
PoPETs Proceedings — Volume 2015
Volume 2015 Issue 1 Editors’ Introduction Apu Kapadia (Indiana University Bloomington), Steven J. Murdoch (University College London) 20,000 In League Under the Sea: Anonymous …
Analyzing the Great Firewall of China Over Space and Time
Volume: 2015 Issue: 1 Pages: 61–76 DOI: https://doi.org/10.1515/popets-2015-0005 Download PDF Abstract: A nation-scale firewall, colloquially referred to as the “Great Firewall of China,” …
Proceedings on Privacy Enhancing Technologies 2015; 2015 (1):61–76 Roya Ensafi*, Philipp Winter, Abdullah Mueen, and Jedidiah R. Crandall
PoPETs Proceedings — DP5: A Private Presence Service
Issue: 2 Pages: 4–24 DOI: https://doi.org/10.1515/popets-2015-0008 Download PDF Abstract: Users of social applications like to be notified when their friends are online. Typically, this is …
Keywords: Data Privacy, Obfuscation, Utility, Differen-tial Privacy, Distortion Privacy, Inference Attack, Prior Knowledge, Optimization, Game Theory DOI 10.1515/popets-2015-0024 …
PoPETs Proceedings — Substring-Searchable Symmetric Encryption
Volume: 2015 Issue: 2 Pages: 263–281 DOI: Download PDF Abstract: In this paper, we consider a setting where a client wants to outsource storage of a large amount of private data and then …
Keywords: searchable encryption, suffix trees, substring search, cloud storage DOI 10.1515/popets-2015-0014 Received 2015-02-15; revised 2015-05-15; accepted 2015-05-15.
PoPETs Proceedings — Practical Forward-Secure Range and Sort …
Volume: 2015 Issue: 2 Pages: 81–98 DOI: https://doi.org/10.1515/popets-2015-0015 Download PDF
An Automated Approach for Complementing Ad Blockers’ Blacklists
Volume: 2015 Issue: 2 Pages: 282–298 DOI: https://doi.org/10.1515/popets-2015-0018 Download PDF Abstract: Privacy in the Web has become a major concern resulting in the popular use of …
Proceedings on Privacy Enhancing Technologies 2015; 2015 (2):282–298 David Gugelmann*, Markus Happe, Bernhard Ager, and Vincent Lenders