researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
[-]
OR
AND
NOT
1
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
Filter by Tag
[+]
OR
AND
NOT
1
C++
Meta-Environment
access control
analysis
context-aware
data-flow
e-science
meta-model
meta-objects
open-source
protocol
routing
rule-based
rules
search
security
social
source-to-source
systematic-approach
tagging
Filter by Author
[+]
OR
AND
NOT
1
Aleecia M. McDonald
Bart Preneel
Blase Ur
Carmela Troncoso
Claudia Díaz
Florian Kerschbaum
Gene Tsudik
George Danezis
Ian Goldberg
Jan Camenisch
Jean-Pierre Hubaux
Joan Feigenbaum
Keith B. Frikken
Lorrie Faith Cranor
Marianne Winslett
Mikhail J. Atallah
Nicholas Hopper
Nikita Borisov
Philippe Golle
Ting Yu
Filter by Top terms
[+]
OR
AND
NOT
1
acm
analysis
anonymity
anonymous
data
electronic
information
location
preserving
privacy
private
proceedings
secure
security
social
society
usa
using
workshop
wpes
WPES (wpes)
Editions
Publications
Viewing Publication 1 - 100 from 414
2023
A Quantitative Information Flow Analysis of the Topics API
Mário S. Alvim
,
Natasha Fernandes
,
Annabelle McIver
,
Gabriel Henrique Nunes
.
wpes 2023
:
123-127
[doi]
The HandyTech's Coming Between 1 and 4: Privacy Opportunities and Challenges for the IoT Handyperson
Denise L. Anthony
,
Carl A. Gunter
,
Weijia He
,
Mounib Khanafer
,
Susan Landau
,
Ravindra Mangar
,
Nathan Reitinger
.
wpes 2023
:
129-134
[doi]
Zef: Low-latency, Scalable, Private Payments
Mathieu Baudet
,
Alberto Sonnino
,
Mahimna Kelkar
,
George Danezis
.
wpes 2023
:
1-16
[doi]
BAZAAR: Anonymous Resource Sharing
Christoph Coijanovic
,
Daniel Schadt
,
Christiane Weis
,
Thorsten Strufe
.
wpes 2023
:
135-139
[doi]
From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling
Yana Dimova
,
Mrunmayee Kode
,
Shirin Kalantari
,
Kim Wuyts
,
Wouter Joosen
,
Jan Tobias Mühlberg
.
wpes 2023
:
17-29
[doi]
UA-Radar: Exploring the Impact of User Agents on the Web
Jean Luc Intumwayase
,
Imane Fouad
,
Pierre Laperdrix
,
Romain Rouvoy
.
wpes 2023
:
31-43
[doi]
Client-specific Property Inference against Secure Aggregation in Federated Learning
Raouf Kerkouche
,
Gergely Ács
,
Mario Fritz
.
wpes 2023
:
45-60
[doi]
Comparing Privacy Labels of Applications in Android and iOS
Rishabh Khandelwal
,
Asmit Nayak
,
Paul Chung
,
Kassem Fawaz
.
wpes 2023
:
61-73
[doi]
Extending Browser Extension Fingerprinting to Mobile Devices
Brian Hyeongseok Kim
,
Muhammad Shujaat Mirza
,
Christina Pöpper
.
wpes 2023
:
141-146
[doi]
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, WPES 2023, Copenhagen, Denmark, 26 November 2023
Bart P. Knijnenburg
,
Panos Papadimitratos
, editors,
ACM,
2023.
[doi]
TIGER: Tor Traffic Generator for Realistic Experiments
Daniela Lopes
,
Daniel Castro
,
Diogo Barradas
,
Nuno Santos 0001
.
wpes 2023
:
147-152
[doi]
Legitimate Interest is the New Consent - Large-Scale Measurement and Legal Compliance of IAB Europe TCF Paywalls
Victor Morel
,
Cristiana Santos
,
Viktor Fredholm
,
Adam Thunberg
.
wpes 2023
:
153-158
[doi]
Impact Analysis of Organizational Structure of Group Companies on Privacy Policies
Keika Mori
,
Yuta Takata
,
Daiki Ito
,
Masaki Kamizono
,
Tatsuya Mori
.
wpes 2023
:
159-165
[doi]
Maybenot: A Framework for Traffic Analysis Defenses
Tobias Pulls
,
Ethan Witwer
.
wpes 2023
:
75-89
[doi]
Analysis of Google Ads Settings Over Time: Updated, Individualized, Accurate, and Filtered
Nathan Reitinger
,
Bruce Wen
,
Michelle L. Mazurek
,
Blase Ur
.
wpes 2023
:
167-172
[doi]
Unveiling the Impact of User-Agent Reduction and Client Hints: A Measurement Study
Asuman Senol
,
Gunes Acar
.
wpes 2023
:
91-106
[doi]
A First Look at Generating Website Fingerprinting Attacks via Neural Architecture Search
Prabhjot Singh
,
Shreya Arun Naik
,
Navid Malekghaini
,
Diogo Barradas
,
Noura Limam
.
wpes 2023
:
173-178
[doi]
Trends in Privacy Dialog Design after the GDPR: The Impact of Industry and Government Actions
Logan Warberg
,
Vincent Lefrere
,
Cristobal Cheyre
,
Alessandro Acquisti
.
wpes 2023
:
107-121
[doi]
2022
Adversarial Detection of Censorship Measurements
Abderrahmen Amich
,
Birhanu Eshete
,
Vinod Yegneswaran
.
wpes 2022
:
139-143
[doi]
A Study of Users' Privacy Preferences for Data Sharing on Symptoms-Tracking/Health App
Hafiz Salman Asif
,
Jaideep Vaidya
.
wpes 2022
:
109-113
[doi]
Splitting Hairs and Network Traces: Improved Attacks Against Traffic Splitting as a Website Fingerprinting Defense
Matthias Beckerle
,
Jonathan Magnusson
,
Tobias Pulls
.
wpes 2022
:
15-27
[doi]
Secure Maximum Weight Matching Approximation on General Graphs
Andreas Brüggemann
,
Malte Breuer
,
Andreas Klinger
,
Thomas Schneider 0003
,
Ulrike Meyer
.
wpes 2022
:
83-87
[doi]
Sauteed Onions: Transparent Associations from Domain Names to Onion Addresses
Rasmus Dahlberg
,
Paul Syverson
,
Linus Nordberg
,
Matthew Finkel
.
wpes 2022
:
35-40
[doi]
Tracking the Evolution of Cookie-based Tracking on Facebook
Yana Dimova
,
Gertjan Franken
,
Victor Le Pochat
,
Wouter Joosen
,
Lieven Desmet
.
wpes 2022
:
181-196
[doi]
Classification of Encrypted IoT Traffic despite Padding and Shaping
Aviv Engelberg
,
Avishai Wool
.
wpes 2022
:
1-13
[doi]
UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks against Split Learning
Ege Erdogan
,
Alptekin Küpçü
,
A. Ercüment Çiçek
.
wpes 2022
:
115-124
[doi]
SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning
Ege Erdogan
,
Alptekin Küpçü
,
A. Ercüment Çiçek
.
wpes 2022
:
125-137
[doi]
Fingerprinting and Personal Information Leakage from Touchscreen Interactions
Martin Georgiev
,
Simon Eberz
,
Ivan Martinovic
.
wpes 2022
:
145-157
[doi]
PRSONA: Private Reputation Supporting Ongoing Network Avatars
Stan Gurtler
,
Ian Goldberg
.
wpes 2022
:
55-68
[doi]
Proceedings of the 21st Workshop on Privacy in the Electronic Society, WPES2022, Los Angeles, CA, USA, 7 November 2022
Yuan Hong
,
Lingyu Wang 0001
, editors,
ACM,
2022.
[doi]
All Eyes On Me: Inside Third Party Trackers' Exfiltration of PHI from Healthcare Providers' Online Systems
Mingjia Huo
,
Maxwell Bland
,
Kirill Levchenko
.
wpes 2022
:
197-211
[doi]
Privacy and Security Evaluation of Mobile Payment Applications Through User-Generated Reviews
Urvashi Kishnani
,
Naheem Noah
,
Sanchari Das
,
Rinku Dewri
.
wpes 2022
:
159-173
[doi]
Fisher Information as a Utility Metric for Frequency Estimation under Local Differential Privacy
Milan Lopuhaä-Zwakenberg
,
Boris Skoric
,
Ninghui Li
.
wpes 2022
:
41-53
[doi]
Your Consent Is Worth 75 Euros A Year - Measurement and Lawfulness of Cookie Paywalls
Victor Morel
,
Cristiana Santos
,
Yvonne Lintao
,
Soheil Human
.
wpes 2022
:
213-218
[doi]
Is Your Policy Compliant?: A Deep Learning-based Empirical Study of Privacy Policies' Compliance with GDPR
Tamjid Al Rahat
,
Minjun Long
,
Yuan Tian 0001
.
wpes 2022
:
89-102
[doi]
Casing the Vault: Security Analysis of Vault Applications
Margie Ruffin
,
Israel Lopez-Toldeo
,
Kirill Levchenko
,
Gang Wang
.
wpes 2022
:
175-180
[doi]
Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies
Amos Treiber
,
Dirk Müllmann
,
Thomas Schneider 0003
,
Indra Spiecker genannt Döhmann
.
wpes 2022
:
69-82
[doi]
Darwin's Theory of Censorship: Analysing the Evolution of Censored Topics with Dynamic Topic Models
Asim Waheed
,
Sara Qunaibi
,
Diogo Barradas
,
Zachary Weinberg
.
wpes 2022
:
103-108
[doi]
Padding-only Defenses Add Delay in Tor
Ethan Witwer
,
James K. Holland
,
Nicholas Hopper
.
wpes 2022
:
29-33
[doi]
2021
The Elephant in the Background: A Quantitative Approachto Empower Users Against Web Browser Fingerprinting
Julian Fietkau 0002
,
Kashyap Thimmaraju
,
Felix Kybranz
,
Sebastian Neef
,
Jean-Pierre Seifert
.
wpes 2021
:
167-180
[doi]
WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, Virtual Event, Korea, 15 November 2021
ACM,
2021.
[doi]
From Secure to Military-Grade: Exploring the Effect of App Descriptions on User Perceptions of Secure Messaging
Omer Akgul
,
Ruba Abu-Salma
,
Wei Bai 0004
,
Elissa M. Redmiles
,
Michelle L. Mazurek
,
Blase Ur
.
wpes 2021
:
119-135
[doi]
TLDR: Deep Learning-Based Automated Privacy Policy Annotation with Key Policy Highlights
Abdulrahman Alabduljabbar
,
Ahmed Abusnaina
,
Ülkü Meteriz-Yildiran
,
David Mohaisen
.
wpes 2021
:
103-118
[doi]
Who's Most Targeted and Does My New Adblocker Really Help: A Profile-based Evaluation of Personalized Advertising
Sofia Bertmar
,
Johanna Gerhardsen
,
Alice Ekblad
,
Anna Höglund
,
Julia Mineur
,
Isabell Öknegård Enavall
,
Minh Ha Le
,
Niklas Carlsson
.
wpes 2021
:
245-249
[doi]
Private Data Exfiltration from Cyber-Physical Systems Using Channel State Information
Thomas Burton
,
Kasper Rasmussen
.
wpes 2021
:
223-235
[doi]
Fighting the Fog: Evaluating the Clarity of Privacy Disclosures in the Age of CCPA
Rex Chen
,
Fei Fang
,
Thomas B. Norton
,
Aleecia M. McDonald
,
Norman M. Sadeh
.
wpes 2021
:
73-102
[doi]
MiXiM: Mixnet Design Decisions and Empirical Evaluation
Iness Ben Guirat
,
Devashish Gosain
,
Claudia Diaz
.
wpes 2021
:
33-37
[doi]
What a SHAME: Smart Assistant Voice Command Fingerprinting Utilizing Deep Learning
Jack Hyland
,
Conrad Schneggenburger
,
Nick Lim
,
Jake Ruud
,
Nate Mathews
,
Matthew Wright 0001
.
wpes 2021
:
237-243
[doi]
Plausible Deniability for Anonymous Communication
Christiane Kuhn
,
Maximilian Noppel
,
Christian Wressnegger
,
Thorsten Strufe
.
wpes 2021
:
17-32
[doi]
OUStralopithecus: Overt User Simulation for Censorship Circumvention
Anna Harbluk Lorimer
,
Lindsey Tulloch
,
Cecylia Bocovich
,
Ian Goldberg
.
wpes 2021
:
137-150
[doi]
ZXAD: High-volume Attack Mitigation for Tor
Akshaya Mani
,
Ian Goldberg
.
wpes 2021
:
1-16
[doi]
Who Tracks the Trackers?: Circumventing Apple's Anti-Tracking Alerts in the Find My Network
Travis Mayberry
,
Ellis Fenske
,
Dane Brown
,
Jeremy Martin
,
Christine Fossaceca
,
Erik C. Rye
,
Sam Teplov
,
Lucas Foppe
.
wpes 2021
:
181-186
[doi]
Do You Feel a Chill?: Using PIR against Chilling Effects for Censorship-resistant Publishing
Miti Mazmudar
,
Stan Gurtler
,
Ian Goldberg
.
wpes 2021
:
53-57
[doi]
Empirical Analysis and Privacy Implications in OAuth-based Single Sign-On Systems
Srivathsan G. Morkonda
,
Sonia Chiasson
,
Paul C. van Oorschot
.
wpes 2021
:
195-208
[doi]
(Un)clear and (In)conspicuous: The Right to Opt-out of Sale under CCPA
Sean O'Connor
,
Ryan Nurwono
,
Aden Siebel
,
Eleanor Birrell
.
wpes 2021
:
59-72
[doi]
Studying the Anonymity Trilemma with a Discrete-event Mix Network Simulator
Ania M. Piotrowska
.
wpes 2021
:
39-44
[doi]
Cookie Banners, What's the Purpose?: Analyzing Cookie Banner Text Through a Legal Lens
Cristiana Santos
,
Arianna Rossi
,
Lorena Sánchez Chamorro
,
Kerstin Bongard-Blanchy
,
Ruba Abu-Salma
.
wpes 2021
:
187-194
[doi]
Attacks on Onion Discovery and Remedies via Self-Authenticating Traditional Addresses
Paul Syverson
,
Matthew Finkel
,
Saba Eskandarian
,
Dan Boneh
.
wpes 2021
:
45-52
[doi]
In-Depth Technical and Legal Analysis of Tracking on Health Related Websites with ERNIE Extension
Vera Wesselkamp
,
Imane Fouad
,
Cristiana Santos
,
Yanis Boussad
,
Nataliia Bielova
,
Arnaud Legout
.
wpes 2021
:
151-166
[doi]
SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic Signals
Ülkü Meteriz-Yildiran
,
Necip Fazil Yildiran
,
David Mohaisen
.
wpes 2021
:
209-221
[doi]
2020
A Privacy-Preserving Protocol for the Kidney Exchange Problem
Malte Breuer
,
Ulrike Meyer
,
Susanne Wetzel
,
Anja Mühlfeld
.
wpes 2020
:
151-162
[doi]
Privacy in Crisis: Participants' Privacy Preferences for Health and Marketing Data during a Pandemic
Laura Calloway
,
Hilda Hadan
,
Shakthidhar Gopavaram
,
Shrirang Mare
,
L. Jean Camp
.
wpes 2020
:
181-189
[doi]
Proximity Tracing in an Ecosystem of Surveillance Capitalism
Paul-Olivier Dehaye
,
Joel Reardon
.
wpes 2020
:
191-203
[doi]
Randomness Concerns when Deploying Differential Privacy
Simson L. Garfinkel
,
Philip Leclerc
.
wpes 2020
:
73-86
[doi]
Poli-see: An Interactive Tool for Visualizing Privacy Policies
Wentao Guo
,
Jay Rodolitz
,
Eleanor Birrell
.
wpes 2020
:
57-71
[doi]
Where's Alice?: Applied Kid Crypto Meets Provable Security
Ryan Henry
,
Alyssa Tory
,
Sophie Henry
,
Isabella Henry
,
Samantha Henry
.
wpes 2020
:
117-121
[doi]
PRShare: A Framework for Privacy-Preserving, Interorganizational Data Sharing
Lihi Idan
,
Joan Feigenbaum
.
wpes 2020
:
137-149
[doi]
Privacy Preserving CTL Model Checking through Oblivious Graph Algorithms
Samuel Judson
,
Ning Luo
,
Timos Antonopoulos
,
Ruzica Piskac
.
wpes 2020
:
101-115
[doi]
SoK on Performance Bounds in Anonymous Communication
Christiane Kuhn
,
Friederike Kitzing
,
Thorsten Strufe
.
wpes 2020
:
21-39
[doi]
AnonFACES: Anonymizing Faces Adjusted to Constraints on Efficacy and Security
Minh Ha Le
,
Md Sakib Nizam Khan
,
Georgia Tsaloli
,
Niklas Carlsson
,
Sonja Buchegger
.
wpes 2020
:
87-100
[doi]
WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, Virtual Event, USA, November 9, 2020
Jay Ligatti
,
Xinming Ou
,
Wouter Lueks
,
Paul Syverson
, editors,
ACM,
2020.
[doi]
Improving Frequency Estimation under Local Differential Privacy
Milan Lopuhaä-Zwakenberg
,
Zitao Li
,
Boris Skoric
,
Ninghui Li
.
wpes 2020
:
123-135
[doi]
SoK: Three Facets of Privacy Policies
Victor Morel
,
Raúl Pardo
.
wpes 2020
:
41-56
[doi]
Strenghtening Content Security Policy via Monitoring and URL Parameters Filtering
Dolière Francis Somé
,
Tamara Rezk
.
wpes 2020
:
1-13
[doi]
Preserving Genomic Privacy via Selective Sharing
Emre Yilmaz
,
Erman Ayday
,
Tianxi Ji
,
Pan Li 0001
.
wpes 2020
:
163-179
[doi]
Standardizing and Implementing Do Not Sell
Sebastian Zimmeck
,
Kuba Alicki
.
wpes 2020
:
15-20
[doi]
2019
Ancile: Enhancing Privacy for Ubiquitous Computing with Use-Based Privacy
Eugene Bagdasaryan
,
Griffin Berlstein
,
Jason Waterman
,
Eleanor Birrell
,
Nate Foster
,
Fred B. Schneider
,
Deborah Estrin
.
wpes 2019
:
111-124
[doi]
There Are 10 Types of Vectors (and Polynomials): Efficient Zero-Knowledge Proofs of "One-Hotness" via Polynomials with One Zero
William Black
,
Ryan Henry
.
wpes 2019
:
37-49
[doi]
State of the Sandbox: Investigating macOS Application Security
Maximilian Blochberger
,
Jakob Rieck
,
Christian Burkert
,
Tobias Mueller
,
Hannes Federrath
.
wpes 2019
:
150-161
[doi]
Parking Tickets for Privacy-Preserving Pay-by-Phone Parking
Ricard Borges
,
Francesc Sebé
.
wpes 2019
:
130-134
[doi]
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, WPES@CCS 2019, London, UK, November 11, 2019
Lorenzo Cavallaro
,
Johannes Kinder
,
Thorsten Holz
, editors,
ACM,
2019.
[doi]
Balancing Security and Privacy in Genomic Range Queries
Xuhua Ding
,
Ercan Ozturk
,
Gene Tsudik
.
wpes 2019
:
106-110
[doi]
Private Set Intersection with Linear Communication from General Assumptions
Brett Hemenway Falk
,
Daniel Noble
,
Rafail Ostrovsky
.
wpes 2019
:
14-25
[doi]
DURASIFT: A Robust, Decentralized, Encrypted Database Supporting Private Searches with Complex Policy Controls
Brett Hemenway Falk
,
Steve Lu
,
Rafail Ostrovsky
.
wpes 2019
:
26-36
[doi]
Privacy Protection in Distributed Fingerprint-based Authentication
Swe Geng
,
Georgia Giannopoulou
,
Maëlle Kabir-Querrec
.
wpes 2019
:
125-129
[doi]
Digital-PASS: A Simulation-based Approach to Privacy Education
Kambiz Ghazinour
,
Ken Messner
,
Sean Scarnecchia
,
David Selinger
.
wpes 2019
:
162-174
[doi]
zksk: A Library for Composable Zero-Knowledge Proofs
Wouter Lueks
,
Bogdan Kulynych
,
Jules Fasquelle
,
Simon Le Bail-Collet
,
Carmela Troncoso
.
wpes 2019
:
50-54
[doi]
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting
Nikolay Matyunin
,
Yujue Wang
,
Tolga Arul
,
Kristian Kullmann
,
Jakub Szefer
,
Stefan Katzenbeisser 0001
.
wpes 2019
:
135-149
[doi]
How Much Does GenoGuard Really "Guard"?: An Empirical Analysis of Long-Term Security for Genomic Data
Bristena Oprisanu
,
Christophe Dessimoz
,
Emiliano De Cristofaro
.
wpes 2019
:
93-105
[doi]
Anatomy of Commercial IMSI Catchers and Detectors
Shinjo Park
,
Altaf Shaik
,
Ravishankar Borgaonkar
,
Jean-Pierre Seifert
.
wpes 2019
:
74-86
[doi]
Efficiently Stealing your Machine Learning Models
Robert Nikolai Reith
,
Thomas Schneider 0003
,
Oleksandr Tkachenko
.
wpes 2019
:
198-210
[doi]
When Certificate Transparency Is Too Transparent: Analyzing Information Leakage in HTTPS Domain Names
Richard Roberts
,
Dave Levin
.
wpes 2019
:
87-92
[doi]
Anonymity and Privacy in Bitcoin Escrow Trades
Farida Sabry
,
Wadha Labda
,
Aiman Erbad
,
Husam Al Jawaheri
,
Qutaibah M. Malluhi
.
wpes 2019
:
211-220
[doi]
End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability
Michael Schliep
,
Nicholas Hopper
.
wpes 2019
:
55-73
[doi]
Privacy-Preserving Multi-Party Access Control
Mina Sheikhalishahi
,
Gamze Tillem
,
Zekeriya Erkin
,
Nicola Zannone
.
wpes 2019
:
1-13
[doi]
Can Privacy Nudges be Tailored to Individuals' Decision Making and Personality Traits?
Logan Warberg
,
Alessandro Acquisti
,
Douglas C. Sicker
.
wpes 2019
:
175-197
[doi]
2018
Can You Find The One for Me?
Yongjun Zhao 0001
,
Sherman S. M. Chow
.
wpes 2018
:
54-65
[doi]
Enhancing and Evaluating Identity Privacy and Authentication Strength by Utilizing the Identity Ecosystem
Kai Chih Chang
,
Razieh Nokhbeh Zaeem
,
K. Suzanne Barber
.
wpes 2018
:
114-120
[doi]
Faster PCA and Linear Regression through Hypercubes in HElib
Deevashwer Rathee
,
Pradeep Kumar Mishra
,
Masaya Yasuda
.
wpes 2018
:
42-53
[doi]
Invisible Pixels Are Dead, Long Live Invisible Pixels!
Jukka Ruohonen
,
Ville Leppänen
.
wpes 2018
:
28-32
[doi]
Sign in
or
sign up
to see more results.