种子简介
种子名称:
PETS
文件类型:
视频
文件数目:
416个文件
文件大小:
7.25 GB
收录时间:
2023-12-29 10:52
已经下载:
3次
资源热度:
36
最近下载:
2024-12-13 23:20
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:0bb9197cf7a936a3e972438c7cf791020c56f045&dn=PETS
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
PETS.torrent
PETS 2016/Aaron Johnson - Opening Keynote HotPETS 2016.mp47.71MB
PETS 2016/Albert Kwon - Riffle - Efficient Communication System With Strong Anonymity.mp412.76MB
PETS 2016/Ame Elliott - Respecting Participants in Privacy-Related User Studies.mp420.39MB
PETS 2016/Andy Rupp - Black-Box Accumulation - Collecting Incentives in a Privacy-Preserving Way.mp420.4MB
PETS 2016/Angela Sasse - Goodbye Passwords, Hello Biometrics - Do We Understand the Privacy Implications.mp455.79MB
PETS 2016/Aylin Caliskan-Islam - A Story of Discrimination and Unfairness.mp413.46MB
PETS 2016/Carlos Aguilar Melchor - XPIR - Private Information Retrieval for Everyone.mp420.76MB
PETS 2016/Chad Spensky - SoK - Privacy on Mobile Devices - It’s Complicated.mp417.85MB
PETS 2016/Cristina Onete - Achieving Better Privacy for the 3GPP AKA Protocol.mp416.44MB
PETS 2016/Dan Blah Meredith - Thank You for Protecting Human Rights - HotPETs Keynote 2016.mp456.46MB
PETS 2016/David J. Wu - Privately Evaluating Decision Trees and Random Forests.mp413.35MB
PETS 2016/Emmanuel Bello-Ogunu - Crowdsourcing for Context.mp417.97MB
PETS 2016/Esha Ghosh - Efficient Verifiable Range and Closest Point Queries in Zero-Knowledge.mp414.92MB
PETS 2016/Franz Kargl - Tales from the Dark Side - Privacy Dark Strategies and Privacy Dark Patterns.mp418.16MB
PETS 2016/Frederick Douglas - Salmon - Robust Proxy Distribution for Censorship Circumvention.mp416MB
PETS 2016/Frederik Möllers & Christoph Sorge - Privacy Challenges in the Quantified Self Movement.mp418.62MB
PETS 2016/Gabor György Gulyás - Near-Optimal Fingerprinting with Constrain'ts.mp413.6MB
PETS 2016/Giulia Fanti - Building a RAPPOR with the Unknown.mp410.71MB
PETS 2016/Hamza Harkous - The Curious Case of the PDF Converter that Likes Mozart.mp418.27MB
PETS 2016/Hao Wu - Location Privacy with Randomness Consistency.mp415.11MB
PETS 2016/Harry Halpin - The Responsibility of Open Standards in the Era of Surveillance.mp420.44MB
PETS 2016/Jean-Sebastien Legare - Beeswax - A Platform for Private Web Apps.mp415.03MB
PETS 2016/Jens Grossklags - Towards a Model on the Factors Influencing Social App Users' Valuation.mp418.21MB
PETS 2016/John M. Schanck - Circuit-Extension Handshakes for Tor Achieving Forward Secrecy in a Quantum World.mp414.26MB
PETS 2016/João Garcia - Isolating Graphical Failure-Inducing Input.mp417.19MB
PETS 2016/Kassem Fawaz - Privacy vs. Reward in Indoor Location-Based Services.mp413.94MB
PETS 2016/Keith Ross - The Right to be Forgotten in the Media - A Data-Driven Study.mp422.44MB
PETS 2016/Laurent Simon - Don't Interrupt Me While I Type.mp416.58MB
PETS 2016/Linus Gasser - Managing Identities Using Blockchains and CoSi.mp414.43MB
PETS 2016/Marina Blanton and Fattaneh Bayatbabolghani - Efficient Server-Aided Secure Two-Party Function.mp420.89MB
PETS 2016/Marios Isaakidis - Eclipse and Re-Emergence of Anonymous P2P Storage Network Overlay Services.mp414.2MB
PETS 2016/Micah Sherr - Data-plane Defenses against Routing Attacks on Tor.mp419.77MB
PETS 2016/Micah Sherr - Scalable and Anonymous Group Communication with MTor.mp417.94MB
PETS 2016/Miro Enev - Automobile Driver Fingerprinting.mp421.05MB
PETS 2016/Oleskii Starov - Are You Sure You Want to Contact Us.mp414.63MB
PETS 2016/Ostap Orobets - Highly Efficient Server-Aided 2PC for Mobiles.mp422.97MB
PETS 2016/Pedro Moreno-Sanchez - Listening to Whispers of Ripple.mp413.64MB
PETS 2016/Pedro Moreno-Sanchez - Whispers - A Distributed Architecture.mp416.16MB
PETS 2016/Raphael R Toledo - Lower-Cost epsilon-Private Information Retrieval.mp410.99MB
PETS 2016/Rebekah Overdorf - Blogs, Twitter Feeds, and Reddit Comments.mp411.74MB
PETS 2016/Richard McPherson - CovertCast - Using Live Streaming to Evade Internet Censorship.mp413.33MB
PETS 2016/Riivo Talviste - Students and Taxes - a Privacy-Preserving Social Study Using Secure Computation.mp416.01MB
PETS 2016/Rinku Dewri - Linking Health Records for Federated Query Processing.mp417.21MB
PETS 2016/Ryan Henry - Polynomial Batch Codes for Efficient IT-PIR.mp422.03MB
PETS 2016/Sakshi Jain and Mobin Javed - Towards Mining Latent Client Identifiers from Network Traffic.mp411.69MB
PETS 2016/Samuel Grogan - Access Denied Contrasting Data Access in the United States and Ireland.mp49.44MB
PETS 2016/Sebastian Meiser - Your Choice MATor(s) - Large-scale Quantitative Anonymity Assessment.mp416.66MB
PETS 2016/Shuai Li - Mailet - Instant Social Networking under Censorship.mp417.6MB
PETS 2016/Susan E. McGregor - Individual versus Organizational Computer Security Concerns in Journalism.mp419.68MB
PETS 2016/Tao Wang - On Realistically Attacking Tor with Website Fingerprinting.mp414.57MB
PETS 2016/Tariq Elahi - A Framework for the Game-theoretic Analysis of Censorship Resistance.mp415.41MB
PETS 2016/Tariq Elahi - SoK - Making Sense of Censorship Resistance Systems.mp415.31MB
PETS 2016/Tommaso Frassetto - Selfrando - Securing the Tor Browser against De-anonymization Exploits.mp412.49MB
PETS 2016/William Melicher - (Do Not) Track Me Sometimes - Users' Contextual Preferences for Web Tracking.mp414.31MB
PETS 2016/Yaoqi Jia - Anonymity in Peer-assisted CDNs - Inference Attacks and Mitigation.mp413.55MB
PETS 2016/Yaxing Yao - Flying Eyes and Hidden Controllers - Privacy Perceptions of Drones.mp414.6MB
PETS 2017/Aaron Johnson - PeerFlow - Secure Load Balancing in Tor.mp420.29MB
PETS 2017/Abdelaziz Alhadlaq - Privacy in the Amazon Alexa Skills Ecosystem.mp46.73MB
PETS 2017/Adria Gascon - Privacy Preserving Distributed Linear Regression on High-Dimensional Data.mp413.94MB
PETS 2017/Agnes Kiss - Private Set Intersection for Unequal Set Sizes with Mobile Applications.mp49.59MB
PETS 2017/Alexandra Dmitrienko - Phonion - Practical Protection of Metadata in Telephony Networks.mp413.15MB
PETS 2017/Alisa Pankova - Preprocessing Based Verification of Multiparty Protocols with Honest Majority.mp49.04MB
PETS 2017/Anh Pham - PrivateRide - A Privacy-Enhanced Ride-Hailing Service.mp411.33MB
PETS 2017/Anrin Chakraborti - DataLair - Efficient Block Storage with Plausible Deniability.mp48.67MB
PETS 2017/Apostolos Pyrgelis - Evaluating Aggregation-based Location Privacy.mp411.55MB
PETS 2017/Apu Kapadia - To Permit or Not to Permit... Crowdsourcing Mobile Apps’ Privacy.mp415.42MB
PETS 2017/Chen Chen - PHI - a Path-Hidden Lightweight Anonymity Protocol at Network Layer.mp410.23MB
PETS 2017/Cédric Van Rompay - A Leakage-Abuse Attack Against Multi-User Searchable Encryption.mp412.32MB
PETS 2017/Daniel Demmler - Privacy-Preserving Interdomain Routing at Internet Scale.mp412.73MB
PETS 2017/David Froelicher - Unlynx - A Decentralized System for Privacy-Conscious Data Sharing.mp413.23MB
PETS 2017/Diogo Barradas - DeltaShaper - Censorship-resistant TCP Tunneling over Videoconferencing.mp414.38MB
PETS 2017/Dominik Schürmann - Wiretapping End-to-End Encrypted VoIP Calls - Real-World Attacks on ZRTP.mp415.72MB
PETS 2017/Fatemeh Rezaei - TagIt - Tagging Network Flows using Blind Fingerprints.mp410.12MB
PETS 2017/Florentin Rochet - Waterfilling - Balancing the Tor network with maximum diversity.mp410.7MB
PETS 2017/Giovanni Cherubin - Bayes, not Naïve - Security Bounds on Website Fingerprinting Defenses.mp416.18MB
PETS 2017/Hadi Asghari - The Right of Access as a tool for Privacy Governance.mp412.64MB
PETS 2017/Henry Birge-Lee - Using BGP to Acquire Bogus TLS Certificates.mp414.3MB
PETS 2017/Hoda Aghaei Khouzani - ErasuCrypto - A Light-weight Secure Data Deletion Scheme for Solid State SSDs.mp410.01MB
PETS 2017/HotPETs Opening Remarks.mp46.01MB
PETS 2017/Hung Dang - Privacy-preserving computation with trusted computing via Scramble-then-Compute.mp49.33MB
PETS 2017/Jack Grigg - I2P - Open Research Questions about I2P.mp49.58MB
PETS 2017/Jeremy Martin - A Study of MAC Address Randomization in Mobile Devices and When it Fails.mp416.49MB
PETS 2017/Jesse Victors - The Onion Name System - Tor-powered Decentralized DNS for Tor Onion Services.mp416.38MB
PETS 2017/Jian Liu - Are you The One to Share Secret Transfer with Access Structure.mp49.61MB
PETS 2017/Jonathan Albright - PETS Keynote - Emotional Targeting... and the Shaping of Social Discourse.mp490.71MB
PETS 2017/Josh Aas - HotPETs Keynote - How We'll Encrypt the Web.mp445MB
PETS 2017/Joshua Gancher - Externally Verifiable Oblivious RAM - YouTube.mp47.2MB
PETS 2017/Justin Bookman - Cross-Device Tracking - Measurement and Disclosures.mp411.56MB
PETS 2017/Kevin Corre - Why Can't Users Choose Their Identity Providers On The Web.mp48.74MB
PETS 2017/Konstantinos Chatzikokolakis - Efficient utility improvement for location privacy.mp411.87MB
PETS 2017/Kovila P.L. Coopamootoo - An Empirical Study of Privacy & Sharing Attitude.mp410.55MB
PETS 2017/Lachlan J. Gunn - Safety in Numbers - Anonymization Makes Keyservers Trustworthy.mp410.87MB
PETS 2017/Linda Lee - A Usability Evaluation of Tor Launcher.mp411.61MB
PETS 2017/M. Sadegh Riazi - Toward Practical Secure Stable Matching.mp49.27MB
PETS 2017/Marc Juarez - Website Fingerprinting Defenses at the Application Layer.mp410.92MB
PETS 2017/Marios Isaakidis - Systematizing Decentralization and Privacy.mp413.95MB
PETS 2017/Matthew Wright - A Wide-Area Testbed for Tor.mp49.2MB
PETS 2017/Michael Reiter - Personalized Pseudonyms for Servers in the Cloud.mp412.56MB
PETS 2017/Mojtaba Eskandari - Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps.mp410.06MB
PETS 2017/Muhammad Ikram - Towards Seamless Tracking-Free Web - Improved Detection of Trackers.mp413.5MB
PETS 2017/Paul Syverson - Oft Target - Tor adversary models that don't miss the mark.mp414.05MB
PETS 2017/Pedro Moreno-Sanchez - PathShuffle - Credit Mixing and Anonymous Payments for Ripple.mp413.59MB
PETS 2017/Peter Ney and Ian Smith - SeaGlass - Enabling City-Wide IMSI-Catcher Detection.mp413.59MB
PETS 2017/PETS Opening Remarks.mp419.4MB
PETS 2017/Rinku Dewri - Location Privacy for Rank-based Geo-Query Systems.mp418.29MB
PETS 2017/Ruben Recabarren - Hardening Stratum, the Bitcoin Pool Mining Protocol.mp413.06MB
PETS 2017/Saba Eskandarian - Certificate Transparency with Privacy.mp49.97MB
PETS 2017/Se Eun Oh - Identifying Keywords in Search Engine Queries over Tor.mp411.84MB
PETS 2017/Spyros Boukoros - Two Is Not Enough - Privacy Assessment of Aggregation Schemes in Smart Metering.mp411.69MB
PETS 2017/Steven Englehardt - Battery Status Not Included - Assessing Privacy in Web Standards.mp49.68MB
PETS 2017/Takao Murakami - Expectation-Maximization Tensor Factorization for Location Privacy Attacks.mp414.91MB
PETS 2017/Vasilios Mavroudis - On the Privacy and Security of the Ultrasound Ecosystem.mp412.94MB
PETS 2017/Wendi Diao - Vulnerable GPU Memory Management - Towards Recovering Raw Data from GPU.mp49.35MB
PETS 2017/William Marczak - Social Engineering Attacks on Government Opponents....mp412.46MB
PETS 2017/Wouter Lueks - IRMA - decentralized and privacy-friendly identity management using smartphones.mp410.26MB
PETS 2017/Yao Li - Cross-cultural Privacy Prediction.mp413.06MB
PETS 2017/Yousra Javed - Look Before You Authorize - Using Eye-Tracking To Enforce User.mp411.33MB
PETS 2017/Zachary A. Kissel - Generic Adaptively Secure Searchable Phrase Encryption.mp47.11MB
PETS 2017/Zachary Weinberg - Topics of Controversy - An Empirical Analysis of Web Censorship Lists.mp410.73MB
PETS 2017/Zubair Shafiq - Detecting Anti Ad-blockers in the Wild.mp412.32MB
PETS 2018/Day 1 afternoon (Tuesday, July 24).mp4249.95MB
PETS 2018/Day 1 morning (Tuesday, July 24).mp4232.49MB
PETS 2018/Day 2 afternoon (Wednesday, July 25).mp4257.27MB
PETS 2018/Day 2 morning (Wednesday, July 25).mp4205.99MB
PETS 2018/Day 3 afternoon (Thursday, July 26).mp4289.09MB
PETS 2018/Day 3 morning (Thursday, July 26).mp4151.81MB
PETS 2018/Day 4 afternoon (Friday, July 27).mp4242MB
PETS 2018/Day 4 morning (Friday, July 27).mp4230.59MB
PETS 2020/A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments.mp412.88MB
PETS 2020/A Framework of Metrics for Differential Privacy from Local Sensitivity.mp411MB
PETS 2020/A Privacy-Focused Systematic Analysis of Online Status Indicators.mp411.29MB
PETS 2020/A Tale of Two Trees One Writes, and Other Reads. Optimized Oblivious Accesses....mp412.44MB
PETS 2020/An Empirical Analysis of the Commercial Arm of the Chinese Social Credit System.mp417.52MB
PETS 2020/Anatomy of Data Breaches.mp425.69MB
PETS 2020/Angel or Devil A Privacy Study of Mobile Parental Control Apps.mp411.11MB
PETS 2020/Anonymous, Attribute Based, Decentralized, Secure, and Fair e-Donation.mp411.04MB
PETS 2020/Automatic Discovery of Privacy-Utility Pareto Fronts.mp413.25MB
PETS 2020/Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms.mp413.7MB
PETS 2020/Black-Box Wallets Fast Anonymous Two-Way Payments for Constrained Devices.mp48.91MB
PETS 2020/CanaryTrap Detecting Data Misuse by Third-Party Apps on Online Social Networks.mp413.54MB
PETS 2020/Comprehensive Anonymity Trilemma User Coordination is not enough.mp411.8MB
PETS 2020/Differentially Private SQL with Bounded User Contribution.mp411.18MB
PETS 2020/Differentially-Private Multi-Party Sketching for Large-Scale Statistics.mp417.28MB
PETS 2020/Discontinued Privacy.mp412.87MB
PETS 2020/dPHI An improved high-speed network-layer anonymity protocol.mp416.41MB
PETS 2020/Effective writing style transfer via combinatorial paraphrasing.mp410.59MB
PETS 2020/Emotional and Practical Considerations towards the Adoption and Abandonment of VPNs...mp410.38MB
PETS 2020/Energy-Efficient Dummy Traffic Generation for Home Automation Systems.mp49.47MB
PETS 2020/Enhanced Performance and Privacy for TLS over TCP Fast Open.mp415.16MB
PETS 2020/Explaining the Use Behavior of Privacy-Enhancing Technologies.mp414.23MB
PETS 2020/Exposing Private User Behaviors of Collaborative Filtering via Model Inversion....mp415.16MB
PETS 2020/FLASH Fast and Robust Framework for Privacy-preserving Machine Learning.mp420.6MB
PETS 2020/HotPETS 2020 CLAPS Client-Location-Aware Path Selection in Tor.mp47.34MB
PETS 2020/HotPETS 2020 Closing Remarks.mp43.43MB
PETS 2020/HotPETS 2020 I see a cookie banner - is it even legal.mp411.72MB
PETS 2020/HotPETS 2020 Keynote Privacy Threats in Intimate Relationships by Karen Levy.mp432.11MB
PETS 2020/HotPETS 2020 ML Privacy Meter Aiding regulatory compliance by quantifying the privacy risks of ML.mp47.13MB
PETS 2020/HotPETS 2020 Opening Remarks.mp42.42MB
PETS 2020/HotPETS 2020 Probably private protocols.mp417.53MB
PETS 2020/HotPETS 2020 Simulation for mixnets.mp45.02MB
PETS 2020/HotPETS 2020 The current state of denial.mp412.61MB
PETS 2020/How private is your period A systematic analysis of menstrual app privacy policies.mp412.46MB
PETS 2020/Identifying Influential Spreaders in a Social Network (While Preserving Privacy).mp410.74MB
PETS 2020/Illuminating the Dark or how to recover what should not be seen in FE-based....mp417.02MB
PETS 2020/Impact of Frequency of Location Reports on the Privacy Level Geo-indistinguishability.mp415.13MB
PETS 2020/In Depth Evaluation of Redirect Tracking and Link Usage.mp411.13MB
PETS 2020/Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem....mp47.87MB
PETS 2020/INFUSE Invisible plausibly-deniable file system for NAND flash.mp49.39MB
PETS 2020/Listen Only When Spoken To Interpersonal Communication Cues as Smart Speaker Privacy Controls.mp416.35MB
PETS 2020/Mind the Gap Ceremonies for Applied Secret Sharing [cc].mp413MB
PETS 2020/Missed by Filter Lists Detecting Unknown Third-Party Trackers with Invisible Pixels.mp411.62MB
PETS 2020/Mitigator Privacy policy compliance using trusted hardware.mp410.48MB
PETS 2020/MoneyMorph Censorship Resistant Rendezvous using Permissionless Cryptocurrencies.mp414.03MB
PETS 2020/Multi-x Identifying Multiple Authors from Source Code Files.mp414.11MB
PETS 2020/Multiple Purposes, Multiple Problems A User Study of Consent Dialogs after GDPR.mp415.62MB
PETS 2020/No boundaries data exfiltration by third parties embedded on web pages.mp422.22MB
PETS 2020/NoMoATS Towards Automatic Detection of Mobile Tracking.mp413.71MB
PETS 2020/Not All Attributes are Created Equal dx-Private Mechanisms for Linear Queries.mp416.86MB
PETS 2020/P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection.mp49.01MB
PETS 2020/PETS 2020 20th Anniversary Commemoration.mp43.76MB
PETS 2020/PETS 2020 Award Ceremony.mp422.38MB
PETS 2020/PETS 2020 Closing Remarks.mp47.62MB
PETS 2020/PETS 2020 Keynote The Ethical Algorithm by Michael Kearns.mp439.99MB
PETS 2020/PETS 2020 Opening Remarks.mp413.74MB
PETS 2020/Pets without PETs on the under-estimation of privacy concerns in pet wearables.mp47.96MB
PETS 2020/Practical Privacy-Preserving K-means Clustering.mp413.59MB
PETS 2020/PriFi Low-Latency Anonymity for Organizational Networks.mp413.27MB
PETS 2020/Privacy at a Glance The User-Centric Design of Data Exposure Visualizations....mp416.43MB
PETS 2020/Privacy Preserving Detection of Path Bias Attacks in Anonymity Networks.mp415.71MB
PETS 2020/Privacy-Preserving Payment Splitting.mp413.32MB
PETS 2020/Protecting against Website Fingerprinting with Multihoming.mp415.2MB
PETS 2020/Protecting Private Inputs Bounded Distortion Guarantees With Randomised Approx..mp414.99MB
PETS 2020/Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy....mp410.7MB
PETS 2020/Reimagining Secret Sharing Creating a Safer and More Versatile Primitive by... [cc].mp414.2MB
PETS 2020/Reputable List Curation from Decentralized Voting.mp49.97MB
PETS 2020/Running Refraction Networking for Real.mp420.34MB
PETS 2020/Scaling Up Anonymous Communication with Efficient Nanopayment Channels.mp410.85MB
PETS 2020/Secure and Scalable Document Similarity on Distributed Databases....mp49.92MB
PETS 2020/Secure Evaluation of Quantized Neural Networks.mp410.83MB
PETS 2020/Secure k-ish Nearest Neighbors Classifier.mp412.92MB
PETS 2020/Self-Processing Sensor Data via Garbled Encryption.mp46.73MB
PETS 2020/SiegeBreaker An SDN Based Practical Decoy Routing System.mp415.46MB
PETS 2020/Smart Devices in Airbnbs Considering Privacy and Security for both Guests and Hosts.mp49.88MB
PETS 2020/SoK Differential Privacies [cc].mp416.59MB
PETS 2020/SPy Car Steering Reveals Your Trip Route.mp419.1MB
PETS 2020/SqORAM Read-Optimized Sequential Write-Only Oblivious RAM.mp412.47MB
PETS 2020/T0RTT Non-Interactive Immediate Forward-Secure Single-Pass Circuit Construction.mp48.68MB
PETS 2020/Tandem Securing Keys by Using a Central Server While Preserving Privacy.mp413.96MB
PETS 2020/The Best of Both Worlds.mp412.57MB
PETS 2020/The Power of the Hybrid Model for Mean Estimation.mp411.52MB
PETS 2020/The Price is (not) Right Comparing Privacy in Free and Paid Apps.mp412.91MB
PETS 2020/The Privacy Policy Landscape After the GDPR.mp413.54MB
PETS 2020/The Road Not Taken - Re-thinking The Feasibility of Voice Calling Over Tor.mp414.79MB
PETS 2020/The TV is Smart and Full of Trackers Measuring Smart TV Advertising and Tracking.mp416.25MB
PETS 2020/Tik-Tok The Utility of Packet Timing in Website Fingerprinting Attacks.mp49.88MB
PETS 2020/VideoDP A Flexible Platform for Video Analytics with Differential Privacy.mp413.94MB
PETS 2020/Website Fingerprinting with Website Oracles.mp413.2MB
PETS 2020/When Speakers Are All Ears Characterizing Misactivations of IoT Smart Speakers.mp414.02MB
PETS 2021/A calculus of tracking theory and practice.mp411MB
PETS 2021/A First Look at Private Communications in Video Games using Visual Features.mp412.39MB
PETS 2021/Automated Extraction and Presentation of Data Practices in Privacy Policies.mp414.08MB
PETS 2021/Awareness, Adoption, and Misconceptions of Web Privacy Tools.mp421.51MB
PETS 2021/Blocking Without Breaking Identification and Mitigation of Non-Essential IoT Traffic.mp421.27MB
PETS 2021/Controlled Functional Encryption Revisited Multi-Authority Extensions and Efficient Schemes.mp411.5MB
PETS 2021/CrowdNotifier Decentralized Privacy-Preserving Presence Tracing.mp413.89MB
PETS 2021/Data Portability between Online Services An Empirical Analysis on the Effectiveness of GDPR.mp416.6MB
PETS 2021/Defending Against Microphone-Based Attacks with Personalized Noise.mp411.53MB
PETS 2021/Defining Privacy How Users Interpret Technical Terms in Privacy Policies.mp414.31MB
PETS 2021/Did you know this camera tracks your mood Modeling People's Privacy Expectations and.mp415.03MB
PETS 2021/Differential Privacy at Risk Bridging Randomness and Privacy Budget.mp49.85MB
PETS 2021/Differentially Private Naive Bayes Classifier using Smooth Sensitivity.mp412.85MB
PETS 2021/Digital inequality through the lens of self-disclosure.mp411.84MB
PETS 2021/DNA Sequencing Flow Cells and the Security of the Molecular-Digital Interface.mp411.35MB
PETS 2021/Domain name encryption is not enough privacy leakage via IP-based website fingerprinting.mp411.98MB
PETS 2021/DPlis Boosting Utility of Differentially Private Deep Learning via Randomized Smoothing.mp412MB
PETS 2021/DyPS Dynamic, Private and Secure GWAS.mp413.1MB
PETS 2021/Déjà vu Abusing Browser Cache Headers to Identify and Track Online Users.mp416.52MB
PETS 2021/Efficient homomorphic evaluation of k-NN classifiers.mp411.18MB
PETS 2021/EL PASSO Efficient and Lightweight Privacy-preserving Single Sign On.mp47.84MB
PETS 2021/Exploring Mental Models of the Right to Informational Self-Determination of Office Workers.mp411.56MB
PETS 2021/Face-Off Adversarial Face Obfuscation.mp49.9MB
PETS 2021/Falcon Honest-Majority Maliciously Secure Framework for Private Deep Learning.mp410.88MB
PETS 2021/Fast Privacy-Preserving Punch Cards.mp410.98MB
PETS 2021/Faster homomorphic comparison operations for BGV and BFV.mp48.42MB
PETS 2021/FoggySight A Scheme for Facial Lookup Privacy.mp411.95MB
PETS 2021/Fortified Multi-Party Computation Taking Advantage of Simple Secure Hardware Modules.mp410.14MB
PETS 2021/Foundations of Ring Sampling.mp416.96MB
PETS 2021/Gage MPC Bypassing Residual Function Leakage for Non-Interactive MPC.mp411.65MB
PETS 2021/GANDaLF GAN for Data-Limited Fingerprinting.mp412.72MB
PETS 2021/Genome Reconstruction Attacks Against Genomic Data-Sharing Beacons.mp411.61MB
PETS 2021/Growing synthetic data through differentially-private vine copulas.mp418.93MB
PETS 2021/HashWires Hyperefficient Credential-Based Range Proofs.mp412.85MB
PETS 2021/Holes in the Geofence Privacy Vulnerabilities in Smart DNS Services.mp413.23MB
PETS 2021/HotPETs 2021 award and closing.mp45.39MB
PETS 2021/HotPETs 2021 Keynote PETs and DPAs perfect is the enemy of good - Marit Hansen.mp445.92MB
PETS 2021/HotPETs 2021 Session 1.mp446.81MB
PETS 2021/HotPETs 2021 Session 2.mp440.25MB
PETS 2021/I would have to evaluate their objections Privacy tensions between smart home device.mp413.87MB
PETS 2021/Less is More A privacy-respecting Android malware classifier using federated learning.mp412.55MB
PETS 2021/LogPicker Strengthening Certificate Transparency against covert adversaries.mp49.77MB
PETS 2021/Managing Potentially Intrusive Practices In The Browser A User-Centered Perspective.mp413.08MB
PETS 2021/Mercurial Signatures for Variable-Length Messages.mp48.97MB
PETS 2021/ML-CB Machine Learning Canvas Block.mp412.41MB
PETS 2021/Multiparty Homomorphic Encryption from Ring-Learning-With-Errors.mp411.9MB
PETS 2021/Oblivious DNS over HTTPS (ODoH) A Practical Privacy Enhancement to DNS.mp410.87MB
PETS 2021/On the (Im)Practicality of Adversarial Perturbation for Image Privacy.mp412.42MB
PETS 2021/PETS 2021 Awards and Closing.mp445.99MB
PETS 2021/PETS 2021 Welcome and Opening.mp410.56MB
PETS 2021/PETS2021 Town Hall.mp414.26MB
PETS 2021/Privacy Preference Signals Past, Present and Future.mp422.34MB
PETS 2021/Privacy-Preserving & Incrementally-Deployable Support for Certificate Transparency in Tor.mp49.29MB
PETS 2021/Privacy-Preserving Approximate k-Nearest-Neighbors Search that Hides Access, Query and.mp410.06MB
PETS 2021/Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces.mp413.06MB
PETS 2021/Private Stream Aggregation with Labels in the Standard Model.mp412MB
PETS 2021/privGAN Protecting GANs from membership inference attacks at low cost to utility.mp413.2MB
PETS 2021/Real-time Analysis of Privacy-(un)aware IoT Applications.mp415.84MB
PETS 2021/Residue-Free Computing.mp422.74MB
PETS 2021/Revisiting Membership Inference Under Realistic Assumptions.mp410.67MB
PETS 2021/Scalable Privacy-Preserving Distributed Learning.mp414.76MB
PETS 2021/Scaling up Differentially Private Deep Learning with Fast Per-Example Gradient Clipping.mp49.39MB
PETS 2021/Secure integer division with a private divisor.mp412.66MB
PETS 2021/Secure Training of Decision Trees with Continuous Attributes.mp412.08MB
PETS 2021/SGX-MR Regulating Dataflows for Protecting Access Patterns of Data-Intensive SGX Applications.mp411.83MB
PETS 2021/SoK Efficient Privacy-preserving Clustering.mp410.75MB
PETS 2021/SoK Managing Longitudinal Privacy of Publicly Shared Personal Online Data.mp415.56MB
PETS 2021/SoK Privacy-Preserving Collaborative Tree-based Model Learning.mp411.83MB
PETS 2021/SoK Privacy-Preserving Computation Techniques for Deep Learning.mp49.72MB
PETS 2021/SoK Privacy-Preserving Reputation Systems.mp413.83MB
PETS 2021/Supervised Authorship Segmentation of Open Source Code Projects.mp414.8MB
PETS 2021/SwapCT Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges.mp412.79MB
PETS 2021/The Audio Auditor User-Level Membership Inference in Internet of Things Voice Services.mp412.43MB
PETS 2021/The CNAME of the Game Large-scale Analysis of DNS-based Tracking Evasion.mp49.04MB
PETS 2021/The Motivated Can Encrypt (Even with PGP).mp410MB
PETS 2021/The Role of Privacy in Digitalization - Analyzing Perspectives of German Farmers.mp413.55MB
PETS 2021/Three Years Later A Study of MAC Address Randomization In Mobile Devices And When It Succeeds.mp411.53MB
PETS 2021/Too Close for Comfort Morasses of (Anti-) Censorship in the Era of CDNs.mp48.5MB
PETS 2021/Unifying Privacy Policy Detection.mp416.75MB
PETS 2021/Unlinkable Updatable Hiding Databases and Privacy-Preserving Loyalty Programs artifact.mp49.84MB
PETS 2021/Unveiling Web Fingerprinting in the Wild Via Code Mining and Machine Learning.mp413.54MB
PETS 2021/Validity and Reliability of the Scale Internet Users’ Information Privacy Concerns (IUIPC).mp414.49MB
PETS 2021/Warn Them or Just Block Them Comparing Privacy Concerns of Older and Working Age Adults.mp49.96MB
PETS 2021/We, three brothers have always known everything of each other A Cross-cultural Study of.mp410MB
PETS 2021/Website Fingerprinting in the Age of QUIC.mp410.64MB
PETS 2021/Who Can Find My Devices Security and Privacy of Apple's Crowd-Sourced Bluetooth Location.mp413.4MB
PETS 2021/You May Also Like. Privacy Recommendation Systems Meet PIR.mp49.38MB
PETS 2021/zkSENSE A Friction-less Privacy-Preserving Human Attestation Mechanism for Mobile Devices.mp423.23MB
PETS 2022/(epsilon, delta)-Indistinguishable Mixing for Cryptocurrencies.mp48.51MB
PETS 2022/3LegRace Privacy-Preserving DNN Training over TEEs and GPUs.mp48.91MB
PETS 2022/A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance.mp47.02MB
PETS 2022/A Multi-Region Investigation of Use and Perceptions of Smart Home Devices.mp46.5MB
PETS 2022/A novel reconstruction attack on foreign-trade official statistics, with a Brazilian case study.mp49.43MB
PETS 2022/Adversarial Images Against Super-Resolution Convolutional Neural Networks for Free.mp413.09MB
PETS 2022/All apps do this - Comparing Privacy Concerns Towards Privacy Tools and Non-Privacy Tools f.mp48.14MB
PETS 2022/Analyzing the Monetization Ecosystem of Stalkerware.mp410.67MB
PETS 2022/Are iPhones Really Better for Privacy A Comparative Study of iOS and Android Apps.mp47.09MB
PETS 2022/Are You Really Muted A Privacy Analysis of Mute Buttons in Video Conferencing Apps.mp46.9MB
PETS 2022/AriaNN Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing.mp47.05MB
PETS 2022/ATOM A Generalizable Technique for Inferring Tracker-Advertiser Data Sharing in the Online.mp46.27MB
PETS 2022/Building a Privacy-Preserving Smart Camera System.mp48.64MB
PETS 2022/Charting App Developers' Journey Through Privacy Regulation Features in Ad Networks.mp47.07MB
PETS 2022/Checking Websites' GDPR Consent Compliance for Marketing Emails.mp48.74MB
PETS 2022/Collection, Usage and Privacy of Mobility Data in the Enterprise and Public Administrations.mp411.15MB
PETS 2022/Comprehensive Analysis of Privacy Leakage in Vertical Federated Learning During Prediction.mp49.25MB
PETS 2022/Connect the Dots Tighter Discrete Approximations of Privacy Loss Distributions.mp47.61MB
PETS 2022/DALock Password Distribution-Aware Throttling.mp47.5MB
PETS 2022/DataProVe Fully Automated Conformance Verification Between Data Protection Policies and Sys.mp411.34MB
PETS 2022/Deletion Inference, Reconstruction, and Compliance in Machine (Un)Learning.mp48.8MB
PETS 2022/Developers Say the Darnedest Things.mp47.84MB
PETS 2022/Differentially private partition selection.mp412.83MB
PETS 2022/Disparate Vulnerability to Membership Inference Attacks artifact.mp46.3MB
PETS 2022/Efficient Set Membership using MPC-in-the-Head.mp46.55MB
PETS 2022/Exploring the Privacy Concerns of Bystanders in Smart Homes from the Perspectives of both Ow.mp411.48MB
PETS 2022/FingerprinTV Fingerprinting Smart TV Apps.mp49.83MB
PETS 2022/Flexible and scalable privacy assessment for very large datasets with an application to offi.mp410.73MB
PETS 2022/Formalizing and Estimating Distribution Inference Risks.mp47.75MB
PETS 2022/Forward and Backward-Secure Range-Searchable Symmetric Encryption.mp412.16MB
PETS 2022/FP-Radar Longitudinal Measurement and Early Detection of Browser Fingerprinting.mp49.71MB
PETS 2022/From - Onion Not Found - to Guard Discovery.mp412.35MB
PETS 2022/Fully Secure PSI via MPC-in-the-Head.mp47.4MB
PETS 2022/gOTzilla Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application.mp410.16MB
PETS 2022/Hidden Issuer Anonymous Credential.mp47.94MB
PETS 2022/Homomorphically counting elements with the same property.mp46.21MB
PETS 2022/HotPETs Invited Talk Learning from Low-Tech PETS - Susan McGregor.mp437.81MB
PETS 2022/HotPETs Invitied Talk The Right To Ask project - Vanessa Teague.mp421.43MB
PETS 2022/HotPETs Keynote Each of us is a micro-media - Tanya Lokot.mp453.25MB
PETS 2022/HotPETs Opening Keynote Elissa M. Redmiles.mp444.6MB
PETS 2022/How Not to Handle Keys Timing Attacks on FIDO Authenticator Privacy.mp411.92MB
PETS 2022/How to prove any NP statement jointly Efficient Distributed-prover Zero-Knowledge Protocols.mp47.01MB
PETS 2022/How Usable Are iOS App Privacy Labels.mp47.81MB
PETS 2022/I know what you did on Venmo Discovering privacy leaks in mobile social payments.mp48.92MB
PETS 2022/In Search of Lost Utility Private Location Data.mp46.07MB
PETS 2022/Increasing Adoption of Tor Browser Using Informational and Planning Nudges.mp48.49MB
PETS 2022/Integrating Privacy into the Electric Vehicle Charging Architecture.mp47.12MB
PETS 2022/Investigating GDPR Fines in the Light of Data Flows.mp47.47MB
PETS 2022/It Feels Like Whack-a-mole - User Experiences of Data Removal from People Search Websites.mp48.61MB
PETS 2022/Keeping Privacy Labels Honest.mp46.52MB
PETS 2022/Knowledge Cross-Distillation for Membership Privacy.mp48.77MB
PETS 2022/Leave no Data Behind - Empirical Insights into Data Erasure from Online Services.mp410.26MB
PETS 2022/LLAMA A Low Latency Math Library for Secure Inference.mp46.58MB
PETS 2022/Machine Learning with Differentially Private Labels Mechanisms and Frameworks.mp47.82MB
PETS 2022/Making the Most of Parallel Composition in Differential Privacy.mp47.03MB
PETS 2022/MLEFlow Learning from History to Improve Load Balancing in Tor.mp47.31MB
PETS 2022/Multiparty Reach and Frequency Histogram Private, Secure and Practical.mp47.98MB
PETS 2022/My Cookie is a phoenix detection, measurement, and lawfulness of cookie respawning with bro.mp47.42MB
PETS 2022/Neural Fuzzy Extractors.mp48.52MB
PETS 2022/OmniCrawl Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers.mp46.58MB
PETS 2022/On Defeating Graph Analysis of Anonymous Transactions.mp47.66MB
PETS 2022/On the Challenges of Developing a Concise Questionnaire to Identify Privacy Personas.mp47.48MB
PETS 2022/On the Cost of Suppressing Volume for Encrypted Multi-maps.mp46.5MB
PETS 2022/On the Feasibility of Linking Attack to Google Apple Exposure Notification Framework.mp48.43MB
PETS 2022/OrgAn Organizational Anonymity with Low Latency.mp410.98MB
PETS 2022/PETS 2022 Awards and Closing.mp456.1MB
PETS 2022/PETS 2022 Moti Yung Keynote Privacy Integrated Computing” Cryptographic Protocols in Practice.mp4100.61MB
PETS 2022/PETS 2022 Town Hall.mp465.88MB
PETS 2022/PETS 2022 Welcome and Opening.mp437.83MB
PETS 2022/Pika Secure Computation using Function Secret Sharing over Rings.mp48.37MB
PETS 2022/Polaris Transparent Succinct Zero-Knowledge Arguments for R1CS with Efficient Verifier.mp47.37MB
PETS 2022/Polymath Low-Latency MPC via Secure Polynomial Evaluations and its Applications.mp46.38MB
PETS 2022/Privacy accounting εconomics.mp44.63MB
PETS 2022/Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies.mp47.94MB
PETS 2022/Privacy-preserving FairSwap Fairness and Privacy Interplay.mp49.12MB
PETS 2022/Privacy-preserving High-dimensional Data Collection with Federated Generative Autoencoder.mp48.45MB
PETS 2022/Privacy-Preserving training of tree ensembles over continuous data.mp411.85MB
PETS 2022/PrivacyScout Assessing Vulnerability to Shoulder Surfing on Mobile Devices.mp47.11MB
PETS 2022/Private Aggregation of Trajectories.mp47.31MB
PETS 2022/Privately Connecting Mobility to Infectious Diseases via Applied Cryptography.mp48.13MB
PETS 2022/Proof-of-Vax Studying User Preferences and Perception of Covid Vaccination Certificates.mp46.15MB
PETS 2022/RegulaTor A Straightforward Website Fingerprinting Defense.mp47.06MB
PETS 2022/Replay (Far) Away Exploiting and Fixing Google Apple Exposure Notification Contact Tracing.mp47.87MB
PETS 2022/Setting the Bar Low Are Websites Complying With the Minimum Requirements of the CCPA.mp48.54MB
PETS 2022/SoK Assumptions underlying Cryptocurrency Deanonymizations - A Taxonomy for Scientific Expe.mp45.65MB
PETS 2022/SoK Cryptographic Confidentiality of Data on Mobile Devices.mp46.45MB
PETS 2022/SoK Plausibly Deniable Storage.mp47.28MB
PETS 2022/SoK Privacy-enhancing Smart Home Hubs.mp48.84MB
PETS 2022/SoK TEE-assisted Confidential Smart Contract.mp47.49MB
PETS 2022/The Effectiveness of Adaptation Methods in Improving User Engagement and Privacy Protection.mp49.1MB
PETS 2022/Time- and Space-Efficient Aggregate Range Queries over Encrypted Databases.mp45.23MB
PETS 2022/Toward Uncensorable, Anonymous and Private Access Over Satoshi Blockchains.mp47.6MB
PETS 2022/Towards Improving Code Stylometry Analysis in Underground Forums.mp45.91MB
PETS 2022/Towards Sparse Federated Analytics Location Heatmaps under Distributed Differential Privacy.mp47.94MB
PETS 2022/Trace Oddity Methodologies for Data-Driven Traffic Analysis on Tor.mp48.87MB
PETS 2022/Ulixes Facial Recognition Privacy with Adversarial Machine Learning.mp412.35MB
PETS 2022/Understanding Privacy-Related Advice on Stack Overflow.mp47.57MB
PETS 2022/Understanding Utility and Privacy of Demographic Data in Education Technology by Causal Ana.mp45.85MB
PETS 2022/Updatable Private Set Intersection.mp46.81MB
PETS 2022/User Perceptions of Gmail’s Confidential Mode.mp47.09MB
PETS 2022/User-friendly yet rarely read A case study on the redesign of an online HIPAA authorization.mp49.71MB
PETS 2022/User-Level Label Leakage from Gradients in Federated Learning.mp46.72MB
PETS 2022/Visualizing Privacy-Utility Trade-Offs in Differentially Private Data Releases.mp46.87MB
PETS 2022/Watch Over Your TV A Security and Privacy Analysis of the Android TV ecosystem.mp47.3MB
PETS 2022/We may share the number of diaper changes.mp413.28MB
PETS 2022/Who Knows I Like Jelly Beans An Investigation Into Search Privacy.mp47.55MB
PETS 2022/XORBoost Tree Boosting in the Multiparty Computation Setting.mp46.36MB
PETS 2022/Zen and the art of model adaptation Low-utility-cost attack mitigations in collaborative ML.mp410.74MB
PETS 2022/ZoomP³ Privacy-Preserving Publishing of Online Video Conference Recordings.mp49.97MB
PETS 2022/Zswap zk-SNARK Based Non-Interactive Multi-Asset Swaps.mp412.77MB