Privacy Enhancing Technologies

14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings

Editors:

ISBN: 978-3-319-08505-0 (Print) 978-3-319-08506-7 (Online)

Table of contents (16 chapters)

  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-20

    CloudTransport: Using Cloud Storage for Censorship-Resistant Networking

  3. No Access

    Book Chapter

    Pages 21-41

    A Predictive Differentially-Private Mechanism for Mobility Traces

  4. No Access

    Book Chapter

    Pages 42-62

    On the Effectiveness of Obfuscation Techniques in Online Social Networks

  5. No Access

    Book Chapter

    Pages 63-82

    The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency

  6. No Access

    Book Chapter

    Pages 83-101

    Social Status and the Demand for Security and Privacy

  7. No Access

    Book Chapter

    Pages 102-122

    C3P: Context-Aware Crowdsourced Cloud Privacy

  8. No Access

    Book Chapter

    Pages 123-142

    Forward-Secure Distributed Encryption

  9. No Access

    Book Chapter

    Pages 143-163

    I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis

  10. No Access

    Book Chapter

    Pages 164-183

    I Know What You’re Buying: Privacy Breaches on eBay

  11. No Access

    Book Chapter

    Pages 184-203

    Quantifying the Effect of Co-location Information on Location Privacy

  12. No Access

    Book Chapter

    Pages 204-223

    Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications

  13. No Access

    Book Chapter

    Pages 224-243

    Exploiting Delay Patterns for User IPs Identification in Cellular Networks

  14. No Access

    Book Chapter

    Pages 244-262

    Why Doesn’t Jane Protect Her Privacy?

  15. No Access

    Book Chapter

    Pages 263-282

    Measuring Freenet in the Wild: Censorship-Resilience under Observation

  16. No Access

    Book Chapter

    Pages 283-303

    Dovetail: Stronger Anonymity in Next-Generation Internet Routing

  17. No Access

    Book Chapter

    Pages 304-331

    Spoiled Onions: Exposing Malicious Tor Exit Relays

  18. Back Matter

    Pages -