Privacy |
'I've Got Nothing to Hide' and Other Misunderstandings of Privacy (local cached copy) Daniel J. Solove, San Diego Law Review, Vol. 44, 2007 |
A Classification for Privacy Techniques (local cached copy) Carlisle Adams, University of Ottawa Law & Technology Journal 3, 2006 |
PETs for the Internet |
Privacy-enhancing Technologies for the Internet (local cached copy) Ian Goldberg, David Wagner, Eric Brewer, IEEE COMPCON 1997 |
Privacy-enhancing technologies for the Internet, II: Five years later (local cached copy) Ian Goldberg, PET 2002 |
Privacy-enhancing technologies for the Internet III: Ten years later (local cached copy) Ian Goldberg, "Digital Privacy: Theory, Technologies and Practices", Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, and Sabrina De Capitani di Vimercati, editors, 2007 |
Privacy and the Real World |
Turtles, Locks, and Bathrooms: Understanding Mental Models of Privacy Through Illustration (local cached copy) Maggie Oates, Yama Ahmadullah, Abigail Marsh, Chelse Swoopes, Shikun Zhang, Rebecca Balebako, Lorrie Cranor, Proceedings on Privacy Enhancing Technologies 2018.4 |
I never signed up for this! Privacy implications of email tracking (local cached copy) Steven Englehardt, Jeffrey Han, Arvind Narayanan, Proceedings on Privacy Enhancing Technologies 2018.1 |
Adblocking and Counter Blocking: A Slice of the Arms Race (local cached copy) Rishab Nithyanand, Sheharbano Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Julia E. Powles, Emiliano De Cristofaro, Hamed Haddadi, Steven J. Murdoch, FOCI 2016 |
Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China (local cached copy) Jeffrey Knockel, Masashi Crete-Nishihata, Jason Q. Ng, Adam Senft, Jedidiah R. Crandall, FOCI 2015 |
Internet Censorship in Thailand: User Practices and Potential Threats (local cached copy) Genevieve Gebhart, Tadayoshi Kohno, EuroS&P 2017 |
Mending Wall: On the Implementation of Censorship in India (local cached copy) Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, H. B. Acharya, Sambuddho Chakravarty, SecureComm 2017 |
Censorship Resistance |
SoK: Towards Grounding Censorship Circumvention in Empiricism (local cached copy) Michael C. Tschantz, Sadia Afroz, Anonymous, Vern Paxson, Oakland 2016 |
Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship (local cached copy) Zhongjie Wang, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, IMC 2018 |
Marionette: A Programmable Network Traffic Obfuscation System (local cached copy) Kevin P. Dyer, Scott E. Coull, Thomas Shrimpton, USENIX Security 2015 |
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement (local cached copy) Cecylia Bocovich, Ian Goldberg, CCS 2016 |
The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks (local cached copy) Milad Nasr, Hadi Zolfaghari, Amir Houmansadr, CCS 2017 |
DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams (local cached copy) Diogo Barradas, Nuno Santos, Luís Rodrigues, Proceedings on Privacy Enhancing Technologies 2017.4 |
Secure Messaging |
Riposte: An Anonymous Messaging System Handling Millions of Users (local cached copy) Henry Corrigan-Gibbs, Dan Boneh, David Mazières, Oakland 2015 |
Consistent Synchronous Group Off-The-Record Messaging with SYM-GOTR (local cached copy) Michael Schliep, Eugene Vasserman, Nicholas Hopper, Proceedings on Privacy Enhancing Technologies 2018.3 |
Improved Strongly Deniable Authenticated Key Exchanges for Secure Messaging (local cached copy) Nik Unger, Ian Goldberg, Proceedings on Privacy Enhancing Technologies 2018.1 |
PIR-PSI: Scaling Private Contact Discovery (local cached copy) Daniel Demmler, Peter Rindal, Mike Rosulek, Ni Trieu, Proceedings on Privacy Enhancing Technologies 2018.4 |
Mix Networks |
Untraceable electronic mail, return addresses, and digital pseudonyms (local cached copy) David Chaum, Communications of the ACM, 1981 |
The Loopix Anonymity System (local cached copy) Ania M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis, USENIX Security 2017 |
MCMix: Anonymous Messaging via Secure Multiparty Computation (local cached copy) Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias, USENIX Security 2017 |
TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer (local cached copy) Chen Chen, Daniele E. Asoni, Adrian Perrig, David Barrera, George Danezis, Carmela Troncoso, EuroS&P 2018 |
Onion Routing |
Tor: The Second-Generation Onion Router (local cached copy) Roger Dingledine, Nick Mathewson, Paul Syverson, USENIX Security 2004 |
Data-plane Defenses against Routing Attacks on Tor (local cached copy) Da Henry Tan, Micah Sherr, Wenchao Zhou, Proceedings on Privacy Enhancing Technologies 2016.4 |
How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services (local cached copy) Rebekah Overdorf, Mark Juarez, Gunes Acar, Rachel Greenstadt, Claudia Diaz, CCS 2017 |
Onions in the Crosshairs: When The Man really is out to get you (local cached copy) Aaron D. Jaggard, Paul Syverson, WPES 2017 |
Dropping on the Edge: Flexibility and Traffic Confirmation in Onion Routing Protocols (local cached copy) Florentin Rochet, Olivier Pereira, Proceedings on Privacy Enhancing Technologies 2018.2 |
HisTorε: Differentially Private and Robust Statistics Collection for Tor (local cached copy) Akshaya Mani, Micah Sherr, NDSS 2017 |
Differential Privacy |
On Significance of the Least Significant Bits For Differential Privacy (local cached copy) Ilya Mironov, CCS 2012 |
Crowd-Blending Privacy (local cached copy) Johannes Gehrke, Michael Hay, Edward Lui, Rafael Pass, Crypto 2012 |
Dependence Makes You Vulnerable: Differential Privacy Under Dependent Tuples (local cached copy) Changchang Liu, Supriyo Chakraborty, Prateek Mittal, NDSS 2016 |
Differentially Private Oblivious RAM (local cached copy) Sameer Wagh, Paul Cuff, Prateek Mittal, Proceedings on Privacy Enhancing Technologies 2018.4 |