
PoPETs Proceedings — Volume 2015
Volume 2015 Issue 1 Editors’ Introduction Apu Kapadia (Indiana University Bloomington), Steven J. Murdoch (University College London) 20,000 In League Under the Sea: Anonymous Communication, …
Proceedings on Privacy Enhancing Technologies 2015; 2015 (1):61–76 Roya Ensafi*, Philipp Winter, Abdullah Mueen, and Jedidiah R. Crandall
Analyzing the Great Firewall of China Over Space and Time
Volume: 2015 Issue: 1 Pages: 61–76 DOI: https://doi.org/10.1515/popets-2015-0005 Download PDF Abstract: A nation-scale firewall, colloquially referred to as the “Great Firewall of China,” implements …
Keywords: searchable encryption, suffix trees, substring search, cloud storage DOI 10.1515/popets-2015-0014 Received 2015-02-15; revised 2015-05-15; accepted 2015-05-15.
Finally, we are grateful to Silent Circle for their sup-port as Proceedings Sponsor for the first two issues cor-responding to PETS 2015, allowing us to waive article processing charges for this volume.
extended by de-veloping more sophisticated DNS hijacking attacks that allow all traffic to be transparently Keywords: VPN, IPV6, DNS hijacking DOI 10.1515/popets-2015-0006 Received …
with the three guard scheme and the one guard proposal. We show guard sets do provide increased re-sistance to a number of attacks, while foreseeing no sig-nifica DOI 10.1515/popets-2015-0017 …
Proceedings on Privacy Enhancing Technologies 2015; 2015 (1):41–60 Yan Shoshitaishvili*, Christopher Kruegel, and Giovanni Vigna
Toward Mending Two Nation-Scale Brokered Identification Systems
Volume: 2015 Issue: 2 Pages: 135–155 DOI: https://doi.org/10.1515/popets-2015-0022 Download PDF
Editors’ Introduction DOI 10.1515/popets-2015-0025 annual Privacy Enhancing Tech-nologies Symposium (PETS). Articles submitted to this issue were reviewed by an Editorial Board of 66 mem …