Global web icon
petsymposium.org
https://petsymposium.org/popets/2016/
PoPETs Proceedings — Volume 2016 - petsymposium.org
Volume 2016 Issue 1 Editor’s Introduction Apu Kapadia (Indiana University Bloomington) Fingerprinting Mobile Devices Using Personalized Configurations [PDF]
Global web icon
petsymposium.org
https://petsymposium.org/popets/2016/popets-2016-0…
Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns
Volume: 2016 Issue: 4 Pages: 237–254 DOI: https://doi.org/10.1515/popets-2016-0038 Download PDF Abstract: Privacy strategies and privacy patterns are fundamental concepts of the privacy-by-design engineering approach.
Global web icon
petsymposium.org
https://petsymposium.org/popets/2016/popets-2016-0…
Christoph Bösch*, Benjamin Erb, Frank Kargl, Henning Kopp, and Stefan ...
Proceedings on Privacy Enhancing Technologies ; 2016 (4):237–254 Christoph Bösch*, Benjamin Erb, Frank Kargl, Henning Kopp, and Stefan Pfattheicher
Global web icon
petsymposium.org
https://petsymposium.org/popets/2016/popets-2016-0…
On Realistically Attacking Tor with Website Fingerprinting
Volume: 2016 Issue: 4 Pages: 21–36 DOI: Download PDF Abstract: Website fingerprinting allows a local, passive observer monitoring a web-browsing client’s encrypted channel to determine her web activity. Previous attacks have shown that website fingerprinting could be a threat to anonymity networks such as Tor under laboratory conditions.
Global web icon
petsymposium.org
https://petsymposium.org/popets/2016/popets-2016-0…
John M. Schanck*, William Whyte, and Zhenfei Zhang Circuit ...
Proceedings on Privacy Enhancing Technologies ; 2016 (4):219–236 John M. Schanck*, William Whyte, and Zhenfei Zhang
Global web icon
petsymposium.org
https://petsymposium.org/popets/2016/popets-2016-0…
PoPETs Proceedings — Riffle - petsymposium.org
Volume: 2016 Issue: 2 Pages: 115–134 DOI: https://doi.org/10.1515/popets-2016-0008 Download PDF Abstract: Existing anonymity systems sacrifice anonymity for efficient communication or vice-versa. Onion-routing achieves low latency, high bandwidth, and scalable anonymous communication, but is susceptible to traffic analysis attacks.
Global web icon
petsymposium.org
https://petsymposium.org/popets/2016/popets-2016-0…
On Realistically Attacking Tor with Website Fingerprinting
Proceedings on Privacy Enhancing Technologies ; 2016 (4):21–36 Tao Wang* and Ian Goldberg
Global web icon
petsymposium.org
https://petsymposium.org/popets/2016/popets-2016-0…
PoPETs Proceedings — Black-Box Accumulation: Collecting Incentives in a ...
Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way Authors: Tibor Jager (Ruhr-University Bochum), Andy Rupp (Karlsruhe Institute of Technology) Volume: 2016 Issue: 3 Pages: 62–82 DOI: https://doi.org/10.1515/popets-2016-0016 Download PDF
Global web icon
petsymposium.org
https://petsymposium.org/popets/2016/popets-2016-0…
Steven Hill*, Zhimin Zhou, Lawrence Saul, and Hovav Shacham Onthe(In ...
Proceedings on Privacy Enhancing Technologies ; 2016 (4):403–417 Steven Hill*, Zhimin Zhou, Lawrence Saul, and Hovav Shacham
Global web icon
petsymposium.org
https://petsymposium.org/popets/2016/popets-2016-0…
Privacy Challenges in the Quantified Self Movement – An EU Perspective
Volume: 2016 Issue: 4 Pages: 315–334 DOI: https://doi.org/10.1515/popets-2016-0042 Download PDF Abstract: The gathering of data about oneself (such as running speed, pulse, breathing rate, food consumption, etc.) is rapidly becoming more popular, and has lead to the catch phrase “Quantified Self” (QS).