Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2014
Identifying Webbrowsers in Encrypted Communications
WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic SocietyPages 135–138https://doi.org/10.1145/2665943.2665968Webbrowser fingerprinting is a powerful tool to identify an Internet end-user. Previous research has shown that the information extracted from webbrowsers can uniquely identify an end-user. To collect webbrowser specific information, intentional ...
- research-articleNovember 2014
Stylometric Linkability of Tweets
WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic SocietyPages 205–208https://doi.org/10.1145/2665943.2665966Microblogging is a very popular Internet activity that informs and entertains a large number of people via terse messages; e.g., tweets on Twitter. Even though microblogging does not emphasize privacy, authors can easily hide behind pseudonyms and ...
- research-articleNovember 2014
Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse
WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic SocietyPages 201–204https://doi.org/10.1145/2665943.2665965Privacy is a concept with real life ties and implications. Privacy infringement has the potential to lead to serious consequences for the stakeholders involved, hence researchers and organisations have developed various privacy enhancing techniques and ...
- research-articleNovember 2014
Adaptive Conflict Resolution Mechanism for Multi-party Privacy Management in Social Media
WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic SocietyPages 69–72https://doi.org/10.1145/2665943.2665964The lack of multi-party privacy management support in current mainstream Social Media infrastructures makes users unable to appropriately control to whom co-owned items are shared. Computational mechanisms that are able to merge the privacy preferences ...
- research-articleNovember 2014
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM
WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic SocietyPages 1–10https://doi.org/10.1145/2665943.2665962Widespread use and low prices of genomic sequencing bring us into the area of personalized medicine and biostatistics of large cohorts. As the processed genomic data is highly sensitive, Privacy-Enhancing Technologies for genomic data need to be ...
- research-articleNovember 2014
ProfileGuard: Privacy Preserving Obfuscation for Mobile User Profiles
WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic SocietyPages 83–92https://doi.org/10.1145/2665943.2665961Analytics companies have become an integral part of the mobile advertising industry, enabling successful user targeting via user profiles, derived from the mobile apps installed by specific users. This poses a threat to privacy of such users, when apps ...
- research-articleNovember 2014
An Automated Social Graph De-anonymization Technique
WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic SocietyPages 47–58https://doi.org/10.1145/2665943.2665960We present a generic and automated approach to re-identifying nodes in anonymized social networks which enables novel anonymization techniques to be quickly evaluated. It uses machine learning (decision forests) to matching pairs of nodes in disparate ...
- research-articleNovember 2014
Privacy Detective: Detecting Private Information and Collective Privacy Behavior in a Large Social Network
WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic SocietyPages 35–46https://doi.org/10.1145/2665943.2665958Detecting the presence and amount of private information being shared in online media is the first step towards analyzing information revealing habits of users in social networks and a useful method for researchers to study aggregate privacy behavior. ...
- research-articleNovember 2014
Exploiting Users' Inconsistent Preferences in Online Social Networks to Discover Private Friendship Links
WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic SocietyPages 59–68https://doi.org/10.1145/2665943.2665956In a social network system, a friendship relation between two users is usually represented by an undirected link and it is visible in both users' friend lists. Such a dual visibility of a friendship link may raise privacy threats. This is because both ...
- research-articleNovember 2014
Sybil-Resistant Mixing for Bitcoin
WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic SocietyPages 149–158https://doi.org/10.1145/2665943.2665955A fundamental limitation of Bitcoin and its variants is that the movement of coin between addresses can be observed by examining the public block chain. This record enables adversaries to link addresses to individuals, and to identify multiple addresses ...
- research-articleNovember 2014
Private Browsing: an Inquiry on Usability and Privacy Protection
WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic SocietyPages 97–106https://doi.org/10.1145/2665943.2665953Private browsing is a feature in web browsers to prevent local users from gaining information about browsing sessions. However, it is not clear how well people interpret private browsing's functionalities and what are the privacy gains from using it. ...
- research-articleNovember 2014
Glove: A Bespoke Website Fingerprinting Defense
WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic SocietyPages 131–134https://doi.org/10.1145/2665943.2665950Website fingerprinting attacks have recently emerged as a serious threat against web browsing privacy mechanisms, such as SSL, Tor, and encrypting tunnels. Researchers have proposed numerous attacks and defenses, and the Tor project currently includes ...
- research-articleNovember 2014
CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense
WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic SocietyPages 121–130https://doi.org/10.1145/2665943.2665949Website fingerprinting attacks enable an adversary to infer which website a victim is visiting, even if the victim uses an encrypting proxy, such as Tor. Previous work has shown that all proposed defenses against website fingerprinting attacks are ...
- research-articleNovember 2014
Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services
WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic SocietyPages 73–82https://doi.org/10.1145/2665943.2665946Human mobility is highly predictable. Individuals tend to only visit a few locations with high frequency, and to move among them in a certain sequence reflecting their habits and daily routine. This predictability has to be taken into account in the ...
- proceedingNovember 2014
WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic Society
This volume contains the papers selected for presentation at the 13th Workshop on Privacy in the Electronic Society (WPES 2014), held in Scottsdale, Arizona, USA, on November 3, 2014, in conjunction with the ACM Conference on Computer and Communications ...