
PoPETs Proceedings — A Study of MAC Address Randomization in …
Volume: 2017 Issue: 4 Pages: 365–383 DOI: https://doi.org/10.1515/popets-2017-0054 Download PDF Abstract: Media Access Control (MAC) address randomization is a privacy technique …
TagIt: Tagging Network Flows using Blind Fingerprints
Volume: 2017 Issue: 4 Pages: 290–307 DOI: https://doi.org/10.1515/popets-2017-0050 Download PDF Abstract: Flow fingerprinting is a mechanism for linking obfuscated network flows at large …
PoPETs Proceedings — Private Set Intersection for Unequal Set …
Volume: 2017 Issue: 4 Pages: 177–197 DOI: https://doi.org/10.1515/popets-2017-0044 Download PDF Abstract: Private set intersection (PSI) is a cryptographic technique that is applicable to …
PoPETs Proceedings — Towards Seamless Tracking-Free Web: …
Volume: 2017 Issue: 1 Pages: 79–99 DOI: Download PDF Abstract: Numerous tools have been developed to aggressively block the execution of popular JavaScript programs in Web …
Keywords: SSD, secure deletion, cost optimization DOI 10.1515/popets-2017-0009 Received 2016-05-31; revised 2016-09-01; accepted 2016-09-02.
On the Privacy and Security of the Ultrasound Ecosystem
Volume: 2017 Issue: 2 Pages: 95–112 DOI: Download PDF Abstract: Nowadays users often possess a variety of electronic devices for communication and entertainment. In particular, …
Keywords: Censorship Circumvention, Traffic Analysis, Traffic Encapsulation, Video Stream Synthesis DOI 10.1515/popets-2017-0037 Received 2017-02-28; revised 2017-06-01; …
PoPETs Proceedings — Cross-Cultural Privacy Prediction
Volume: 2017 Issue: 2 Pages: 113–132 DOI: https://doi.org/10.1515/popets-2017-0019 Download PDF Abstract: The influence of cultural background on people’s privacy decisions is widely …
SeaGlass: Enabling City-Wide IMSI-Catcher Detection
Volume: 2017 Issue: 3 Pages: 39–56 DOI: https://doi.org/10.1515/popets-2017-0027 Download PDF Abstract: Cell-site simulators, also known as IMSIcatchers and stingrays, are used …
PoPETs Proceedings — ErasuCrypto: A Light-weight Secure Data …
Volume: 2017 Issue: 1 Pages: 132–148 DOI: Download PDF Abstract: Securely deleting invalid data from secondary storage is critical to protect users’ data privacy against unauthorized …