{"title":"Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications","authors":"Simon Oya, C. Troncoso, F. Pérez-González","doi":"10.1007/978-3-319-08506-7_11","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_11","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115444430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stefanie Roos, Benjamin Schiller, Stefan Hacker, T. Strufe
{"title":"Measuring Freenet in the Wild: Censorship-Resilience under Observation","authors":"Stefanie Roos, Benjamin Schiller, Stefan Hacker, T. Strufe","doi":"10.1007/978-3-319-08506-7_14","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_14","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131374108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploiting Delay Patterns for User IPs Identification in Cellular Networks","authors":"V. Perta, M. Barbera, A. Mei","doi":"10.1007/978-3-319-08506-7_12","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_12","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114293710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency","authors":"Casey Devet, I. Goldberg","doi":"10.1007/978-3-319-08506-7_4","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_4","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122954130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CloudTransport: Using Cloud Storage for Censorship-Resistant Networking","authors":"Chad Brubaker, A. Houmansadr, Vitaly Shmatikov","doi":"10.1007/978-3-319-08506-7_1","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_1","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126976272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alexandra Olteanu, Kévin Huguenin, R. Shokri, J. Hubaux
{"title":"Quantifying the Effect of Co-location Information on Location Privacy","authors":"Alexandra Olteanu, Kévin Huguenin, R. Shokri, J. Hubaux","doi":"10.1007/978-3-319-08506-7_10","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_10","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129652466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Effectiveness of Obfuscation Techniques in Online Social Networks","authors":"Terence Chen, R. Boreli, M. Kâafar, Arik Friedman","doi":"10.1007/978-3-319-08506-7_3","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_3","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125041355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Why Doesn't Jane Protect Her Privacy?","authors":"K. Renaud, M. Volkamer, Arne Renkema-Padmos","doi":"10.1007/978-3-319-08506-7_13","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_13","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116535294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social Status and the Demand for Security and Privacy","authors":"Jens Grossklags, Nigel J. Barradale","doi":"10.1007/978-3-319-08506-7_5","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_5","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132631563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"I Know What You're Buying: Privacy Breaches on eBay","authors":"Tehila Minkus, K. Ross","doi":"10.1007/978-3-319-08506-7_9","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_9","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"89 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129060662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}