About 1,760 results
Open links in new tab
  1. PoPETs Proceedings — Volume 2017 - petsymposium.org

    Volume 2017 Issue 1 Editors’ Introduction Claudia Diaz (KU Leuven), Rachel Greenstadt (Drexel University), Damon McCoy (New York University) Generic Adaptively Secure Searchable Phrase …

  2. Fingerprinting Keywords in Search Queries over Tor

    Fingerprinting Keywords in Search Queries over Tor Authors: Se Eun Oh (University of Minnesota), Shuai Li (University of Minnesota), Nicholas Hopper (University of Minnesota) Volume: 2017 Issue: 4 …

  3. TagIt: Tagging Network Flows using Blind Fingerprints

    Volume: 2017 Issue: 4 Pages: 290–307 DOI: https://doi.org/10.1515/popets-2017-0050 Download PDF Abstract: Flow fingerprinting is a mechanism for linking obfuscated network flows at large scale. In …

  4. PoPETs Proceedings — ErasuCrypto: A Light-weight Secure Data …

    Volume: 2017 Issue: 1 Pages: 132–148 DOI: Download PDF Abstract: Securely deleting invalid data from secondary storage is critical to protect users’ data privacy against unauthorized accesses. …

  5. DOI 10.1515/popets-2017-0048 Over the past decade, researchers have applied vari-Received 2017-02-28; revised 2017-06-01; accepted 2017-06-02. ous machine learning techniques to features …

  6. Proceedings on Privacy Enhancing Technologies ; 2017 (2):74–94 Aaron Johnson*, Rob Jansen, Nicholas Hopper, Aaron Segal, and Paul Syverson

  7. Website Fingerprinting Defenses at the Application Layer

    Volume: 2017 Issue: 2 Pages: 186–203 DOI: Download PDF Abstract: Website Fingerprinting (WF) allows a passive network adversary to learn the websites that a client visits by analyzing traffic …

  8. Proceedings on Privacy Enhancing Technologies ; 2017 (4):290–307 Fatemeh Rezaei* and Amir Houmansadr

  9. Horn of Africa-based governments, also examining settings and software on their computers and phones. Our engagement illuminates the Keywords: privacy, human rights, surveillance DOI …

  10. PoPETs Proceedings — Private Set Intersection for Unequal Set Sizes ...

    Volume: 2017 Issue: 4 Pages: 177–197 DOI: https://doi.org/10.1515/popets-2017-0044 Download PDF Abstract: Private set intersection (PSI) is a cryptographic technique that is applicable to many …