About 1,500 results
Open links in new tab
  1. PoPETs Proceedings — Volume 2015

    Volume 2015 Issue 1 Editors’ Introduction Apu Kapadia (Indiana University Bloomington), Steven J. Murdoch (University College London) 20,000 In League Under the Sea: Anonymous …

  2. Proceedings on Privacy Enhancing Technologies 2015; 2015 (1):61–76 Roya Ensafi*, Philipp Winter, Abdullah Mueen, and Jedidiah R. Crandall

  3. Analyzing the Great Firewall of China Over Space and Time

    Volume: 2015 Issue: 1 Pages: 61–76 DOI: https://doi.org/10.1515/popets-2015-0005 Download PDF Abstract: A nation-scale firewall, colloquially referred to as the “Great Firewall of China,” …

  4. Keywords: searchable encryption, suffix trees, substring search, cloud storage DOI 10.1515/popets-2015-0014 Received 2015-02-15; revised 2015-05-15; accepted 2015-05-15.

  5. Finally, we are grateful to Silent Circle for their sup-port as Proceedings Sponsor for the first two issues cor-responding to PETS 2015, allowing us to waive article processing charges for this …

  6. extended by de-veloping more sophisticated DNS hijacking attacks that allow all traffic to be transparently Keywords: VPN, IPV6, DNS hijacking DOI 10.1515/popets-2015-0006 Received …

  7. with the three guard scheme and the one guard proposal. We show guard sets do provide increased re-sistance to a number of attacks, while foreseeing no sig-nifica DOI …

  8. Proceedings on Privacy Enhancing Technologies 2015; 2015 (1):41–60 Yan Shoshitaishvili*, Christopher Kruegel, and Giovanni Vigna

  9. Toward Mending Two Nation-Scale Brokered Identification Systems

    Volume: 2015 Issue: 2 Pages: 135–155 DOI: https://doi.org/10.1515/popets-2015-0022 Download PDF

  10. Editors’ Introduction DOI 10.1515/popets-2015-0025 annual Privacy Enhancing Tech-nologies Symposium (PETS). Articles submitted to this issue were reviewed by an Editorial Board of 66 …