About 90 results
Open links in new tab
  1. De-anonymizing Genomic Databases Using Phenotypic Traits Abstract: People increasingly have their genomes se-quenced and some of them share their genomic data on-line. They do so for various …

  2. PoPETs Proceedings — Volume 2015

    Issue 1 Editors’ Introduction Apu Kapadia (Indiana University Bloomington), Steven J. Murdoch (University College London) 20,000 In League Under the Sea: Anonymous Communication, Trust, …

  3. De-anonymizing Genomic Databases Using Phenotypic Traits

    De-anonymizing Genomic Databases Using Phenotypic Traits Authors: Mathias Humbert (EPFL, Lausanne, Switzerland), Kévin Huguenin (LAAS-CNRS, Toulouse, France), Joachim Hugonot …

  4. PoPETs Proceedings — DP5: A Private Presence Service

    DP5: A Private Presence Service Authors: Nikita Borisov (University of Illinois at Urbana-Champaign), George Danezis (University College London), Ian Goldberg ...

  5. PoPETs Proceedings — Editors’ Introduction

    Editors’ Introduction Authors: Apu Kapadia (Indiana University Bloomington), Steven J. Murdoch (University College London) Volume: 2015 Issue: 2 Pages: 1–3 DOI ...

  6. PoPETs Proceedings — 20,000 In League Under the Sea: Anonymous ...

    20,000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables

  7. PoPETs Proceedings — A Glance through the VPN Looking Glass: IPv6 ...

    A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients Authors: Vasile C. Perta (Sapienza University of Rome), Marco V. Barbera (Sapienza University of …

  8. Abstract:The Tor anonymity network has been shown vul- nerable to traffic analysis attacks by autonomous systems (ASes) and Internet exchanges (IXes), which can observe dif- ferent overlay …

  9. PoPETs Proceedings — Automated Experiments on Ad Privacy Settings

    Abstract: To partly address people’s concerns over web tracking, Google has created the Ad Settings webpage to provide information about and some choice over the profiles Google creates on users. …

  10. PoPETs Proceedings — Parallel Oblivious Array Access for Secure ...

    Parallel Oblivious Array Access for Secure Multiparty Computation and Privacy-Preserving Minimum Spanning Trees Authors: Peeter Laud (Cybernetica AS) Volume: 2015 ...