Automated Experiments on Ad Privacy Settings
[PDF] Amit Datta (Carnegie Mellon University), Michael Carl Tschantz (International Computer Science Institute), Anupam Datta (Carnegie Mellon University)
Issue 2
Editors’ Introduction Apu Kapadia (Indiana University Bloomington), Steven J. Murdoch (University College London)
DP5: A Private Presence Service
[PDF] Nikita Borisov (University of Illinois at Urbana-Champaign), George Danezis (University College London), Ian Goldberg (University of Waterloo)
A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing
[PDF] Ghada Arfaoui (Orange Labs, F-14066 Caen, INSA Centre Val de Loire, F-18020 Bourges, France), Jean-François Lalande (INSA Centre Val de Loire - Inria, F-18020 Bourges), Jacques Traoré (Orange Labs, F-14066 Caen, France), Nicolas Desmoulins (Orange Labs, F-14066 Caen, France), Pascal Berthomé (INSA Centre Val de Loire, F-18020 Bourges, France), Saïd Gharout (Orange Labs, F-92130 Issy-les-moulineaux, France)
Blocking-resistant communication through domain fronting
[PDF] David Fifield (University of California, Berkeley), Chang Lan (University of California, Berkeley), Rod Hynes (Psiphon Inc), Percy Wegmann (Brave New Software), Vern Paxson (University of California, Berkeley and the International Computer Science Institute)
Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists
[PDF] Erik-Oliver Blass (Airbus Group Innovations, 81663 Munich, Germany), Travis Mayberry (Center for Cyber Security Studies, US Naval Academy, Annapolis MD21402, USA), Guevara Noubir (College of Computer and Information Science, Northeastern University, Boston MA-02115, USA)
Recursive Trees for Practical ORAM
[PDF] Tarik Moataz (Dept. of Computer Science, Colorado State University, Fort Collins, CO , and IMT, Telecom Bretagne, France), Erik-Oliver Blass (Airbus Group Innovations, 81663 Munich, Germany), Guevara Noubir (College of Computer and Information Science, Northeastern University, Boston, MA)
Toward Mending Two Nation-Scale Brokered Identification Systems
[PDF] Luís T. A. N. Brandão (Carnegie Mellon University & University of Lisbon), Nicolas Christin (Carnegie Mellon University), George Danezis (University College London), Anonymous (06ac01f8898481dd 2acdaacbe7cea1fd 5cdec8e65fe87db5 8605e865b1860f8e (SHA256 commitment))
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction
[PDF] Joshua Juen (University of Illinois at Urbana-Champaignl), Aaron Johnson (Naval Research Laboratory), Anupam Das (University of Illinois at Urbana-Champaign), Nikita Borisov (University of Illinois at Urbana-Champaign), Matthew Caesar (University of Illinois at Urbana-Champaign)
Optimal Rate Private Information Retrieval from Homomorphic Encryption
[PDF] Aggelos Kiayias (National and Kapodistrian University of Athens, Greece), Nikos Leonardos (Université Paris Diderot – Paris 7, France), Helger Lipmaa (University of Tartu, Estonia), Kateryna Pavlyk (University of Tartu, Estonia), Qiang Tang (University of Connecticut, USA)