About 2,290 results
Open links in new tab
  1. SeaGlass: Enabling City-Wide IMSI-Catcher Detection

    Volume: 2017 Issue: 3 Pages: 39–56 DOI: https://doi.org/10.1515/popets-2017-0027 Download PDF Abstract: Cell-site simulators, also known as IMSIcatchers and stingrays, are used …

  2. PoPETs Proceedings — Cross-Cultural Privacy Prediction

    Volume: 2017 Issue: 2 Pages: 113–132 DOI: https://doi.org/10.1515/popets-2017-0019 Download PDF Abstract: The influence of cultural background on people’s privacy decisions is widely …

  3. Proceedings on Privacy Enhancing Technologies ; 2017 (3):39–56 Peter Ney*, Ian Smith*, Gabriel Cadamuro, and Tadayoshi Kohno

  4. Are you The One to Share? Secret Transfer with Access Structure

    Volume: 2017 Issue: 1 Pages: 149–169 DOI: https://doi.org/10.1515/popets-2017-0010 Download PDF Abstract: Sharing information to others is common nowadays, but the question is with …

  5. TagIt: Tagging Network Flows using Blind Fingerprints

    Volume: 2017 Issue: 4 Pages: 290–307 DOI: https://doi.org/10.1515/popets-2017-0050 Download PDF Abstract: Flow fingerprinting is a mechanism for linking obfuscated network flows at large …

  6. Proceedings on Privacy Enhancing Technologies ; 2017 (4):23–76 Peeter Laud*, Alisa Pankova, and Roman Jagomägis

  7. PoPETs Proceedings — Private Set Intersection for Unequal Set …

    Volume: 2017 Issue: 4 Pages: 177–197 DOI: https://doi.org/10.1515/popets-2017-0044 Download PDF Abstract: Private set intersection (PSI) is a cryptographic technique that is applicable to …

  8. Keywords: SSD, secure deletion, cost optimization DOI 10.1515/popets-2017-0009 Received 2016-05-31; revised 2016-09-01; accepted 2016-09-02.

  9. A Leakage-Abuse Attack Against Multi-User Searchable Encryption

    Volume: 2017 Issue: 3 Pages: 168–178 DOI: https://doi.org/10.1515/popets-2017-0034 Download PDF Abstract: Searchable Encryption (SE) allows a user to upload data to the cloud and to …

  10. PoPETs Proceedings — ErasuCrypto: A Light-weight Secure Data …

    Volume: 2017 Issue: 1 Pages: 132–148 DOI: Download PDF Abstract: Securely deleting invalid data from secondary storage is critical to protect users’ data privacy against unauthorized …