Volume: 2016 Issue: 4 Pages: 237–254 DOI: https://doi.org/10.1515/popets-2016-0038 Download PDF Abstract: Privacy strategies and privacy patterns are fundamental concepts of the privacy-by-design engineering approach.
Volume: 2016 Issue: 4 Pages: 21–36 DOI: Download PDF Abstract: Website fingerprinting allows a local, passive observer monitoring a web-browsing client’s encrypted channel to determine her web activity. Previous attacks have shown that website fingerprinting could be a threat to anonymity networks such as Tor under laboratory conditions.
Volume: 2016 Issue: 2 Pages: 115–134 DOI: https://doi.org/10.1515/popets-2016-0008 Download PDF Abstract: Existing anonymity systems sacrifice anonymity for efficient communication or vice-versa. Onion-routing achieves low latency, high bandwidth, and scalable anonymous communication, but is susceptible to traffic analysis attacks.
Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way Authors: Tibor Jager (Ruhr-University Bochum), Andy Rupp (Karlsruhe Institute of Technology) Volume: 2016 Issue: 3 Pages: 62–82 DOI: https://doi.org/10.1515/popets-2016-0016 Download PDF
Volume: 2016 Issue: 4 Pages: 315–334 DOI: https://doi.org/10.1515/popets-2016-0042 Download PDF Abstract: The gathering of data about oneself (such as running speed, pulse, breathing rate, food consumption, etc.) is rapidly becoming more popular, and has lead to the catch phrase “Quantified Self” (QS).