Abstract is missing.
- Classification of Encrypted IoT Traffic despite Padding and ShapingAviv Engelberg, Avishai Wool. 1-13 [doi]
- Splitting Hairs and Network Traces: Improved Attacks Against Traffic Splitting as a Website Fingerprinting DefenseMatthias Beckerle, Jonathan Magnusson, Tobias Pulls. 15-27 [doi]
- Padding-only Defenses Add Delay in TorEthan Witwer, James K. Holland, Nicholas Hopper. 29-33 [doi]
- Sauteed Onions: Transparent Associations from Domain Names to Onion AddressesRasmus Dahlberg, Paul Syverson, Linus Nordberg, Matthew Finkel. 35-40 [doi]
- Fisher Information as a Utility Metric for Frequency Estimation under Local Differential PrivacyMilan Lopuhaä-Zwakenberg, Boris Skoric, Ninghui Li. 41-53 [doi]
- PRSONA: Private Reputation Supporting Ongoing Network AvatarsStan Gurtler, Ian Goldberg. 55-68 [doi]
- Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement AgenciesAmos Treiber, Dirk Müllmann, Thomas Schneider 0003, Indra Spiecker genannt Döhmann. 69-82 [doi]
- Secure Maximum Weight Matching Approximation on General GraphsAndreas Brüggemann, Malte Breuer, Andreas Klinger, Thomas Schneider 0003, Ulrike Meyer. 83-87 [doi]
- Is Your Policy Compliant?: A Deep Learning-based Empirical Study of Privacy Policies' Compliance with GDPRTamjid Al Rahat, Minjun Long, Yuan Tian 0001. 89-102 [doi]
- Darwin's Theory of Censorship: Analysing the Evolution of Censored Topics with Dynamic Topic ModelsAsim Waheed, Sara Qunaibi, Diogo Barradas, Zachary Weinberg. 103-108 [doi]
- A Study of Users' Privacy Preferences for Data Sharing on Symptoms-Tracking/Health AppHafiz Salman Asif, Jaideep Vaidya. 109-113 [doi]
- UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks against Split LearningEge Erdogan, Alptekin Küpçü, A. Ercüment Çiçek. 115-124 [doi]
- SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split LearningEge Erdogan, Alptekin Küpçü, A. Ercüment Çiçek. 125-137 [doi]
- Adversarial Detection of Censorship MeasurementsAbderrahmen Amich, Birhanu Eshete, Vinod Yegneswaran. 139-143 [doi]
- Fingerprinting and Personal Information Leakage from Touchscreen InteractionsMartin Georgiev, Simon Eberz, Ivan Martinovic. 145-157 [doi]
- Privacy and Security Evaluation of Mobile Payment Applications Through User-Generated ReviewsUrvashi Kishnani, Naheem Noah, Sanchari Das, Rinku Dewri. 159-173 [doi]
- Casing the Vault: Security Analysis of Vault ApplicationsMargie Ruffin, Israel Lopez-Toldeo, Kirill Levchenko, Gang Wang. 175-180 [doi]
- Tracking the Evolution of Cookie-based Tracking on FacebookYana Dimova, Gertjan Franken, Victor Le Pochat, Wouter Joosen, Lieven Desmet. 181-196 [doi]
- All Eyes On Me: Inside Third Party Trackers' Exfiltration of PHI from Healthcare Providers' Online SystemsMingjia Huo, Maxwell Bland, Kirill Levchenko. 197-211 [doi]
- Your Consent Is Worth 75 Euros A Year - Measurement and Lawfulness of Cookie PaywallsVictor Morel, Cristiana Santos, Yvonne Lintao, Soheil Human. 213-218 [doi]