Login / Signup
Proc. Priv. Enhancing Technol.
2015
2018
2021
2024
2015
2024
Keyphrases
Publications
volume 2024, number 3, 2024
Hamza Saleem
,
Amir Ziashahabi
,
Muhammad Naveed
,
Salman Avestimehr
Hawk: Accurate and Fast Privacy-Preserving Machine Learning Using Secure Lookup Table Computation.
Proc. Priv. Enhancing Technol.
2024 (3) (2024)
Tingting Tang
,
Yue Niu
,
Salman Avestimehr
,
Murali Annavaram
Edge Private Graph Neural Networks with Singular Value Perturbation.
Proc. Priv. Enhancing Technol.
2024 (3) (2024)
volume 2024, number 4, 2024
Yunang Chen
,
David Heath
,
Rahul Chatterjee
,
Earlence Fernandes
Scalable Metadata-Hiding for Privacy-Preserving IoT Systems.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Imane Fouad
,
Cristiana Santos
,
Pierre Laperdrix
The Devil is in the Details: Detection, Measurement and Lawfulness of Server-Side Tracking on the Web.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Yixin Wu
,
Xinlei He
,
Pascal Berrang
,
Mathias Humbert
,
Michael Backes
,
Neil Zhenqiang Gong
,
Yang Zhang
Link Stealing Attacks Against Inductive Graph Neural Networks.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Hidayet Aksu
,
Badih Ghazi
,
Pritish Kamath
,
Ravi Kumar
,
Pasin Manurangsi
,
Adam Sealfon
,
Avinash V. Varadarajan
Summary Reports Optimization in the Privacy Sandbox Attribution Reporting API.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Tamir Tassa
,
Avishay Yanai
The Multiple Millionaires' Problem: New Algorithmic Approaches and Protocols.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Debajyoti Das
,
Claudia Díaz
,
Aggelos Kiayias
,
Thomas Zacharias
Are continuous stop-and-go mixnets provably secure?
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Vincent Guan
,
Florent Guépin
,
Ana-Maria Cretu
,
Yves-Alexandre de Montjoye
A Zero Auxiliary Knowledge Membership Inference Attack on Aggregate Location Data.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Philip Scherer
,
Christiane Weis
,
Thorsten Strufe
Provable Security for the Onion Routing and Mix Network Packet Format Sphinx.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Haoyu He
,
Isaiah J. King
,
H. Howie Huang
Maui: Black-Box Edge Privacy Attack on Graph Neural Networks.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Kanav Gupta
,
Neha Jawalkar
,
Ananta Mukherjee
,
Nishanth Chandran
,
Divya Gupta
,
Ashish Panwar
,
Rahul Sharma
SIGMA: Secure GPT Inference with Function Secret Sharing.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Kilian Demuth
,
Sebastian Linsner
,
Tom Biselli
,
Marc-André Kaufhold
,
Christian Reuter
Support Personas: A Concept for Tailored Support of Users of Privacy-Enhancing Technologies.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Shujaat Shujaat Mirza
,
Corban Villa
,
Christina Pöpper
Media talks Privacy: Unraveling a Decade of Privacy Discourse around the World.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Francisco Caravaca
,
José González Cabañas
,
Ángel Cuevas
,
Rubén Cuevas
Overprofiling Analysis on Major Internet Players.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Muhammad Abu Bakar Aziz
,
Christo Wilson
Johnny Still Can't Opt-out: Assessing the IAB CCPA Compliance Framework.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Minjun Long
,
David Evans
Evaluating Google's Protected Audience Protocol.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
David Hasselquist
,
Ethan Witwer
,
August Carlson
,
Niklas Johansson
,
Niklas Carlsson
Raising the Bar: Improved Fingerprinting Attacks and Defenses for Video Streaming Traffic.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Rune Fiedler
,
Christian Janson
A Deniability Analysis of Signal's Initial Handshake PQXDH.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Kevin Liao
,
Henry Corrigan-Gibbs
,
Dan Boneh
Divisible E-Cash for Billing in Private Ad Retargeting.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Micah Sherr
,
Zubair Shafiq
Editors' Introduction.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Xun Yuan
,
Yang Yang
,
Prosanta Gope
,
Aryan Mohammadi Pasikhani
,
Biplab Sikdar
VFLGAN: Vertical Federated Learning-based Generative Adversarial Network for Vertically Partitioned Data Publication.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Ka-Ho Chow
,
Sihao Hu
,
Tiansheng Huang
,
Fatih Ilhan
,
Wenqi Wei
,
Ling Liu
Diversity-driven Privacy Protection Masks Against Unauthorized Face Recognition.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Jiahui Gao
,
Son Nguyen
,
Ni Trieu
Toward A Practical Multi-party Private Set Union.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Pengzhi Huang
,
Thang Hoang
,
Yueying Li
,
Elaine Shi
,
G. Edward Suh
Efficient Privacy-Preserving Machine Learning with Lightweight Trusted Hardware.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Jenny Tang
,
Léo Alvarez
,
Arjun Brar
,
Nguyen Phong Hoang
,
Nicolas Christin
Automatic Generation of Web Censorship Probe Lists.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Daniel Hugenroth
,
Alberto Sonnino
,
Sam Cutler
,
Alastair R. Beresford
Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Denis Obrezkov
Privacy Protection Behaviors from a New Angle: Exploratory Analysis on a Russian Sample.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Tess Despres
,
Marcelino Ayala Constantino
,
Naomi Zacarias Lizola
,
Gerardo Sánchez Romero
,
Shijing He
,
Xiao Zhan
,
Noura Abdi
,
Ruba Abu-Salma
,
Jose Such
,
Julia Bernd
"My Best Friend's Husband Sees and Knows Everything": A Cross-Contextual and Cross-Country Approach to Understanding Smart Home Privacy.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Johannes Müller
,
Jan Oupický
Post-quantum XML and SAML Single Sign-On.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Sebastian Linsner
,
Kilian Demuth
,
Marc Fischlin
,
Christian Reuter
Decision-based Data Distribution (D³): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Noé Zufferey
,
Kavous Salehzadeh Niksirat
,
Mathias Humbert
,
Kévin Huguenin
Our Data, Our Solutions: A Participatory Approach for Enhancing Privacy in Wearable Activity Tracker Third-Party Apps.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Alexandra Boldyreva
,
Virendra Kumar
,
Jiahao Sun
Provable Security Analysis of Butterfly Key Mechanism Protocol in IEEE 1609.2.1 Standard.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Mir Masood Ali
,
David G. Balash
,
Monica Kodwani
,
Chris Kanich
,
Adam J. Aviv
Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Kejsi Take
,
Jordyn Young
,
Rasika Bhalerao
,
Kevin Gallagher
,
Andrea Forte
,
Damon McCoy
,
Rachel Greenstadt
What to Expect When You're Accessing: An Exploration of User Privacy Rights in People Search Websites.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Ferran Alborch Escobar
,
Sébastien Canard
,
Fabien Laguillaumie
,
Duong Hieu Phan
Computational Differential Privacy for Encrypted Databases Supporting Linear Queries.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Christoph U. Günther
,
Krzysztof Pietrzak
Deniability in Automated Contact Tracing: Impossibilities and Possibilities.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Christian Badertscher
,
Mahdi Sedaghat
,
Hendrik Waldner
Unlinkable Policy-Compliant Signatures for Compliant and Decentralized Anonymous Payments.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Héber Hwang Arcolezi
,
Sébastien Gambs
Revealing the True Cost of Locally Differentially Private Protocols: An Auditing Perspective.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Xiaoxin Shen
,
Eman Alashwali
,
Lorrie Cranor
What Do Privacy Advertisements Communicate to Consumers?
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Abdullah Çaglar Öksüz
,
Anisa Halimi
,
Erman Ayday
AUTOLYCUS: Exploiting Explainable Artificial Intelligence (XAI) for Model Extraction Attacks against Interpretable Models.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Alexandra Boldyreva
,
Zichen Gui
,
Bogdan Warinschi
Understanding Leakage in Searchable Encryption: a Quantitative Approach.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Emma Tosch
,
Luis Garcia
,
Cynthia Li
,
Chris Martens
Privacy Policies on the Fediverse: A Case Study of Mastodon Instances.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Pascal Tippe
,
Adrian Tippe
Onion Services in the Wild: A Study of Deanonymization Attacks.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Yasha Iravantchi
,
Thomas Krolikowski
,
William Wang
,
Kang G. Shin
,
Alanson P. Sample
PrivacyLens: On-Device PII Removal from RGB Images using Thermally-Enhanced Sensing.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Xiuling Wang
,
Wendy Hui Wang
Subgraph Structure Membership Inference Attacks against Graph Neural Networks.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Julian Todt
,
Simon Hanisch
,
Thorsten Strufe
Fantômas: Understanding Face Anonymization Reversibility.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Rachel Crowder
,
George Price
,
Thomas Groß
Simply tell me how - On Trustworthiness and Technology Acceptance of Attribute-Based Credentials.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Pascal Berrang
,
Paul Gerhart
,
Dominique Schröder
Measuring Conditional Anonymity - A Global Study.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Nirajan Koirala
,
Jonathan Takeshita
,
Jeremy Stevens
,
Taeho Jung
Summation-based Private Segmented Membership Test from Threshold-Fully Homomorphic Encryption.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)