skip to main content
10.5555/2032162guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
PETS'11: Proceedings of the 11th international conference on Privacy enhancing technologies
2011 Proceeding
  • Editors:
  • Simone Fischer-H�bner,
  • Nicholas Hopper
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
Conference:
Waterloo ON Canada July 27 - 29, 2011
ISBN:
978-3-642-22262-7
Published:
27 July 2011
Sponsors:
Microsoft

Reflects downloads up to 19 Oct 2024Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
Article
How unique and traceable are usernames?
Pages 1–17

Usernames are ubiquitously used for identification and authentication purposes on web services and the Internet at large, ranging from the local-part of email addresses to identifiers in social networks. Usernames are generally alphanumerical strings ...

Article
Text classification for data loss prevention
Pages 18–37

Businesses, governments, and individuals leak confidential information, both accidentally and maliciously, at tremendous cost in money, privacy, national security, and reputation. Several security software vendors now offer "data loss prevention" (DLP) ...

Article
P3CA: private anomaly detection across ISP networks
Pages 38–56

Detection of malicious traffic in the Internet would be much easier if ISP networks shared their traffic traces. Unfortunately, state-ofthe-art anomaly detection algorithms require detailed traffic information which is considered extremely private by ...

Article
Quantifying location privacy: the case of sporadic location exposure
Pages 57–76

Mobile users expose their location to potentially untrusted entities by using location-based services. Based on the frequency of location exposure in these applications, we divide them into two main types: Continuous and Sporadic. These two location ...

Article
Privacy in mobile computing for location-sharing-based services
Pages 77–96

Location-Sharing-Based Services (LSBS) complement Location-Based Services by using locations from a group of users, and not just individuals, to provide some contextualized service based on the locations in the group. However, there are growing concerns ...

Article
On the practicality of UHF RFID fingerprinting: how real is the RFID tracking problem?
Pages 97–116

In this work, we demonstrate the practicality of people tracking by means of physical-layer fingerprints of RFID tags that they carry. We build a portable low-cost USRP-based RFID fingerprinter and we show, over a set of 210 EPC C1G2 tags, that this ...

Article
An accurate system-wide anonymity metric for probabilistic attacks
Pages 117–133

We give a critical analysis of the system-wide anonymity metric of Edman et al. [3], which is based on the permanent value of a doubly-stochastic matrix. By providing an intuitive understanding of the permanent of such a matrix, we show that a metric ...

Article
DefenestraTor: throwing out windows in Tor
Pages 134–154

Tor is one of the most widely used privacy enhancing technologies for achieving online anonymity and resisting censorship. While conventional wisdom dictates that the level of anonymity offered by Tor increases as its user base grows, the most ...

Article
Privacy-implications of performance-based peer selection by onion-routers: a real-world case study using I2P
Pages 155–174

I2P is one of the most widely used anonymizing Peer-to-Peer networks on the Internet today. Like Tor, it uses onion routing to build tunnels between peers as the basis for providing anonymous communication channels. Unlike Tor, I2P integrates a range of ...

Article
Privacy-friendly aggregation for the smart-grid
Pages 175–191

The widespread deployment of smart meters for the modernisation of the electricity distribution network, but also for gas and water consumption, has been associated with privacy concerns due to the potentially large number of measurements that reflect ...

Article
Plug-in privacy for smart metering billing
Pages 192–210

Traditional electricity meters are replaced by Smart Meters in customers' households. Smart Meters collect fine-grained utility consumption profiles from customers, which in turn enables the introduction of dynamic, time-of-use tariffs. However, the ...

Article
Scramble! your social network data
Pages 211–225

Social network sites (SNS) allow users to share information with friends, family, and other contacts. However, current SNS sites such as Facebook or Twitter assume that users trust SNS providers with the access control of their data. In this paper we ...

Article
A constraint satisfaction cryptanalysis of bloom filters in private record linkage
Pages 226–245

For over fifty years, "record linkage" procedures have been refined to integrate data in the face of typographical and semantic errors. These procedures are traditionally performed over personal identifiers (e.g., names), but in modern decentralized ...

Article
Efficient proofs of attributes in pairing-based anonymous credential system
Pages 246–263

An anonymous credential system allows the user to convince a verifier of the possession of a certificate issued by the issuing authority anonymously. One of the applications is the privacy-enhancing electronic ID (eID). A previously proposed anonymous ...

Article
Broker-based private matching
Pages 264–284

Private matching solutions allow two parties to find common data elements over their own datasets without revealing any additional private information. We propose a new concept involving an intermediate entity in the private matching process: we ...

Contributors
  • Karlstad University
  • University of Minnesota Twin Cities

Recommendations