiveness of Obfuscation Techniques in Online Social Networks |
Mohamed Ali Kaafar
,
Arik Friedman
,
Roksana Boreli
,
Terence Chen
|
N/A |
|
Anonymity |
Paul Syverson
|
N/A |
|
Dovetail: Stronger Anonymity in Next-Generation Internet Routing |
Jody Sankey
,
Matthew Wright
|
N/A |
|
Spoiled Onions: Exposing Malicious Tor Exit Relays |
Philipp Winter
,
Martin Mulazzani
,
Edgar Weippl
,
Sebastian Schrittwieser
,
Markus Huber
,
Richard Köwer
,
Stefan Lindskog
|
N/A |
IncludeThinkstScapes
|
Censorship Resistance |
Rob Jansen
|
N/A |
|
Measuring Freenet in the Wild: Censorship-resilience under Observation |
Thorsten Strufe
,
Stefanie Roos
,
Benjamin Schiller
,
Stefan Hacker
|
N/A |
|
CloudTransport: Using Cloud Storage for Censorship-Resistant Networking |
Vitaly Shmatikov
,
Amir Houmansadr
,
Chad Brubaker
|
N/A |
|
Anonymous Communications |
Carmela Troncoso
|
N/A |
|
One Fast Guard for Life (or 9 months) |
Roger Dingledine
,
Nick Mathewson
,
Nicholas Hopper
,
George Kadianakis
|
N/A |
|
From Onions to Shallots: Rewarding Tor Relays with TEARS |
Rob Jansen
,
Andrew Miller
,
Paul Ford
|
N/A |
|
A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays |
Bryan Ford
,
Rob Jansen
,
Mainak Ghosh
,
Miles Richardson
|
N/A |
|
Representing Network Trust and Using It to Improve Anonymous Communication |
Paul Syverson
,
Aaron Johnson
,
Joan Feigenbaum
,
Aaron D. Jaggard
|
N/A |
|
HotPETs Keynote Address |
George Danezis
|
N/A |
|
The Surveillance State |
William Binney
|
N/A |
|
Law and Policy |
Jens Grossklags
|
N/A |
|
The ABCs of ABCs – An Analysis of Attribute-Based Credentials in the Light of Data Protection, Privacy and Identity |
Jaap-henk Hoepman
,
Merel Koning
,
Gergely Alpar
,
Paulan Korenhof
|
N/A |
|
Loopholes for Circumventing the Constitution: Warrantless Surveillance on U.S. Persons by Collecting Network Traffic Abroad |
Sharon Goldberg
,
Axel M. Arnbak
|
N/A |
|
Building Effective Internet Freedom Tools: Needfinding with the Tibetan Exile Community |
Michael Brennan
,
Katey Metzroth
,
Roxann Stafford
|
N/A |
|
Crying Wolf? On the Price Discrimination of Online Airline Tickets |
Wouter Joosen
,
Nick Nikiforakis
,
Nataliia Bielova
,
Thomas Vissers
|
N/A |
|
Analysis of OpenX-Publishers Cooperation |
Claude Castelluccia
,
Lukasz Olejnik
|
N/A |
|
Measuring the Leakage of Onion at the Root, A measurement of Tor's .onion pseudo-top-level domain in the global domain name system |
Aziz Mohaisen
,
Matthew Thomas
|
N/A |
|
Miscellaneous |
Konstantinos Chatzikokolakis
|
N/A |
|
Blogs and Twitter Feeds: A Stylometric Environmental Impact Study |
Rachel Greenstadt
,
Rebekah Overdorf
,
Travis Dutko
|
N/A |
|
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin |
Aniket Kate
,
Pedro Moreno-sanchez
,
Tim Ruffing
|
N/A |
|