About 45,400 results
Open links in new tab
  1. Privacy Enhancing Technologies Symposium 2017

    PETS 2017 The 17th Privacy Enhancing Technologies Symposium July 18 – 21, 2017 Minneapolis, USA Read our statement on the US travel ban. @PET_Symposium The annual Privacy Enhancing …

  2. TagIt: Tagging Network Flows using Blind Fingerprints

    Volume: 2017 Issue: 4 Pages: 290–307 DOI: https://doi.org/10.1515/popets-2017-0050 Download PDF Abstract: Flow fingerprinting is a mechanism for linking obfuscated network flows at large scale. In …

  3. Proceedings on Privacy Enhancing Technologies ; 2017 (2):186–203 Giovanni Cherubin*, Jamie Hayes*, and Marc Juarez*

  4. SeaGlass: Enabling City-Wide IMSI-Catcher Detection

    Volume: 2017 Issue: 3 Pages: 39–56 DOI: https://doi.org/10.1515/popets-2017-0027 Download PDF Abstract: Cell-site simulators, also known as IMSIcatchers and stingrays, are used around the world …

  5. PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer

    Pages: 100–117 DOI: https://doi.org/10.1515/popets-2017-0007 Download PDF Abstract: We identify two vulnerabilities for existing highspeed network-layer anonymity protocols, such as LAP and …

  6. Proceedings on Privacy Enhancing Technologies ; 2017 (2):133–148 Justin Brookman, Phoebe Rouge, Aaron Alva, and Christina Yeung

  7. Cross-Device Tracking: Measurement and Disclosures

    Volume: 2017 Issue: 2 Pages: 133–148 DOI: https://doi.org/10.1515/popets-2017-0020 Download PDF Abstract: Internet advertising and analytics technology companies are increasingly trying to find ways …

  8. Website Fingerprinting Defenses at the Application Layer

    Volume: 2017 Issue: 2 Pages: 186–203 DOI: Download PDF Abstract: Website Fingerprinting (WF) allows a passive network adversary to learn the websites that a client visits by analyzing traffic …

  9. What Does The Crowd Say About You? Evaluating Aggregation-based ...

    What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy Authors: Apostolos Pyrgelis (University College London), Carmela Troncoso (IMDEA Software Institute), …

  10. Keywords: Censorship Circumvention, Traffic Analysis, Traffic Encapsulation, Video Stream Synthesis DOI 10.1515/popets-2017-0037 Received 2017-02-28; revised 2017-06-01; accepted 2017-06-02.