default search action
WPES@CCS 2017: Dallas, TX, USA
- Bhavani Thuraisingham, Adam J. Lee:
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30 - November 3, 2017. ACM 2017, ISBN 978-1-4503-5175-1
Session 1: Social Systems and Notifications
- Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby B. Lee:
Blind De-anonymization Attacks using Social Networks. 1-4 - Ania M. Piotrowska, Jamie Hayes, Nethanel Gelernter, George Danezis, Amir Herzberg:
AnNotify: A Private Notification Service. 5-15 - Raj Vardhan, Ameya Sanzgiri, Dattatraya Kulkarni, Piyush Joshi, Srikanth Nalluri:
Notify Assist: Balancing Privacy and Convenience in Delivery of Notifications on Android Smartphones. 17-20 - Daniela Becker, Jorge Guajardo, Karl-Heinz Zimmermann:
SOMAR: Privacy-Preserving SOcial Media Advertising ARchitecture. 21-30 - Michael Schliep, Ian Kariniemi, Nicholas Hopper:
Is Bob Sending Mixed Signals? 31-40
Session 2: Privacy Preservation
- Michael T. Goodrich:
BIOS ORAM: Improved Privacy-Preserving Data Access for Parameterized Outsourced Storage. 41-50 - Raphael R. Toledo, George Danezis, Isao Echizen:
Mix-ORAM: Using Delegated Shuffles. 51-61 - Jun Zhao:
Adaptive Statistical Learning with Bayesian Differential Privacy. 63-74 - Xin Chen, Heqing Huang, Sencun Zhu, Qing Li, Quanlong Guan:
SweetDroid: Toward a Context-Sensitive Privacy Policy Enforcement Framework for Android OS. 75-86
Session Privacy-Preserving Computation
- Xavier Carpent, Sky Faber, Tomas Sander, Gene Tsudik:
Private Set Projections & Variants. 87-98 - Shafi Goldwasser, Sunoo Park:
Public Accountability vs. Secret Laws: Can They Coexist?: A Cryptographic Proposal. 99-110 - Hiromi Arai, Keita Emura, Takuya Hayashi:
A Framework of Privacy Preserving Anomaly Detection: Providing Traceability without Big Brother. 111-122 - Stefan Wüller, Michael Vu, Ulrike Meyer, Susanne Wetzel:
Using Secure Graph Algorithms for the Privacy-Preserving Identification of Optimal Bartering Opportunities. 123-132
Session 4: Probing, Fingerprinting, and other Deanonymization
- Mario Frank, Tiffany Hwu, Sakshi Jain, Robert T. Knight, Ivan Martinovic, Prateek Mittal, Daniele Perito, Ivo Sluganovic, Dawn Song:
Using EEG-Based BCI Devices to Subliminally Probe for Private Information. 133-136 - Simon Oya, Carmela Troncoso, Fernando Pérez-González:
Is Geo-Indistinguishability What You Are Looking for? 137-140 - Aaron D. Jaggard, Paul Syverson:
Onions in the Crosshairs: When The Man really is out to get you. 141-151 - Paul Vines, Franziska Roesner, Tadayoshi Kohno:
Exploring ADINT: Using Ad Targeting for Surveillance on a Budget - or - How Alice Can Buy Ads to Track Bob. 153-164 - Andriy Panchenko, Asya Mitseva, Martin Henze, Fabian Lanze, Klaus Wehrle, Thomas Engel:
Analysis of Fingerprinting Techniques for Tor Hidden Services. 165-175
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.