
PoPETs Proceedings — Volume 2016 - petsymposium.org
Volume 2016 Issue 1 Editor’s Introduction Apu Kapadia (Indiana University Bloomington) Fingerprinting Mobile Devices Using Personalized Configurations [PDF]
Proceedings on Privacy Enhancing Technologies ; 2016 (4):21–36 Tao Wang* and Ian Goldberg
Proceedings on Privacy Enhancing Technologies ; 2016 (4):219–236 John M. Schanck*, William Whyte, and Zhenfei Zhang
On Realistically Attacking Tor with Website Fingerprinting
Volume: 2016 Issue: 4 Pages: 21–36 DOI: Download PDF Abstract: Website fingerprinting allows a local, passive observer monitoring a web-browsing client’s encrypted channel to determine her web …
Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark …
Volume: 2016 Issue: 4 Pages: 237–254 DOI: https://doi.org/10.1515/popets-2016-0038 Download PDF Abstract: Privacy strategies and privacy patterns are fundamental concepts of the privacy-by-design …
PoPETs Proceedings — Riffle - petsymposium.org
Volume: 2016 Issue: 2 Pages: 115–134 DOI: https://doi.org/10.1515/popets-2016-0008 Download PDF Abstract: Existing anonymity systems sacrifice anonymity for efficient communication or vice-versa. …
Proceedings on Privacy Enhancing Technologies ; 2016 (4):237–254 Christoph Bösch*, Benjamin Erb, Frank Kargl, Henning Kopp, and Stefan Pfattheicher
Proceedings on Privacy Enhancing Technologies ; 2016 (4):276–293 Henry Tan, Micah Sherr, and Wenchao Zhou
PoPETs Proceedings — Black-Box Accumulation: Collecting Incentives …
Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way Authors: Tibor Jager (Ruhr-University Bochum), Andy Rupp (Karlsruhe Institute of Technology) Volume: 2016 Issue: 3 Pages: …
PoPETs Proceedings — DeNASA: Destination-Naive AS-Awareness in ...
Authors: Armon Barton (UT Arlington), Matthew Wright (UT Arlington) Volume: 2016 Issue: 4 Pages: 356–372 DOI: Download PDF Abstract: Prior approaches to AS-aware path selection in Tor do not …