2024-01-14 | Secure and Scalable Document Similarity on Distributed Databases | 15:25 | 0 | |
|
2024-01-14 | Secure Evaluation of Quantized Neural Networks | 21:04 | 0 | |
|
2024-01-14 | PETS 2020 Opening Remarks | 13:35 | 1 | |
|
2024-01-14 | Secure k ish Nearest Neighbors Classifier | 20:14 | 0 | |
|
2024-01-14 | Self Processing Sensor Data via Garbled Encryption | 16:04 | 0 | |
|
2024-01-14 | Pets without PETs on the under estimation of privacy concerns in pet wearables | 11:49 | 0 | |
|
2024-01-14 | Practical Privacy Preserving K means Clustering | 19:35 | 2 | |
|
2024-01-14 | SiegeBreaker An SDN Based Practical Decoy Routing System | 19:10 | 3 | |
|
2024-01-14 | PriFi Low Latency Anonymity for Organizational Networks | 18:02 | 8 | |
|
2024-01-13 | Yaxing Yao Flying Eyes and Hidden Controllers Privacy Perceptions of Drones | 14:27 | 2 | |
|
2024-01-13 | Sakshi Jain and Mobin Javed Towards Mining Latent Client Identifiers from Network Traffic | 13:33 | 2 | |
|
2024-01-13 | Samuel Grogan Access Denied Contrasting Data Access in the United States and Ireland | 12:22 | 1 | |
|
2024-01-13 | Marios Isaakidis Eclipse and Re Emergence of Anonymous P2P Storage Network Overlay Services | 15:51 | 0 | |
|
2024-01-13 | Sebastian Meiser Your Choice MATors Large scale Quantitative Anonymity Assessment | 15:10 | 0 | |
|
2024-01-13 | Micah Sherr Data plane Defenses against Routing Attacks on Tor | 17:07 | 4 | |
|
2024-01-13 | Shuai Li Mailet Instant Social Networking under Censorship | 14:12 | 1 | |
|
2024-01-13 | Micah Sherr Scalable and Anonymous Group Communication with MTor | 16:34 | 1 | |
|
2024-01-13 | Susan E McGregor Individual versus Organizational Computer Security Concerns in Journalism | 15:10 | 0 | |
|
2024-01-13 | Miro Enev Automobile Driver Fingerprinting | 15:34 | 3 | |
|
2024-01-13 | Pedro Moreno Sanchez Listening to Whispers of Ripple | 17:02 | 0 | |
|
2024-01-13 | Pedro Moreno Sanchez Whispers A Distributed Architecture | 15:41 | 0 | |
|
2024-01-13 | Raphael R Toledo Lower Cost epsilon Private Information Retrieval | 9:36 | 1 | Guide |
|
2024-01-13 | Rebekah Overdorf Blogs, Twitter Feeds, and Reddit Comments | 12:32 | 0 | Vlog |
|
2024-01-13 | Ryan Henry Polynomial Batch Codes for Efficient IT PIR | 17:19 | 3 | |
|
2024-01-13 | Richard McPherson CovertCast Using Live Streaming to Evade Internet Censorship | 12:40 | 2 | |
|
2024-01-13 | Riivo Talviste Students and Taxes a Privacy Preserving Social Study Using Secure Computation | 14:43 | 0 | |
|
2024-01-13 | Rinku Dewri Linking Health Records for Federated Query Processing | 15:56 | 1 | |
|
2024-01-13 | Tao Wang On Realistically Attacking Tor with Website Fingerprinting | 16:11 | 0 | |
|
2024-01-13 | Tariq Elahi A Framework for the Game theoretic Analysis of Censorship Resistance | 15:22 | 0 | |
|
2024-01-13 | Tariq Elahi SoK Making Sense of Censorship Resistance Systems | 15:41 | 0 | |
|
2024-01-13 | Tommaso Frassetto Selfrando Securing the Tor Browser against De anonymization Exploits | 14:38 | 0 | |
|
2024-01-13 | William Melicher Do Not Track Me Sometimes Users' Contextual Preferences for Web Tracking | 14:17 | 0 | |
|
2024-01-13 | Yaoqi Jia Anonymity in Peer assisted CDNs Inference Attacks and Mitigation | 14:59 | 0 | |
|
2024-01-13 | Oleskii Starov Are You Sure You Want to Contact Us | 15:00 | 0 | |
|
2024-01-13 | Ostap Orobets Highly Efficient Server Aided 2PC for Mobiles | 17:00 | 0 | |
|
2024-01-13 | Anh Pham PrivateRide A Privacy Enhanced Ride Hailing Service | 14:54 | 0 | |
|
2024-01-13 | Anrin Chakraborti DataLair Efficient Block Storage with Plausible Deniability | 15:00 | 0 | |
|
2024-01-13 | Apostolos Pyrgelis Evaluating Aggregation based Location Privacy | 16:43 | 2 | |
|
2024-01-13 | Jonathan Albright PETS Keynote Emotional Targeting and the Shaping of Social Discourse | 1:13:25 | 1 | |
|
2024-01-13 | Apu Kapadia To Permit or Not to Permit Crowdsourcing Mobile Apps’ Privacy | 16:24 | 0 | |
|
2024-01-13 | Muhammad Ikram Towards Seamless Tracking Free Web Improved Detection of Trackers | 15:59 | 5 | |
|
2024-01-13 | Wouter Lueks IRMA decentralized and privacy friendly identity management using smartphones | 14:26 | 2 | |
|
2024-01-13 | Zubair Shafiq Detecting Anti Ad blockers in the Wild | 17:05 | 0 | |
|
2024-01-13 | Paul Syverson Oft Target Tor adversary models that don't miss the mark | 17:14 | 0 | |
|
2024-01-13 | Yao Li Cross cultural Privacy Prediction | 13:55 | 0 | |
|
2024-01-13 | Cédric Van Rompay A Leakage Abuse Attack Against Multi User Searchable Encryption | 14:25 | 0 | |
|
2024-01-13 | Yousra Javed Look Before You Authorize Using Eye Tracking To Enforce User | 12:08 | 0 | |
|
2024-01-13 | Joshua Gancher Externally Verifiable Oblivious RAM YouTube | 15:13 | 0 | |
|
2024-01-13 | Chen Chen PHI a Path Hidden Lightweight Anonymity Protocol at Network Layer | 15:25 | 0 | |
|
2024-01-13 | Pedro Moreno Sanchez PathShuffle Credit Mixing and Anonymous Payments for Ripple | 15:43 | 0 | |
|
2024-01-13 | Justin Bookman Cross Device Tracking Measurement and Disclosures | 16:47 | 0 | |
|
2024-01-13 | Zachary A Kissel Generic Adaptively Secure Searchable Phrase Encryption | 13:11 | 0 | |
|
2024-01-13 | Daniel Demmler Privacy Preserving Interdomain Routing at Internet Scale | 14:50 | 0 | |
|
2024-01-13 | Zachary Weinberg Topics of Controversy An Empirical Analysis of Web Censorship Lists | 15:17 | 0 | |
|
2024-01-13 | Peter Ney and Ian Smith SeaGlass Enabling City Wide IMSI Catcher Detection | 14:50 | 1 | |
|
2024-01-13 | Kevin Corre Why Can't Users Choose Their Identity Providers On The Web | 13:31 | 1 | |
|
2024-01-13 | David Froelicher Unlynx A Decentralized System for Privacy Conscious Data Sharing | 15:06 | 0 | |
|
2024-01-13 | Konstantinos Chatzikokolakis Efficient utility improvement for location privacy | 16:21 | 1 | |
|
2024-01-13 | PETS Opening Remarks | 19:20 | 0 | |
|
2024-01-13 | Kovila P L Coopamootoo An Empirical Study of Privacy & Sharing Attitude | 12:28 | 0 | |
|
2024-01-13 | Diogo Barradas DeltaShaper Censorship resistant TCP Tunneling over Videoconferencing | 17:00 | 1 | |
|
2024-01-13 | Lachlan J Gunn Safety in Numbers Anonymization Makes Keyservers Trustworthy | 16:36 | 0 | |
|
2024-01-13 | Rinku Dewri Location Privacy for Rank based Geo Query Systems | 17:31 | 0 | |
|
2024-01-13 | Josh Aas HotPETs Keynote How We'll Encrypt the Web | 45:11 | 0 | |
|
2024-01-13 | Aaron Johnson PeerFlow Secure Load Balancing in Tor | 20:08 | 0 | |
|
2024-01-13 | Linda Lee A Usability Evaluation of Tor Launcher | 13:51 | 1 | |
|
2024-01-13 | Ruben Recabarren Hardening Stratum, the Bitcoin Pool Mining Protocol | 15:38 | 0 | |
|
2024-01-13 | M Sadegh Riazi Toward Practical Secure Stable Matching | 13:58 | 0 | |
|
2024-01-13 | Marc Juarez Website Fingerprinting Defenses at the Application Layer | 14:26 | 1 | |
|
2024-01-13 | Abdelaziz Alhadlaq Privacy in the Amazon Alexa Skills Ecosystem | 10:53 | 0 | |
|
2024-01-13 | Saba Eskandarian Certificate Transparency with Privacy | 12:48 | 0 | |
|
2024-01-13 | Adria Gascon Privacy Preserving Distributed Linear Regression on High Dimensional Data | 15:14 | 0 | |
|
2024-01-13 | Marios Isaakidis Systematizing Decentralization and Privacy | 15:43 | 1 | |
|
2024-01-13 | Se Eun Oh Identifying Keywords in Search Engine Queries over Tor | 14:53 | 0 | |
|
2024-01-13 | Agnes Kiss Private Set Intersection for Unequal Set Sizes with Mobile Applications | 15:45 | 0 | |
|
2024-01-13 | Dominik Schürmann Wiretapping End to End Encrypted VoIP Calls Real World Attacks on ZRTP | 15:31 | 0 | |
|
2024-01-13 | Matthew Wright A Wide Area Testbed for Tor | 10:54 | 1 | |
|
2024-01-13 | Spyros Boukoros Two Is Not Enough Privacy Assessment of Aggregation Schemes in Smart Metering | 13:39 | 1 | |
|
2024-01-13 | Alexandra Dmitrienko Phonion Practical Protection of Metadata in Telephony Networks | 15:50 | 1 | |
|
2024-01-13 | Michael Reiter Personalized Pseudonyms for Servers in the Cloud | 18:11 | 0 | |
|
2024-01-13 | Fatemeh Rezaei TagIt Tagging Network Flows using Blind Fingerprints | 12:52 | 0 | |
|
2024-01-13 | Steven Englehardt Battery Status Not Included Assessing Privacy in Web Standards | 12:53 | 1 | |
|
2024-01-13 | Alisa Pankova Preprocessing Based Verification of Multiparty Protocols with Honest Majority | 14:53 | 0 | |
|
2024-01-13 | Florentin Rochet Waterfilling Balancing the Tor network with maximum diversity | 13:14 | 0 | |
|
2024-01-13 | Mojtaba Eskandari Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps | 13:35 | 2 | |
|
2024-01-13 | Takao Murakami Expectation Maximization Tensor Factorization for Location Privacy Attacks | 16:17 | 0 | |
|
2024-01-13 | Giovanni Cherubin Bayes, not Naïve Security Bounds on Website Fingerprinting Defenses | 15:27 | 0 | |
|
2024-01-13 | Vasilios Mavroudis On the Privacy and Security of the Ultrasound Ecosystem | 16:43 | 1 | |
|
2024-01-13 | Hadi Asghari The Right of Access as a tool for Privacy Governance | 15:18 | 0 | |
|
2024-01-13 | Wendi Diao Vulnerable GPU Memory Management Towards Recovering Raw Data from GPU | 14:28 | 0 | |
|
2024-01-13 | Henry Birge Lee Using BGP to Acquire Bogus TLS Certificates | 16:20 | 1 | |
|
2024-01-13 | William Marczak Social Engineering Attacks on Government Opponents | 15:57 | 1 | |
|
2024-01-13 | Hoda Aghaei Khouzani ErasuCrypto A Light weight Secure Data Deletion Scheme for Solid State SSDs | 14:39 | 0 | |
|
2024-01-13 | HotPETs Opening Remarks | 5:26 | 0 | |
|
2024-01-13 | Hung Dang Privacy preserving computation with trusted computing via Scramble then Compute | 13:29 | 0 | |
|
2024-01-13 | Jack Grigg I2P Open Research Questions about I2P | 14:45 | 1 | |
|
2024-01-13 | Jeremy Martin A Study of MAC Address Randomization in Mobile Devices and When it Fails | 15:06 | 1 | |
|
2024-01-13 | Jesse Victors The Onion Name System Tor powered Decentralized DNS for Tor Onion Services | 16:15 | 1 | |
|
2024-01-13 | Jian Liu Are you The One to Share Secret Transfer with Access Structure | 11:27 | 3 | |
|
2024-01-11 | Evaluating a password manager Evan Johnson | 31:25 | 7 | |
|