Abstract is missing.
- Symmetric Disclosure: a Fresh Look at k-anonymityEwa J. Infeld. [doi]
- TRIST: Circumventing Censorship with Transcoding-Resistant Image SteganographyChristopher Connolly, Patrick Lincoln, Ian Mason, Vinod Yegneswaran. [doi]
- An Internet with BRICS Characteristics: Data Sovereignty and the Balkanisation of the InternetDana Polatin-Reuben, Joss Wright. [doi]
- Security Audit of Safeplug "Tor in a Box"Anne Edmundson, Anna Kornfeld Simpson, Joshua A. Kroll, Edward W. Felten. [doi]
- Counting Packets Sent Between Arbitrary Internet HostsJeffrey Knockel, Jedidiah R. Crandall. [doi]
- Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful SurveillanceAaron Segal, Bryan Ford, Joan Feigenbaum. [doi]
- ReClaim: a Privacy-Preserving Decentralized Social NetworkNiels Zeilemaker, Johan A. Pouwelse. [doi]
- Facade: High-Throughput, Deniable Censorship Circumvention Using Web SearchBen Jones, Sam Burnett, Nick Feamster, Sean P. Donovan, Sarthak Grover, Sathya Gunasekaran, Karim Habak. [doi]
- Towards a Comprehensive Picture of the Great Firewall's DNS Censorship [doi]
- Global Network Interference Detection Over the RIPE Atlas NetworkCollin Anderson, Philipp Winter, Roya. [doi]