Privacy Enhancing Technologies

14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings

  • Emiliano De Cristofaro
  • Steven J. Murdoch
Conference proceedings PETS 2014

DOI: 10.1007/978-3-319-08506-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8555)

Table of contents (16 papers)

  1. Front Matter
    Pages I-X
  2. CloudTransport: Using Cloud Storage for Censorship-Resistant Networking
    Chad Brubaker, Amir Houmansadr, Vitaly Shmatikov
    Pages 1-20
  3. A Predictive Differentially-Private Mechanism for Mobility Traces
    Konstantinos Chatzikokolakis, Catuscia Palamidessi, Marco Stronati
    Pages 21-41
  4. On the Effectiveness of Obfuscation Techniques in Online Social Networks
    Terence Chen, Roksana Boreli, Mohamed-Ali Kaafar, Arik Friedman
    Pages 42-62
  5. Social Status and the Demand for Security and Privacy
    Jens Grossklags, Nigel J. Barradale
    Pages 83-101
  6. C3P: Context-Aware Crowdsourced Cloud Privacy
    Hamza Harkous, Rameez Rahman, Karl Aberer
    Pages 102-122
  7. Forward-Secure Distributed Encryption
    Wouter Lueks, Jaap-Henk Hoepman, Klaus Kursawe
    Pages 123-142
  8. I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis
    Brad Miller, Ling Huang, A. D. Joseph, J. D. Tygar
    Pages 143-163
  9. I Know What You’re Buying: Privacy Breaches on eBay
    Tehila Minkus, Keith W. Ross
    Pages 164-183
  10. Quantifying the Effect of Co-location Information on Location Privacy
    Alexandra-Mihaela Olteanu, Kévin Huguenin, Reza Shokri, Jean-Pierre Hubaux
    Pages 184-203
  11. Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications
    Simon Oya, Carmela Troncoso, Fernando Pérez-González
    Pages 204-223
  12. Exploiting Delay Patterns for User IPs Identification in Cellular Networks
    Vasile Claudiu Perta, Marco Valerio Barbera, Alessandro Mei
    Pages 224-243
  13. Why Doesn’t Jane Protect Her Privacy?
    Karen Renaud, Melanie Volkamer, Arne Renkema-Padmos
    Pages 244-262
  14. Measuring Freenet in the Wild: Censorship-Resilience under Observation
    Stefanie Roos, Benjamin Schiller, Stefan Hacker, Thorsten Strufe
    Pages 263-282
  15. Dovetail: Stronger Anonymity in Next-Generation Internet Routing
    Jody Sankey, Matthew Wright
    Pages 283-303
  16. Spoiled Onions: Exposing Malicious Tor Exit Relays
    Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog et al.
    Pages 304-331
  17. Back Matter
    Pages 333-333

About these proceedings


This book constitutes the refereed proceedings of the 14th International Symposium on Privacy Enhancing Technologies, PETS 2014, held in Amsterdam, The Netherlands, in July 2014. The 16 full papers presented were carefully selected from 86 submissions. Topics addressed by the papers published in these proceedings include study of privacy erosion, designs of privacy-preserving systems, censorship resistance, social networks and location privacy.


cloud computing human and societal aspects of security and privacy network security privacy protection security services social network security and privacy traffic analysis

Editors and affiliations

  • Emiliano De Cristofaro
    • 1
  • Steven J. Murdoch
    • 2
  1. 1.Department of Computer ScienceUniversity College LondonLondonUK
  2. 2.Computer LaboratoryUniversity of CambridgeCambridgeUK

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-08505-0
  • Online ISBN 978-3-319-08506-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349