Privacy Enhancing Technologies

13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings

  • Emiliano De Cristofaro
  • Matthew Wright
Conference proceedings PETS 2013

DOI: 10.1007/978-3-642-39077-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7981)

Table of contents (13 papers)

  1. Front Matter
  2. Optimizing ORAM and Using It Efficiently for Secure Computation
    Craig Gentry, Kenny A. Goldman, Shai Halevi, Charanjit Julta, Mariana Raykova, Daniel Wichs
    Pages 1-18
  3. Anonymity-Preserving Public-Key Encryption: A Constructive Approach
    Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi
    Pages 19-39
  4. Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation Systems
    Gesine Hinterwälder, Christian T. Zenger, Foteini Baldimtsi, Anna Lysyanskaya, Christof Paar, Wayne P. Burleson
    Pages 40-59
  5. Broadening the Scope of Differential Privacy Using Metrics
    Konstantinos Chatzikokolakis, Miguel E. Andrés, Nicolás Emilio Bordenabe, Catuscia Palamidessi
    Pages 82-102
  6. Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet
    Hamed Soroush, Keen Sung, Erik Learned-Miller, Brian Neil Levine, Marc Liberatore
    Pages 103-122
  7. How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots
    Nevena Vratonjic, Kévin Huguenin, Vincent Bindschaedler, Jean-Pierre Hubaux
    Pages 123-142
  8. The Path Less Travelled: Overcoming Tor’s Bottlenecks with Traffic Splitting
    Mashael AlSabah, Kevin Bauer, Tariq Elahi, Ian Goldberg
    Pages 143-163
  9. How Low Can You Go: Balancing Performance with Anonymity in Tor
    John Geddes, Rob Jansen, Nicholas Hopper
    Pages 164-184
  10. OSS: Using Online Scanning Services for Censorship Circumvention
    David Fifield, Gabi Nakibly, Dan Boneh
    Pages 185-204
  11. The Need for Flow Fingerprints to Link Correlated Network Flows
    Amir Houmansadr, Nikita Borisov
    Pages 205-224
  12. How Much Is Too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness
    Terence Chen, Abdelberi Chaabane, Pierre Ugo Tournoux, Mohamed-Ali Kaafar, Roksana Boreli
    Pages 225-244
  13. On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards
    Marian Harbach, Sascha Fahl, Matthias Rieger, Matthew Smith
    Pages 245-264
  14. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 13th International Symposium on Privacy Enhancing Technologies, PET 2013, held in Bloomington, IN, USA, in July 2013.
The 13 full papers presented were carefully selected from 69
submissions. Topics addressed include data privacy, privacy-oriented
cryptography, location privacy, performance of the Tor network,
censorship evasion, traffc analysis, and user-related privacy
perspectives.

Keywords

anonymity e-cash elliptic curve cryptography network security privacy-preserving

Editors and affiliations

  • Emiliano De Cristofaro
    • 1
  • Matthew Wright
    • 2
  1. 1.Palo Alto Research Center (PARC)Palo AltoUSA
  2. 2.Department of Computer Science and EngineeringUniversity of Texas at ArlingtonArlingtonUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-39076-0
  • Online ISBN 978-3-642-39077-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349