About 3 results
Open links in new tab
  1. PoPETs Proceedings — Volume 2016 - petsymposium.org

    Volume 2016 Issue 1 Editor’s Introduction Apu Kapadia (Indiana University Bloomington) Fingerprinting Mobile Devices Using Personalized Configurations [PDF]

  2. Flying Eyes and Hidden Controllers: A Qualitative Study of People’s ...

    Volume: 2016 Issue: 3 Pages: 172–190 DOI: https://doi.org/10.1515/popets-2016-0022 Download PDF Abstract: Drones are unmanned aircraft controlled remotely or operated autonomously. While the …

  3. Proceedings on Privacy Enhancing Technologies ; 2016 (3):172–190 Yang Wang*, Huichuan Xia, Yaxing Yao, and Yun Huang

  4. On Realistically Attacking Tor with Website Fingerprinting

    Volume: 2016 Issue: 4 Pages: 21–36 DOI: Download PDF Abstract: Website fingerprinting allows a local, passive observer monitoring a web-browsing client’s encrypted channel to determine her web …

  5. Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark …

    Volume: 2016 Issue: 4 Pages: 237–254 DOI: https://doi.org/10.1515/popets-2016-0038 Download PDF Abstract: Privacy strategies and privacy patterns are fundamental concepts of the privacy-by-design …

  6. PoPETs Proceedings — Riffle - petsymposium.org

    Volume: 2016 Issue: 2 Pages: 115–134 DOI: https://doi.org/10.1515/popets-2016-0008 Download PDF Abstract: Existing anonymity systems sacrifice anonymity for efficient communication or vice-versa. …

  7. Proceedings on Privacy Enhancing Technologies ; 2016 (4):21–36 Tao Wang* and Ian Goldberg

  8. PoPETs Proceedings — (Do Not) Track Me Sometimes: Users’ …

    Volume: 2016 Issue: 2 Pages: 135–154 DOI: Download PDF Abstract: Online trackers compile profiles on users for targeting ads, customizing websites, and selling users’ information.

  9. PoPETs Proceedings — Building a RAPPOR with the Unknown: Privacy ...

    Volume: 2016 Issue: 3 Pages: 41–61 DOI: https://doi.org/10.1515/popets-2016-0015 Download PDF Abstract: Techniques based on randomized response enable the collection of potentially sensitive …

  10. Proceedings on Privacy Enhancing Technologies ; 2016 (4):237–254 Christoph Bösch*, Benjamin Erb, Frank Kargl, Henning Kopp, and Stefan Pfattheicher