Search dblp for Publications

export results for "stream:streams/journals/popets:"

 download as .bib file

@article{DBLP:journals/popets/AgarwalHKM19,
  author    = {Archita Agarwal and
               Maurice Herlihy and
               Seny Kamara and
               Tarik Moataz},
  title     = {Encrypted Databases for Differential Privacy},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {3},
  pages     = {170--190},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0042},
  doi       = {10.2478/popets-2019-0042},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/AgarwalHKM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/AkaviaGHL19,
  author    = {Adi Akavia and
               Craig Gentry and
               Shai Halevi and
               Max Leibovich},
  title     = {Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing
               Free},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {3},
  pages     = {87--107},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0038},
  doi       = {10.2478/popets-2019-0038},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/AkaviaGHL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/AlTawyG19,
  author    = {Riham AlTawy and
               Guang Gong},
  title     = {Mesh: {A} Supply Chain Solution with Locally Private Blockchain Transactions},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {3},
  pages     = {149--169},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0041},
  doi       = {10.2478/popets-2019-0041},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/AlTawyG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/AlexanderEC19,
  author    = {Geoffrey Alexander and
               Antonio M. Espinoza and
               Jedidiah R. Crandall},
  title     = {Detecting {TCP/IP} Connections via {IPID} Hash Collisions},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {4},
  pages     = {311--328},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0071},
  doi       = {10.2478/popets-2019-0071},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/AlexanderEC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/AmjadKM19,
  author    = {Ghous Amjad and
               Seny Kamara and
               Tarik Moataz},
  title     = {Breach-Resistant Structured Encryption},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {1},
  pages     = {245--265},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0014},
  doi       = {10.2478/popets-2019-0014},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/AmjadKM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ApthorpeHRNF19,
  author    = {Noah J. Apthorpe and
               Danny Yuxing Huang and
               Dillon Reisman and
               Arvind Narayanan and
               Nick Feamster},
  title     = {Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {3},
  pages     = {128--148},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0040},
  doi       = {10.2478/popets-2019-0040},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/ApthorpeHRNF19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ArfaouiBFNO19,
  author    = {Ghada Arfaoui and
               Xavier Bultel and
               Pierre{-}Alain Fouque and
               Adina Nedelcu and
               Cristina Onete},
  title     = {The privacy of the {TLS} 1.3 protocol},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {4},
  pages     = {190--210},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0065},
  doi       = {10.2478/popets-2019-0065},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/ArfaouiBFNO19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BarbosaPYW19,
  author    = {Nat{\~{a}} Miccael Barbosa and
               Joon S. Park and
               Yaxing Yao and
               Yang Wang},
  title     = {"What if?" Predicting Individual Users' Smart Home Privacy Preferences
               and Their Changes},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {4},
  pages     = {211--231},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0066},
  doi       = {10.2478/popets-2019-0066},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/BarbosaPYW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BeckerLS19,
  author    = {Johannes K. Becker and
               David Li and
               David Starobinski},
  title     = {Tracking Anonymized Bluetooth Devices},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {3},
  pages     = {50--65},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0036},
  doi       = {10.2478/popets-2019-0036},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/BeckerLS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BhatLKD19,
  author    = {Sanjit Bhat and
               David Lu and
               Albert Kwon and
               Srinivas Devadas},
  title     = {Var-CNN: {A} Data-Efficient Website Fingerprinting Attack Based on
               Deep Learning},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {4},
  pages     = {292--310},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0070},
  doi       = {10.2478/popets-2019-0070},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/BhatLKD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BorgaonkarHPS19,
  author    = {Ravishankar Borgaonkar and
               Lucca Hirschi and
               Shinjo Park and
               Altaf Shaik},
  title     = {New Privacy Threat on 3G, 4G, and Upcoming 5G {AKA} Protocols},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {3},
  pages     = {108--127},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0039},
  doi       = {10.2478/popets-2019-0039},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/BorgaonkarHPS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BostF19,
  author    = {Raphael Bost and
               Pierre{-}Alain Fouque},
  title     = {Security-Efficiency Tradeoffs in Searchable Encryption},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {4},
  pages     = {132--151},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0062},
  doi       = {10.2478/popets-2019-0062},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/BostF19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ChanyaswadLM19,
  author    = {Thee Chanyaswad and
               Changchang Liu and
               Prateek Mittal},
  title     = {RON-Gauss: Enhancing Utility in Non-Interactive Private Data Release},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {1},
  pages     = {26--46},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0003},
  doi       = {10.2478/popets-2019-0003},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/ChanyaswadLM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/Chatzikokolakis19,
  author    = {Konstantinos Chatzikokolakis and
               Carmela Troncoso},
  title     = {Editors' Introduction},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {1},
  pages     = {1--4},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0001},
  doi       = {10.2478/popets-2019-0001},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/Chatzikokolakis19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/Chatzikokolakis19a,
  author    = {Kostas Chatzikokolakis and
               Carmela Troncoso},
  title     = {Editors' Introduction},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {2},
  pages     = {1--4},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0016},
  doi       = {10.2478/popets-2019-0016},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/Chatzikokolakis19a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/Chatzikokolakis19b,
  author    = {Kostas Chatzikokolakis and
               Carmela Troncoso},
  title     = {Editors' Introduction},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {3},
  pages     = {1--5},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0033},
  doi       = {10.2478/popets-2019-0033},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/Chatzikokolakis19b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/Chatzikokolakis19c,
  author    = {Kostas Chatzikokolakis and
               Carmela Troncoso},
  title     = {Editors' Introduction},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {4},
  pages     = {1--5},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0055},
  doi       = {10.2478/popets-2019-0055},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/Chatzikokolakis19c.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ChenCS19,
  author    = {Chen Chen and
               Anrin Chakraborti and
               Radu Sion},
  title     = {{PD-DM:} An efficient locality-preserving block device mapper with
               plausible deniability},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {1},
  pages     = {153--171},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0009},
  doi       = {10.2478/popets-2019-0009},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/ChenCS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DauberCHSWNG19,
  author    = {Edwin Dauber and
               Aylin Caliskan and
               Richard E. Harang and
               Gregory Shearer and
               Michael Weisman and
               Frederica Nelson and
               Rachel Greenstadt},
  title     = {Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete
               Source Code Fragments},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {3},
  pages     = {389--408},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0053},
  doi       = {10.2478/popets-2019-0053},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/DauberCHSWNG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DesfontainesLB19,
  author    = {Damien Desfontaines and
               Andreas Lochbihler and
               David A. Basin},
  title     = {Cardinality Estimators do not Preserve Privacy},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {2},
  pages     = {26--46},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0018},
  doi       = {10.2478/popets-2019-0018},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/DesfontainesLB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DeuberEFMSTBD19,
  author    = {Dominic Deuber and
               Christoph Egger and
               Katharina Fech and
               Giulio Malavolta and
               Dominique Schr{\"{o}}der and
               Sri Aravinda Krishnan Thyagarajan and
               Florian Battke and
               Claudia Durand},
  title     = {My Genome Belongs to Me: Controlling Third Party Computation on Genomic
               Data},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {1},
  pages     = {108--132},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0007},
  doi       = {10.2478/popets-2019-0007},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/DeuberEFMSTBD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/FragkouliAF19,
  author    = {Georgia Fragkouli and
               Katerina J. Argyraki and
               Bryan Ford},
  title     = {MorphIT: Morphing Packet Reports for Internet Transparency},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {2},
  pages     = {88--104},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0021},
  doi       = {10.2478/popets-2019-0021},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/FragkouliAF19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GaoFSB19,
  author    = {Chuhan Gao and
               Kassem Fawaz and
               Sanjib Sur and
               Suman Banerjee},
  title     = {Privacy Protection for Audio Sensing Against Multi-Microphone Adversaries},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {2},
  pages     = {146--165},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0024},
  doi       = {10.2478/popets-2019-0024},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/GaoFSB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GerberRV19,
  author    = {Nina Gerber and
               Benjamin Reinheimer and
               Melanie Volkamer},
  title     = {Investigating People's Privacy Risk Perception},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {3},
  pages     = {267--288},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0047},
  doi       = {10.2478/popets-2019-0047},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/GerberRV19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GroceRR19,
  author    = {Adam Groce and
               Peter Rindal and
               Mike Rosulek},
  title     = {Cheaper Private Set Intersection via Differentially Private Leakage},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {3},
  pages     = {6--25},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0034},
  doi       = {10.2478/popets-2019-0034},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/GroceRR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GunnPA19,
  author    = {Lachlan J. Gunn and
               Ricardo Vieitez Parra and
               N. Asokan},
  title     = {Circumventing Cryptographic Deniability with Remote Attestation},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {3},
  pages     = {350--369},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0051},
  doi       = {10.2478/popets-2019-0051},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/GunnPA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/HafizH19,
  author    = {Syed Mahbub Hafiz and
               Ryan Henry},
  title     = {A Bit More Than a Bit Is More Than a Bit Better: Faster (essentially)
               optimal-rate many-server {PIR}},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {4},
  pages     = {112--131},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0061},
  doi       = {10.2478/popets-2019-0061},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/HafizH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/HanleySWM19,
  author    = {Hans Hanley and
               Yixin Sun and
               Sameer Wagh and
               Prateek Mittal},
  title     = {DPSelect: {A} Differential Privacy Based Guard Relay Selection Algorithm
               for Tor},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {2},
  pages     = {166--186},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0025},
  doi       = {10.2478/popets-2019-0025},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/HanleySWM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/HayesMDC19,
  author    = {Jamie Hayes and
               Luca Melis and
               George Danezis and
               Emiliano De Cristofaro},
  title     = {{LOGAN:} Membership Inference Attacks Against Generative Models},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {1},
  pages     = {133--152},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0008},
  doi       = {10.2478/popets-2019-0008},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/HayesMDC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/HilprechtHB19,
  author    = {Benjamin Hilprecht and
               Martin H{\"{a}}rterich and
               Daniel Bernau},
  title     = {Monte Carlo and Reconstruction Membership Inference Attacks against
               Generative Models},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {4},
  pages     = {232--249},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0067},
  doi       = {10.2478/popets-2019-0067},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/HilprechtHB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/HoangOJY19,
  author    = {Thang Hoang and
               Muslum Ozgur Ozmen and
               Yeongjin Jang and
               Attila A. Yavuz},
  title     = {Hardware-Supported {ORAM} in Effect: Practical Oblivious Search and
               Update on Very Large Dataset},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {1},
  pages     = {172--191},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0010},
  doi       = {10.2478/popets-2019-0010},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/HoangOJY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KissNLAS19,
  author    = {{\'{A}}gnes Kiss and
               Masoud Naderpour and
               Jian Liu and
               N. Asokan and
               Thomas Schneider},
  title     = {SoK: Modular and Efficient Private Decision Tree Evaluation},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {2},
  pages     = {187--208},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0026},
  doi       = {10.2478/popets-2019-0026},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/KissNLAS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KollmannKB19,
  author    = {Stephan A. Kollmann and
               Martin Kleppmann and
               Alastair R. Beresford},
  title     = {Snapdoc: Authenticated snapshots with history privacy in peer-to-peer
               collaborative editing},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {3},
  pages     = {210--232},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0044},
  doi       = {10.2478/popets-2019-0044},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/KollmannKB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/Krehbiel19,
  author    = {Sara Krehbiel},
  title     = {Choosing Epsilon for Privacy as a Service},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {1},
  pages     = {192--205},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0011},
  doi       = {10.2478/popets-2019-0011},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/Krehbiel19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KuhnBSJS19,
  author    = {Christiane Kuhn and
               Martin Beck and
               Stefan Schiffner and
               Eduard A. Jorswieck and
               Thorsten Strufe},
  title     = {On Privacy Notions in Anonymous Communication},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {2},
  pages     = {105--125},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0022},
  doi       = {10.2478/popets-2019-0022},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/KuhnBSJS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KuykendallKR19,
  author    = {Benjamin Kuykendall and
               Hugo Krawczyk and
               Tal Rabin},
  title     = {Cryptography for {\#}MeToo},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {3},
  pages     = {409--429},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0054},
  doi       = {10.2478/popets-2019-0054},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/KuykendallKR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/Lehmann19,
  author    = {Anja Lehmann},
  title     = {ScrambleDB: Oblivious (Chameleon) Pseudonymization-as-a-Service},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {3},
  pages     = {289--309},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0048},
  doi       = {10.2478/popets-2019-0048},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/Lehmann19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/LiuHCWM19,
  author    = {Changchang Liu and
               Xi He and
               Thee Chanyaswad and
               Shiqiang Wang and
               Prateek Mittal},
  title     = {Investigating Statistical Privacy Frameworks from the Perspective
               of Hypothesis Testing},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {3},
  pages     = {233--254},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0045},
  doi       = {10.2478/popets-2019-0045},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/LiuHCWM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MahmoodASSZ19,
  author    = {Asad Mahmood and
               Faizan Ahmad and
               Zubair Shafiq and
               Padmini Srinivasan and
               Fareed Zaffar},
  title     = {A Girl Has No Name: Automated Authorship Obfuscation using Mutant-X},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {4},
  pages     = {54--71},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0058},
  doi       = {10.2478/popets-2019-0058},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/MahmoodASSZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MalkinDTWEW19,
  author    = {Nathan Malkin and
               Joe Deatrick and
               Allen Tong and
               Primal Wijesekera and
               Serge Egelman and
               David A. Wagner},
  title     = {Privacy Attitudes of Smart Speaker Users},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {4},
  pages     = {250--271},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0068},
  doi       = {10.2478/popets-2019-0068},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/MalkinDTWEW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MartinABBFFMRST19,
  author    = {Jeremy Martin and
               Douglas Alpuche and
               Kristina Bodeman and
               Lamont Brown and
               Ellis Fenske and
               Lucas Foppe and
               Travis Mayberry and
               Erik C. Rye and
               Brandon Sipes and
               Sam Teplov},
  title     = {Handoff All Your Privacy - {A} Review of Apple's Bluetooth Low Energy
               Continuity Protocol},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {4},
  pages     = {34--53},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0057},
  doi       = {10.2478/popets-2019-0057},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/MartinABBFFMRST19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MinaeiMLGK19,
  author    = {Mohsen Minaei and
               Mainack Mondal and
               Patrick Loiseau and
               Krishna P. Gummadi and
               Aniket Kate},
  title     = {Lethe: Conceal Content Deletion from Persistent Observers},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {1},
  pages     = {206--226},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0012},
  doi       = {10.2478/popets-2019-0012},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/MinaeiMLGK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MittosMC19,
  author    = {Alexandros Mittos and
               Bradley A. Malin and
               Emiliano De Cristofaro},
  title     = {Systematizing Genome Privacy Research: {A} Privacy-Enhancing Technologies
               Perspective},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {1},
  pages     = {87--107},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0006},
  doi       = {10.2478/popets-2019-0006},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/MittosMC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/NarainN19,
  author    = {Sashank Narain and
               Guevara Noubir},
  title     = {Mitigating Location Privacy Attacks on Mobile Devices using Dynamic
               App Sandboxing},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {2},
  pages     = {66--87},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0020},
  doi       = {10.2478/popets-2019-0020},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/NarainN19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/NaseriBZR19,
  author    = {Mohammad Naseri and
               Nataniel P. Borges Jr. and
               Andreas Zeller and
               Romain Rouvoy},
  title     = {AccessiLeaks: Investigating Privacy Leaks Exposed by the Android Accessibility
               Service},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {2},
  pages     = {291--305},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0031},
  doi       = {10.2478/popets-2019-0031},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/NaseriBZR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/NikitinBLUHF19,
  author    = {Kirill Nikitin and
               Ludovic Barman and
               Wouter Lueks and
               Matthew Underwood and
               Jean{-}Pierre Hubaux and
               Bryan Ford},
  title     = {Reducing Metadata Leakage from Encrypted Files and Communication with
               PURBs},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {4},
  pages     = {6--33},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0056},
  doi       = {10.2478/popets-2019-0056},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/NikitinBLUHF19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/OhSH19,
  author    = {Se Eun Oh and
               Saikrishna Sunkam and
               Nicholas Hopper},
  title     = {p1-FP: Extraction, Classification, and Prediction of Website Fingerprints
               with Deep Learning},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {3},
  pages     = {191--209},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0043},
  doi       = {10.2478/popets-2019-0043},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/OhSH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/OlteanuHHH19,
  author    = {Alexandra{-}Mihaela Olteanu and
               Mathias Humbert and
               K{\'{e}}vin Huguenin and
               Jean{-}Pierre Hubaux},
  title     = {The (Co-)Location Sharing Game},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {2},
  pages     = {5--25},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0017},
  doi       = {10.2478/popets-2019-0017},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/OlteanuHHH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/PagninGTOS19,
  author    = {Elena Pagnin and
               Gunnar Gunnarsson and
               Pedram Talebi and
               Claudio Orlandi and
               Andrei Sabelfeld},
  title     = {TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {4},
  pages     = {93--111},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0060},
  doi       = {10.2478/popets-2019-0060},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/PagninGTOS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/PejoTB19,
  author    = {Balazs Pejo and
               Qiang Tang and
               Gergely Bicz{\'{o}}k},
  title     = {Together or Alone: The Price of Privacy in Collaborative Learning},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {2},
  pages     = {47--65},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0019},
  doi       = {10.2478/popets-2019-0019},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/PejoTB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/QasemZM19,
  author    = {Abdullah Qasem and
               Sami Zhioua and
               Karima Makhlouf},
  title     = {Finding a Needle in a Haystack: The Traffic Analysis Version},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {2},
  pages     = {270--290},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0030},
  doi       = {10.2478/popets-2019-0030},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/QasemZM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/RamokapaneMR19,
  author    = {Kopo M. Ramokapane and
               Anthony C. Mazeli and
               Awais Rashid},
  title     = {Skip, Skip, Skip, Accept!!!: {A} Study on the Usability of Smartphone
               Manufacturer Provided Default Features and User Privacy},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {2},
  pages     = {209--227},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0027},
  doi       = {10.2478/popets-2019-0027},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/RamokapaneMR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/RavalMP19,
  author    = {Nisarg Raval and
               Ashwin Machanavajjhala and
               Jerry Pan},
  title     = {Olympus: Sensor Privacy through Utility Aware Obfuscation},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {1},
  pages     = {5--25},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0002},
  doi       = {10.2478/popets-2019-0002},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/RavalMP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/RecabarrenC19,
  author    = {Ruben Recabarren and
               Bogdan Carbunar},
  title     = {Tithonus: {A} Bitcoin Based Censorship Resilient System},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {1},
  pages     = {68--86},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0005},
  doi       = {10.2478/popets-2019-0005},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/RecabarrenC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/RusertKHSS19,
  author    = {Jonathan Rusert and
               Osama Khalid and
               Dat Hong and
               Zubair Shafiq and
               Padmini Srinivasan},
  title     = {No Place to Hide: Inadvertent Location Privacy Leaks on Twitter},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {4},
  pages     = {172--189},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0064},
  doi       = {10.2478/popets-2019-0064},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/RusertKHSS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/SalemBHB19,
  author    = {Ahmed Salem and
               Pascal Berrang and
               Mathias Humbert and
               Michael Backes},
  title     = {Privacy-Preserving Similar Patient Queries for Combined Biomedical
               Data},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {1},
  pages     = {47--67},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0004},
  doi       = {10.2478/popets-2019-0004},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/SalemBHB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/SasyG19,
  author    = {Sajin Sasy and
               Ian Goldberg},
  title     = {ConsenSGX: Scaling Anonymous Communications Networks with Trusted
               Execution Environments},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {3},
  pages     = {331--349},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0050},
  doi       = {10.2478/popets-2019-0050},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/SasyG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/SchmittEMF19,
  author    = {Paul Schmitt and
               Anne Edmundson and
               Allison Mankin and
               Nick Feamster},
  title     = {Oblivious {DNS:} Practical Privacy for {DNS} Queries},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {2},
  pages     = {228--244},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0028},
  doi       = {10.2478/popets-2019-0028},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/SchmittEMF19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/SommerMM19,
  author    = {David M. Sommer and
               Sebastian Meiser and
               Esfandiar Mohammadi},
  title     = {Privacy Loss Classes: The Central Limit Theorem in Differential Privacy},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {2},
  pages     = {245--269},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0029},
  doi       = {10.2478/popets-2019-0029},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/SommerMM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/SwanbergGGRGB19,
  author    = {Marika Swanberg and
               Ira Globus{-}Harris and
               Iris Griffith and
               Anna M. Ritz and
               Adam Groce and
               Andrew Bray},
  title     = {Improved Differentially Private Analysis of Variance},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {3},
  pages     = {310--330},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0049},
  doi       = {10.2478/popets-2019-0049},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/SwanbergGGRGB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/SyBFF19,
  author    = {Erik Sy and
               Christian Burkert and
               Hannes Federrath and
               Mathias Fischer},
  title     = {A {QUIC} Look at Web Tracking},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {3},
  pages     = {255--266},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0046},
  doi       = {10.2478/popets-2019-0046},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/SyBFF19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/TrevisanTBM19,
  author    = {Martino Trevisan and
               Stefano Traverso and
               Eleonora Bassi and
               Marco Mellia},
  title     = {4 Years of {EU} Cookie Law: Results and Lessons Learned},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {2},
  pages     = {126--145},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0023},
  doi       = {10.2478/popets-2019-0023},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/TrevisanTBM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/TuenoKK19,
  author    = {Anselme Tueno and
               Florian Kerschbaum and
               Stefan Katzenbeisser},
  title     = {Private Evaluation of Decision Trees using Sublinear Cost},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {1},
  pages     = {266--286},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0015},
  doi       = {10.2478/popets-2019-0015},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/TuenoKK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/VenkatadriLSM19,
  author    = {Giridhari Venkatadri and
               Elena Lucherini and
               Piotr Sapiezynski and
               Alan Mislove},
  title     = {Investigating sources of {PII} used in Facebook's targeted advertising},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {1},
  pages     = {227--244},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0013},
  doi       = {10.2478/popets-2019-0013},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/VenkatadriLSM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/VinayagamurthyG19,
  author    = {Dhinakaran Vinayagamurthy and
               Alexey Gribov and
               Sergey Gorbunov},
  title     = {StealthDB: a Scalable Encrypted Database with Full {SQL} Query Support},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {3},
  pages     = {370--388},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0052},
  doi       = {10.2478/popets-2019-0052},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/VinayagamurthyG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/WaghGC19,
  author    = {Sameer Wagh and
               Divya Gupta and
               Nishanth Chandran},
  title     = {SecureNN: 3-Party Secure Computation for Neural Network Training},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {3},
  pages     = {26--49},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0035},
  doi       = {10.2478/popets-2019-0035},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/WaghGC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/WanJWWM19,
  author    = {Gerry Wan and
               Aaron Johnson and
               Ryan Wails and
               Sameer Wagh and
               Prateek Mittal},
  title     = {Guard Placement Attacks on Path Selection Algorithms for Tor},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {4},
  pages     = {272--291},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0069},
  doi       = {10.2478/popets-2019-0069},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/WanJWWM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/WangXLLL19,
  author    = {Qiaozhi Wang and
               Hao Xue and
               Fengjun Li and
               Dongwon Lee and
               Bo Luo},
  title     = {{\#}DontTweetThis: Scoring Private Information in Social Networks},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {4},
  pages     = {72--92},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0059},
  doi       = {10.2478/popets-2019-0059},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/WangXLLL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/WeerasingheMG19,
  author    = {Janith Weerasinghe and
               Kediel Morales and
               Rachel Greenstadt},
  title     = {"Because... {I} was told... so much": Linguistic Indicators of Mental
               Health Status on Twitter},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {4},
  pages     = {152--171},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0063},
  doi       = {10.2478/popets-2019-0063},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/WeerasingheMG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ZimmeckSSRWRRS19,
  author    = {Sebastian Zimmeck and
               Peter Story and
               Daniel Smullen and
               Abhilasha Ravichander and
               Ziqi Wang and
               Joel R. Reidenberg and
               N. Cameron Russell and
               Norman M. Sadeh},
  title     = {{MAPS:} Scaling Privacy Compliance Analysis to a Million Apps},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2019},
  number    = {3},
  pages     = {66--86},
  year      = {2019},
  url       = {https://doi.org/10.2478/popets-2019-0037},
  doi       = {10.2478/popets-2019-0037},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/ZimmeckSSRWRRS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/0006MSLM18,
  author    = {Matthew Smith and
               Daniel Moser and
               Martin Strohmeier and
               Vincent Lenders and
               Ivan Martinovic},
  title     = {Undermining Privacy in the Aircraft Communications Addressing and
               Reporting System {(ACARS)}},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {3},
  pages     = {105--122},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0023},
  doi       = {10.1515/popets-2018-0023},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/0006MSLM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/AlagganCG18,
  author    = {Mohammad Alaggan and
               Mathieu Cunche and
               S{\'{e}}bastien Gambs},
  title     = {Privacy-preserving Wi-Fi Analytics},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {2},
  pages     = {4--26},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0010},
  doi       = {10.1515/popets-2018-0010},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/AlagganCG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/AsharovHLR18,
  author    = {Gilad Asharov and
               Shai Halevi and
               Yehuda Lindell and
               Tal Rabin},
  title     = {Privacy-Preserving Search of Similar Patients in Genomic Data},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {4},
  pages     = {104--124},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0034},
  doi       = {10.1515/popets-2018-0034},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/AsharovHLR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BashirW18,
  author    = {Muhammad Ahmad Bashir and
               Christo Wilson},
  title     = {Diffusion of User Tracking Data in the Online Advertising Ecosystem},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {4},
  pages     = {85--103},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0033},
  doi       = {10.1515/popets-2018-0033},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/BashirW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BildKP18,
  author    = {Raffael Bild and
               Klaus A. Kuhn and
               Fabian Prasser},
  title     = {SafePub: {A} Truthful Data Anonymization Algorithm With Strong Privacy
               Guarantees},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {1},
  pages     = {67--87},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0004},
  doi       = {10.1515/popets-2018-0004},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/BildKP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BocovichG18,
  author    = {Cecylia Bocovich and
               Ian Goldberg},
  title     = {Secure asymmetry and deployability for decoy routing systems},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {3},
  pages     = {43--62},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0020},
  doi       = {10.1515/popets-2018-0020},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/BocovichG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DasBC18,
  author    = {Anupam Das and
               Nikita Borisov and
               Edward Chou},
  title     = {Every Move You Make: Exploring Practical Issues in Smartphone Motion
               Sensor Fingerprinting and Countermeasures},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {1},
  pages     = {88--108},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0005},
  doi       = {10.1515/popets-2018-0005},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/DasBC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DavidsonGSTV18,
  author    = {Alex Davidson and
               Ian Goldberg and
               Nick Sullivan and
               George Tankersley and
               Filippo Valsorda},
  title     = {Privacy Pass: Bypassing Internet Challenges Anonymously},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {3},
  pages     = {164--180},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0026},
  doi       = {10.1515/popets-2018-0026},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/DavidsonGSTV18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DemmlerRRT18,
  author    = {Daniel Demmler and
               Peter Rindal and
               Mike Rosulek and
               Ni Trieu},
  title     = {{PIR-PSI:} Scaling Private Contact Discovery},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {4},
  pages     = {159--178},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0037},
  doi       = {10.1515/popets-2018-0037},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/DemmlerRRT18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DeuberMMRSS18,
  author    = {Dominic Deuber and
               Matteo Maffei and
               Giulio Malavolta and
               Max Rabkin and
               Dominique Schr{\"{o}}der and
               Mark Simkin},
  title     = {Functional Credentials},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {2},
  pages     = {64--84},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0013},
  doi       = {10.1515/popets-2018-0013},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/DeuberMMRSS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/EnglehardtHN18,
  author    = {Steven Englehardt and
               Jeffrey Han and
               Arvind Narayanan},
  title     = {I never signed up for this! Privacy implications of email tracking},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {1},
  pages     = {109--126},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0006},
  doi       = {10.1515/popets-2018-0006},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/EnglehardtHN18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/EtemadKPE18,
  author    = {Mohammad Etemad and
               Alptekin K{\"{u}}p{\c{c}}{\"{u}} and
               Charalampos Papamanthou and
               David Evans},
  title     = {Efficient Dynamic Searchable Encryption with Forward Privacy},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {1},
  pages     = {5--20},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0002},
  doi       = {10.1515/popets-2018-0002},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/EtemadKPE18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/FoppeMMRB18,
  author    = {Lucas Foppe and
               Jeremy Martin and
               Travis Mayberry and
               Erik C. Rye and
               Lamont Brown},
  title     = {Exploiting {TLS} Client Authentication for Widespread User Tracking},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {4},
  pages     = {51--63},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0031},
  doi       = {10.1515/popets-2018-0031},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/FoppeMMRB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/FreybergerHAMM18,
  author    = {Michael Freyberger and
               Warren He and
               Devdatta Akhawe and
               Michelle L. Mazurek and
               Prateek Mittal},
  title     = {Cracking ShadowCrypt: Exploring the Limitations of Secure {I/O} Systems
               in Internet Browsers},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {2},
  pages     = {47--63},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0012},
  doi       = {10.1515/popets-2018-0012},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/FreybergerHAMM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GoldfederKRN18,
  author    = {Steven Goldfeder and
               Harry A. Kalodner and
               Dillon Reisman and
               Arvind Narayanan},
  title     = {When the cookie meets the blockchain: Privacy risks of web payments
               via cryptocurrencies},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {4},
  pages     = {179--199},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0038},
  doi       = {10.1515/popets-2018-0038},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/GoldfederKRN18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GreenstadtMT18,
  author    = {Rachel Greenstadt and
               Damon McCoy and
               Carmela Troncoso},
  title     = {Editors' Introduction},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {1},
  pages     = {1--4},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0001},
  doi       = {10.1515/popets-2018-0001},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/GreenstadtMT18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GreenstadtMT18a,
  author    = {Rachel Greenstadt and
               Damon McCoy and
               Carmela Troncoso},
  title     = {Editors' Introduction},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {2},
  pages     = {1--3},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0009},
  doi       = {10.1515/popets-2018-0009},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/GreenstadtMT18a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GreenstadtMT18b,
  author    = {Rachel Greenstadt and
               Damon McCoy and
               Carmela Troncoso},
  title     = {Editors' Introduction},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {3},
  pages     = {1--4},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0017},
  doi       = {10.1515/popets-2018-0017},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/GreenstadtMT18b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GreenstadtMT18c,
  author    = {Rachel Greenstadt and
               Damon McCoy and
               Carmela Troncoso},
  title     = {Editors' Introduction},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {4},
  pages     = {1--4},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0028},
  doi       = {10.1515/popets-2018-0028},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/GreenstadtMT18c.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/HesamifardTGW18,
  author    = {Ehsan Hesamifard and
               Hassan Takabi and
               Mehdi Ghasemi and
               Rebecca N. Wright},
  title     = {Privacy-preserving Machine Learning as a Service},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {3},
  pages     = {123--142},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0024},
  doi       = {10.1515/popets-2018-0024},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/HesamifardTGW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ImaniBW18,
  author    = {Mohsen Imani and
               Armon Barton and
               Matthew Wright},
  title     = {Guard Sets in Tor using {AS} Relationships},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {1},
  pages     = {145--165},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0008},
  doi       = {10.1515/popets-2018-0008},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/ImaniBW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/LifshitsFHHPTS18,
  author    = {Pavel Lifshits and
               Roni Forte and
               Yedid Hoshen and
               Matt Halpern and
               Manuel Philipose and
               Mohit Tiwari and
               Mark Silberstein},
  title     = {Power to peep-all: Inference Attacks by Malicious Batteries on Mobile
               Devices},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {4},
  pages     = {141--158},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0036},
  doi       = {10.1515/popets-2018-0036},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/LifshitsFHHPTS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ManousakasMBCS18,
  author    = {Dionysis Manousakas and
               Cecilia Mascolo and
               Alastair R. Beresford and
               Dennis Chan and
               Nikhil Sharma},
  title     = {Quantifying Privacy Loss of Human Mobility Graph Topology},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {3},
  pages     = {5--21},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0018},
  doi       = {10.1515/popets-2018-0018},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/ManousakasMBCS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MasoodZAK18,
  author    = {Rahat Masood and
               Benjamin Zi Hao Zhao and
               Hassan Jameel Asghar and
               Mohamed Ali K{\^{a}}afar},
  title     = {Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch
               Gestures for Tracking},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {2},
  pages     = {122--142},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0016},
  doi       = {10.1515/popets-2018-0016},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/MasoodZAK18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MeiklejohnM18,
  author    = {Sarah Meiklejohn and
               Rebekah Mercer},
  title     = {M{\"{o}}bius: Trustless Tumbling for Transaction Privacy},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {2},
  pages     = {105--121},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0015},
  doi       = {10.1515/popets-2018-0015},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/MeiklejohnM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MoserSHLHSHHMNC18,
  author    = {Malte M{\"{o}}ser and
               Kyle Soska and
               Ethan Heilman and
               Kevin Lee and
               Henry Heffan and
               Shashvat Srivastava and
               Kyle Hogan and
               Jason Hennessey and
               Andrew Miller and
               Arvind Narayanan and
               Nicolas Christin},
  title     = {An Empirical Analysis of Traceability in the Monero Blockchain},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {3},
  pages     = {143--163},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0025},
  doi       = {10.1515/popets-2018-0025},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/MoserSHLHSHHMNC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MurakamiHS18,
  author    = {Takao Murakami and
               Hideitsu Hino and
               Jun Sakuma},
  title     = {Toward Distribution Estimation under Local Differential Privacy with
               Small Samples},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {3},
  pages     = {84--104},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0022},
  doi       = {10.1515/popets-2018-0022},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/MurakamiHS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/OatesAMSZBC18,
  author    = {Maggie Oates and
               Yama Ahmadullah and
               Abigail Marsh and
               Chelse Swoopes and
               Shikun Zhang and
               Rebecca Balebako and
               Lorrie Faith Cranor},
  title     = {Turtles, Locks, and Bathrooms: Understanding Mental Models of Privacy
               Through Illustration},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {4},
  pages     = {5--32},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0029},
  doi       = {10.1515/popets-2018-0029},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/OatesAMSZBC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/PanRLWC18,
  author    = {Elleen Pan and
               Jingjing Ren and
               Martina Lindorfer and
               Christo Wilson and
               David R. Choffnes},
  title     = {Panoptispy: Characterizing Audio and Video Exfiltration from Android
               Applications},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {4},
  pages     = {33--50},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0030},
  doi       = {10.1515/popets-2018-0030},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/PanRLWC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ReyesWRORVE18,
  author    = {Irwin Reyes and
               Primal Wijesekera and
               Joel Reardon and
               Amit Elazari Bar On and
               Abbas Razaghpanah and
               Narseo Vallina{-}Rodriguez and
               Serge Egelman},
  title     = {"Won't Somebody Think of the Children?" Examining {COPPA} Compliance
               at Scale},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {3},
  pages     = {63--83},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0021},
  doi       = {10.1515/popets-2018-0021},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/ReyesWRORVE18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/RochetP18,
  author    = {Florentin Rochet and
               Olivier Pereira},
  title     = {Dropping on the Edge: Flexibility and Traffic Confirmation in Onion
               Routing Protocols},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {2},
  pages     = {27--46},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0011},
  doi       = {10.1515/popets-2018-0011},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/RochetP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/RogawayZ18,
  author    = {Phillip Rogaway and
               Yusi Zhang},
  title     = {Onion-AE: Foundations of Nested Encryption},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {2},
  pages     = {85--104},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0014},
  doi       = {10.1515/popets-2018-0014},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/RogawayZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/SchliepVH18,
  author    = {Michael Schliep and
               Eugene Y. Vasserman and
               Nicholas Hopper},
  title     = {Consistent Synchronous Group Off-The-Record Messaging with {SYM-GOTR}},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {3},
  pages     = {181--202},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0027},
  doi       = {10.1515/popets-2018-0027},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/SchliepVH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ShubaMS18,
  author    = {Anastasia Shuba and
               Athina Markopoulou and
               Zubair Shafiq},
  title     = {NoMoAds: Effective and Efficient Cross-App Mobile Ad-Blocking},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {4},
  pages     = {125--140},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0035},
  doi       = {10.1515/popets-2018-0035},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/ShubaMS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/SimkoZK18,
  author    = {Lucy Simko and
               Luke Zettlemoyer and
               Tadayoshi Kohno},
  title     = {Recognizing and Imitating Programmer Style: Adversaries in Program
               Authorship Attribution},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {1},
  pages     = {127--144},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0007},
  doi       = {10.1515/popets-2018-0007},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/SimkoZK18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/UngerG18,
  author    = {Nik Unger and
               Ian Goldberg},
  title     = {Improved Strongly Deniable Authenticated Key Exchanges for Secure
               Messaging},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {1},
  pages     = {21--66},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0003},
  doi       = {10.1515/popets-2018-0003},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/UngerG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/WaghCM18,
  author    = {Sameer Wagh and
               Paul Cuff and
               Prateek Mittal},
  title     = {Differentially Private Oblivious {RAM}},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {4},
  pages     = {64--84},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0032},
  doi       = {10.1515/popets-2018-0032},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/WaghCM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/WailsSJCM18,
  author    = {Ryan Wails and
               Yixin Sun and
               Aaron Johnson and
               Mung Chiang and
               Prateek Mittal},
  title     = {Tempest: Temporal Dynamics in Anonymity Systems},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {3},
  pages     = {22--42},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0019},
  doi       = {10.1515/popets-2018-0019},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/WailsSJCM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/YanK18,
  author    = {Junhua Yan and
               Jasleen Kaur},
  title     = {Feature Selection for Website Fingerprinting},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2018},
  number    = {4},
  pages     = {200--219},
  year      = {2018},
  url       = {https://doi.org/10.1515/popets-2018-0039},
  doi       = {10.1515/popets-2018-0039},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/YanK18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/0001EP17,
  author    = {Konstantinos Chatzikokolakis and
               Ehab ElSalamouny and
               Catuscia Palamidessi},
  title     = {Efficient Utility Improvement for Location Privacy},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {4},
  pages     = {308--328},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0051},
  doi       = {10.1515/popets-2017-0051},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/0001EP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/AsharovDSSSSZ17,
  author    = {Gilad Asharov and
               Daniel Demmler and
               Michael Schapira and
               Thomas Schneider and
               Gil Segev and
               Scott Shenker and
               Michael Zohner},
  title     = {Privacy-Preserving Interdomain Routing at Internet Scale},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {3},
  pages     = {147},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0033},
  doi       = {10.1515/popets-2017-0033},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/AsharovDSSSSZ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/Barradas0R17,
  author    = {Diogo Barradas and
               Nuno Santos and
               Lu{\'{\i}}s E. T. Rodrigues},
  title     = {DeltaShaper: Enabling Unobservable Censorship-resistant {TCP} Tunneling
               over Videoconferencing Streams},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {4},
  pages     = {5--22},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0037},
  doi       = {10.1515/popets-2017-0037},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/Barradas0R17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BrookmanRAY17,
  author    = {Justin Brookman and
               Phoebe Rouge and
               Aaron Alva and
               Christina Yeung},
  title     = {Cross-Device Tracking: Measurement and Disclosures},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {2},
  pages     = {133--148},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0020},
  doi       = {10.1515/popets-2017-0020},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/BrookmanRAY17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BuscherBB017,
  author    = {Niklas B{\"{u}}scher and
               Spyros Boukoros and
               Stefan Bauregger and
               Stefan Katzenbeisser},
  title     = {Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart
               Metering},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {4},
  pages     = {198--214},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0045},
  doi       = {10.1515/popets-2017-0045},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/BuscherBB017.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ChakrabortiCS17,
  author    = {Anrin Chakraborti and
               Chen Chen and
               Radu Sion},
  title     = {DataLair: Efficient Block Storage with Plausible Deniability against
               Multi-Snapshot Adversaries},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {3},
  pages     = {179},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0035},
  doi       = {10.1515/popets-2017-0035},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/ChakrabortiCS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ChenP17,
  author    = {Chen Chen and
               Adrian Perrig},
  title     = {{PHI:} Path-Hidden Lightweight Anonymity Protocol at Network Layer},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {1},
  pages     = {100--117},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0007},
  doi       = {10.1515/popets-2017-0007},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/ChenP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/Cherubin17,
  author    = {Giovanni Cherubin},
  title     = {Bayes, not Na{\"{\i}}ve: Security Bounds on Website Fingerprinting
               Defenses},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {4},
  pages     = {215--231},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0046},
  doi       = {10.1515/popets-2017-0046},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/Cherubin17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/CherubinHJ17,
  author    = {Giovanni Cherubin and
               Jamie Hayes and
               Marc Ju{\'{a}}rez},
  title     = {Website Fingerprinting Defenses at the Application Layer},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {2},
  pages     = {186--203},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0023},
  doi       = {10.1515/popets-2017-0023},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/CherubinHJ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/CoopamootooG17,
  author    = {Kovila P. L. Coopamootoo and
               Thomas Gro{\ss}},
  title     = {Why Privacy Is All But Forgotten},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {4},
  pages     = {97--118},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0040},
  doi       = {10.1515/popets-2017-0040},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/CoopamootooG17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/CorreBSFC17,
  author    = {Kevin Corre and
               Olivier Barais and
               Gerson Suny{\'{e}} and
               Vincent Frey and
               Jean{-}Michel Crom},
  title     = {Why can't users choose their identity providers on the web?},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {3},
  pages     = {75},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0029},
  doi       = {10.1515/popets-2017-0029},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/CorreBSFC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DangDCO17,
  author    = {Hung Dang and
               Tien Tuan Anh Dinh and
               Ee{-}Chien Chang and
               Beng Chin Ooi},
  title     = {Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {3},
  pages     = {21},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0026},
  doi       = {10.1515/popets-2017-0026},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/DangDCO17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DiazGM17,
  author    = {Claudia D{\'{\i}}az and
               Rachel Greenstadt and
               Damon McCoy},
  title     = {Editors' Introduction},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {1},
  pages     = {1--3},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0001},
  doi       = {10.1515/popets-2017-0001},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/DiazGM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DiazGM17a,
  author    = {Claudia D{\'{\i}}az and
               Rachel Greenstadt and
               Damon McCoy},
  title     = {Editors' Introduction},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {2},
  pages     = {1--3},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0012},
  doi       = {10.1515/popets-2017-0012},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/DiazGM17a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DiazGM17b,
  author    = {Claudia D{\'{\i}}az and
               Rachel Greenstadt and
               Damon McCoy},
  title     = {Editors' Introduction},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {3},
  pages     = {1},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0024},
  doi       = {10.1515/popets-2017-0024},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/DiazGM17b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DiazGM17c,
  author    = {Claudia D{\'{\i}}az and
               Rachel Greenstadt and
               Damon McCoy},
  title     = {Editors' Introduction},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {4},
  pages     = {1--4},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0036},
  doi       = {10.1515/popets-2017-0036},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/DiazGM17c.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/EltarjamanDT17,
  author    = {Wisam Eltarjaman and
               Rinku Dewri and
               Ramakrishna Thurimella},
  title     = {Location Privacy for Rank-based Geo-Query Systems},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {4},
  pages     = {77--96},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0039},
  doi       = {10.1515/popets-2017-0039},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/EltarjamanDT17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/EskandariKAOC17,
  author    = {Mojtaba Eskandari and
               Bruno Kessler and
               Maqsood Ahmad and
               Anderson Santana de Oliveira and
               Bruno Crispo},
  title     = {Analyzing Remote Server Locations for Personal Data Transfers in Mobile
               Apps},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {1},
  pages     = {118--131},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0008},
  doi       = {10.1515/popets-2017-0008},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/EskandariKAOC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/EskandarianMBB17,
  author    = {Saba Eskandarian and
               Eran Messeri and
               Joseph Bonneau and
               Dan Boneh},
  title     = {Certificate Transparency with Privacy},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {4},
  pages     = {329--344},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0052},
  doi       = {10.1515/popets-2017-0052},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/EskandarianMBB17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/FroelicherESRHM17,
  author    = {David Froelicher and
               Patricia Egger and
               Jo{\~{a}}o S{\'{a}} Sousa and
               Jean Louis Raisaro and
               Zhicong Huang and
               Christian Mouchet and
               Bryan Ford and
               Jean{-}Pierre Hubaux},
  title     = {UnLynx: {A} Decentralized System for Privacy-Conscious Data Sharing},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {4},
  pages     = {232--250},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0047},
  doi       = {10.1515/popets-2017-0047},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/FroelicherESRHM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GancherGL17,
  author    = {Joshua Gancher and
               Adam Groce and
               Alex Ledger},
  title     = {Externally Verifiable Oblivious {RAM}},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {2},
  pages     = {149--171},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0021},
  doi       = {10.1515/popets-2017-0021},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/GancherGL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GasconSB0DZE17,
  author    = {Adri{\`{a}} Gasc{\'{o}}n and
               Phillipp Schoppmann and
               Borja Balle and
               Mariana Raykova and
               Jack Doerner and
               Samee Zahur and
               David Evans},
  title     = {Privacy-Preserving Distributed Linear Regression on High-Dimensional
               Data},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {4},
  pages     = {345--364},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0053},
  doi       = {10.1515/popets-2017-0053},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/GasconSB0DZE17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/HeuserRPCDEKST17,
  author    = {Stephan Heuser and
               Bradley Reaves and
               Praveen Kumar Pendyala and
               Henry Carter and
               Alexandra Dmitrienko and
               William Enck and
               Negar Kiyavash and
               Ahmad{-}Reza Sadeghi and
               Patrick Traynor},
  title     = {Phonion: Practical Protection of Metadata in Telephony Networks},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {1},
  pages     = {170--187},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0011},
  doi       = {10.1515/popets-2017-0011},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/HeuserRPCDEKST17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/IkramAKMK17,
  author    = {Muhammad Ikram and
               Hassan Jameel Asghar and
               Mohamed Ali K{\^{a}}afar and
               Anirban Mahanti and
               Balachander Krishnamurthy},
  title     = {Towards Seamless Tracking-Free Web: Improved Detection of Trackers
               via One-class Learning},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {1},
  pages     = {79--99},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0006},
  doi       = {10.1515/popets-2017-0006},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/IkramAKMK17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/IsmailACKR17,
  author    = {Qatrunnada Ismail and
               Tousif Ahmed and
               Kelly Caine and
               Apu Kapadia and
               Michael K. Reiter},
  title     = {To Permit or Not to Permit, That is the Usability Question: Crowdsourcing
               Mobile Apps' Privacy Permission Settings},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {4},
  pages     = {119--137},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0041},
  doi       = {10.1515/popets-2017-0041},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/IsmailACKR17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/JavedS17,
  author    = {Yousra Javed and
               Mohamed Shehab},
  title     = {Look before you Authorize: Using Eye-Tracking to Enforce User Attention
               towards Application Permissions},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {2},
  pages     = {23--37},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0014},
  doi       = {10.1515/popets-2017-0014},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/JavedS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/JohnsonJHSS17,
  author    = {Aaron Johnson and
               Rob Jansen and
               Nicholas Hopper and
               Aaron Segal and
               Paul Syverson},
  title     = {PeerFlow: Secure Load Balancing in Tor},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {2},
  pages     = {74--94},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0017},
  doi       = {10.1515/popets-2017-0017},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/JohnsonJHSS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KissL0AP17,
  author    = {{\'{A}}gnes Kiss and
               Jian Liu and
               Thomas Schneider and
               N. Asokan and
               Benny Pinkas},
  title     = {Private Set Intersection for Unequal Set Sizes with Mobile Applications},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {4},
  pages     = {177--197},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0044},
  doi       = {10.1515/popets-2017-0044},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/KissL0AP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KisselW17,
  author    = {Zachary A. Kissel and
               Jie Wang},
  title     = {Generic Adaptively Secure Searchable Phrase Encryption},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {1},
  pages     = {4--20},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0002},
  doi       = {10.1515/popets-2017-0002},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/KisselW17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/LaudPJ17,
  author    = {Peeter Laud and
               Alisa Pankova and
               Roman Jagom{\"{a}}gis},
  title     = {Preprocessing Based Verification of Multiparty Protocols with Honest
               Majority},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {4},
  pages     = {23--76},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0038},
  doi       = {10.1515/popets-2017-0038},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/LaudPJ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/LeeFMIEW17,
  author    = {Linda N. Lee and
               David Fifield and
               Nathan Malkin and
               Ganesh Iyer and
               Serge Egelman and
               David A. Wagner},
  title     = {A Usability Evaluation of Tor Launcher},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {3},
  pages     = {90},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0030},
  doi       = {10.1515/popets-2017-0030},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/LeeFMIEW17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/LiKKN17,
  author    = {Yao Li and
               Alfred Kobsa and
               Bart P. Knijnenburg and
               M.{-}H. Carolyn Nguyen},
  title     = {Cross-Cultural Privacy Prediction},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {2},
  pages     = {113--132},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0019},
  doi       = {10.1515/popets-2017-0019},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/LiKKN17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/LiuKY17,
  author    = {Chen Liu and
               Hoda Aghaei Khouzani and
               Chengmo Yang},
  title     = {ErasuCrypto: {A} Light-weight Secure Data Deletion Scheme for Solid
               State Drives},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {1},
  pages     = {132--148},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0009},
  doi       = {10.1515/popets-2017-0009},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/LiuKY17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MarczakP17,
  author    = {William R. Marczak and
               Vern Paxson},
  title     = {Social Engineering Attacks on Government Opponents: Target Perspectives},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {2},
  pages     = {172--185},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0022},
  doi       = {10.1515/popets-2017-0022},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/MarczakP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MartinMDFBRRB17,
  author    = {Jeremy Martin and
               Travis Mayberry and
               Collin Donahue and
               Lucas Foppe and
               Lamont Brown and
               Chadwick Riggins and
               Erik C. Rye and
               Dane Brown},
  title     = {A Study of {MAC} Address Randomization in Mobile Devices and When
               it Fails},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {4},
  pages     = {365--383},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0054},
  doi       = {10.1515/popets-2017-0054},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/MartinMDFBRRB17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MavroudisHFMKV17,
  author    = {Vasilios Mavroudis and
               Shuang Hao and
               Yanick Fratantonio and
               Federico Maggi and
               Christopher Kruegel and
               Giovanni Vigna},
  title     = {On the Privacy and Security of the Ultrasound Ecosystem},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {2},
  pages     = {95--112},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0018},
  doi       = {10.1515/popets-2017-0018},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/MavroudisHFMKV17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/Moreno-SanchezR17,
  author    = {Pedro Moreno{-}Sanchez and
               Tim Ruffing and
               Aniket Kate},
  title     = {PathShuffle: Credit Mixing and Anonymous Payments for Ripple},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {3},
  pages     = {110},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0031},
  doi       = {10.1515/popets-2017-0031},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/Moreno-SanchezR17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MugheesQS17,
  author    = {Muhammad Haris Mughees and
               Zhiyun Qian and
               Zubair Shafiq},
  title     = {Detecting Anti Ad-blockers in the Wild},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {3},
  pages     = {130},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0032},
  doi       = {10.1515/popets-2017-0032},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/MugheesQS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/Murakami17,
  author    = {Takao Murakami},
  title     = {Expectation-Maximization Tensor Factorization for Practical Location
               Privacy Attacks},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {4},
  pages     = {138--155},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0042},
  doi       = {10.1515/popets-2017-0042},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/Murakami17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/NeySCK17,
  author    = {Peter Ney and
               Ian Smith and
               Gabriel Cadamuro and
               Tadayoshi Kohno},
  title     = {SeaGlass: Enabling City-Wide IMSI-Catcher Detection},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {3},
  pages     = {39},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0027},
  doi       = {10.1515/popets-2017-0027},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/NeySCK17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/OhLH17,
  author    = {Se Eun Oh and
               Shuai Li and
               Nicholas Hopper},
  title     = {Fingerprinting Keywords in Search Queries over Tor},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {4},
  pages     = {251--270},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0048},
  doi       = {10.1515/popets-2017-0048},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/OhLH17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/PhamDJHHTGH17,
  author    = {Anh Pham and
               Italo Dacosta and
               Bastien Jacot{-}Guillarmod and
               K{\'{e}}vin Huguenin and
               Taha Hajar and
               Florian Tram{\`{e}}r and
               Virgil D. Gligor and
               Jean{-}Pierre Hubaux},
  title     = {PrivateRide: {A} Privacy-Enhanced Ride-Hailing Service},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {2},
  pages     = {38--56},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0015},
  doi       = {10.1515/popets-2017-0015},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/PhamDJHHTGH17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/PyrgelisTC17,
  author    = {Apostolos Pyrgelis and
               Carmela Troncoso and
               Emiliano De Cristofaro},
  title     = {What Does The Crowd Say About You? Evaluating Aggregation-based Location
               Privacy},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {4},
  pages     = {156--176},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0043},
  doi       = {10.1515/popets-2017-0043},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/PyrgelisTC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/RahamanCYLP17,
  author    = {Sazzadur Rahaman and
               Long Cheng and
               Danfeng Daphne Yao and
               He Li and
               Jung{-}Min "Jerry" Park},
  title     = {Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable
               Sublinear Revocation},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {4},
  pages     = {384--403},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0055},
  doi       = {10.1515/popets-2017-0055},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/RahamanCYLP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/RecabarrenC17,
  author    = {Ruben Recabarren and
               Bogdan Carbunar},
  title     = {Hardening Stratum, the Bitcoin Pool Mining Protocol},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {3},
  pages     = {57},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0028},
  doi       = {10.1515/popets-2017-0028},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/RecabarrenC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/RezaeiH17,
  author    = {Fatemeh Rezaei and
               Amir Houmansadr},
  title     = {TagIt: Tagging Network Flows using Blind Fingerprints},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {4},
  pages     = {290--307},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0050},
  doi       = {10.1515/popets-2017-0050},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/RezaeiH17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/RiaziSSSK17,
  author    = {M. Sadegh Riazi and
               Ebrahim M. Songhori and
               Ahmad{-}Reza Sadeghi and
               Thomas Schneider and
               Farinaz Koushanfar},
  title     = {Toward Practical Secure Stable Matching},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {1},
  pages     = {62--78},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0005},
  doi       = {10.1515/popets-2017-0005},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/RiaziSSSK17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/RochetP17,
  author    = {Florentin Rochet and
               Olivier Pereira},
  title     = {Waterfilling: Balancing the Tor network with maximum diversity},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {2},
  pages     = {4--22},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0013},
  doi       = {10.1515/popets-2017-0013},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/RochetP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/RompayMO17,
  author    = {C{\'{e}}dric Van Rompay and
               Refik Molva and
               Melek {\"{O}}nen},
  title     = {A Leakage-Abuse Attack Against Multi-User Searchable Encryption},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {3},
  pages     = {168},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0034},
  doi       = {10.1515/popets-2017-0034},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/RompayMO17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/SchurmannKHW17,
  author    = {Dominik Sch{\"{u}}rmann and
               Fabian Kabus and
               Gregor Hildermeier and
               Lars C. Wolf},
  title     = {Wiretapping End-to-End Encrypted VoIP Calls: Real-World Attacks on
               {ZRTP}},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {3},
  pages     = {4},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0025},
  doi       = {10.1515/popets-2017-0025},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/SchurmannKHW17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/TroncosoIDH17,
  author    = {Carmela Troncoso and
               Marios Isaakidis and
               George Danezis and
               Harry Halpin},
  title     = {Systematizing Decentralization and Privacy: Lessons from 15 Years
               of Research and Deployments},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {4},
  pages     = {404--426},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0056},
  doi       = {10.1515/popets-2017-0056},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/TroncosoIDH17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/VictorsLF17,
  author    = {Jesse Victors and
               Ming Li and
               Xinwen Fu},
  title     = {The Onion Name System},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {1},
  pages     = {21--41},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0003},
  doi       = {10.1515/popets-2017-0003},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/VictorsLF17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/WeinbergSSC17,
  author    = {Zachary Weinberg and
               Mahmood Sharif and
               Janos Szurdi and
               Nicolas Christin},
  title     = {Topics of Controversy: An Empirical Analysis of Web Censorship Lists},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {1},
  pages     = {42--61},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0004},
  doi       = {10.1515/popets-2017-0004},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/WeinbergSSC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/XiaoRZ17,
  author    = {Qiuyu Xiao and
               Michael K. Reiter and
               Yinqian Zhang},
  title     = {Personalized Pseudonyms for Servers in the Cloud},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {4},
  pages     = {271--289},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0049},
  doi       = {10.1515/popets-2017-0049},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/XiaoRZ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ZhaoC17,
  author    = {Yongjun Zhao and
               Sherman S. M. Chow},
  title     = {Are you The One to Share? Secret Transfer with Access Structure},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {1},
  pages     = {149--169},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0010},
  doi       = {10.1515/popets-2017-0010},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/ZhaoC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ZhouDLLZL17,
  author    = {Zhe Zhou and
               Wenrui Diao and
               Xiangyu Liu and
               Zhou Li and
               Kehuan Zhang and
               Rui Liu},
  title     = {Vulnerable {GPU} Memory Management: Towards Recovering Raw Data from
               {GPU}},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2017},
  number    = {2},
  pages     = {57--73},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0016},
  doi       = {10.1515/popets-2017-0016},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/ZhouDLLZL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/AgirHHH16,
  author    = {Berker Agir and
               K{\'{e}}vin Huguenin and
               Urs Hengartner and
               Jean{-}Pierre Hubaux},
  title     = {On the Privacy Implications of Location Semantics},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {165--183},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0034},
  doi       = {10.1515/popets-2016-0034},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/AgirHHH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BackesMS16,
  author    = {Michael Backes and
               Sebastian Meiser and
               Marcin Slowik},
  title     = {Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment
               of Tor Path Selection Algorithms Against Structural Attacks},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {2},
  pages     = {40--60},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0004},
  doi       = {10.1515/popets-2016-0004},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/BackesMS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BartonW16,
  author    = {Armon Barton and
               Matthew Wright},
  title     = {DeNASA: Destination-Naive AS-Awareness in Anonymous Communications},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {356--372},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0044},
  doi       = {10.1515/popets-2016-0044},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/BartonW16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/Bello-OgunuS16,
  author    = {Emmanuel Bello{-}Ogunu and
               Mohamed Shehab},
  title     = {Crowdsourcing for Context: Regarding Privacy in Beacon Encounters
               via Contextual Integrity},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {3},
  pages     = {83--95},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0017},
  doi       = {10.1515/popets-2016-0017},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/Bello-OgunuS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BlantonB16,
  author    = {Marina Blanton and
               Fattaneh Bayatbabolghani},
  title     = {Efficient Server-Aided Secure Two-Party Function Evaluation with Applications
               to Genomic Computation},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {144--164},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0033},
  doi       = {10.1515/popets-2016-0033},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/BlantonB16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BogdanovKKRST16,
  author    = {Dan Bogdanov and
               Liina Kamm and
               Baldur Kubo and
               Reimo Rebane and
               Ville Sokk and
               Riivo Talviste},
  title     = {Students and Taxes: a Privacy-Preserving Study Using Secure Computation},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {3},
  pages     = {117--135},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0019},
  doi       = {10.1515/popets-2016-0019},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/BogdanovKKRST16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BoschEKKP16,
  author    = {Christoph B{\"{o}}sch and
               Benjamin Erb and
               Frank Kargl and
               Henning Kopp and
               Stefan Pfattheicher},
  title     = {Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark
               Patterns},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {237--254},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0038},
  doi       = {10.1515/popets-2016-0038},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/BoschEKKP16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ContiCFHKLLPS16,
  author    = {Mauro Conti and
               Stephen Crane and
               Tommaso Frassetto and
               Andrei Homescu and
               Georg Koppen and
               Per Larsen and
               Christopher Liebchen and
               Mike Perry and
               Ahmad{-}Reza Sadeghi},
  title     = {Selfrando: Securing the Tor Browser against De-anonymization Exploits},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {454--469},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0050},
  doi       = {10.1515/popets-2016-0050},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/ContiCFHKLLPS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DewriOT16,
  author    = {Rinku Dewri and
               Toan Ong and
               Ramakrishna Thurimella},
  title     = {Linking Health Records for Federated Query Processing},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {3},
  pages     = {4--23},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0013},
  doi       = {10.1515/popets-2016-0013},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/DewriOT16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DiazK16,
  author    = {Claudia D{\'{\i}}az and
               Apu Kapadia},
  title     = {Editors' Introduction},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {2},
  pages     = {1--3},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0001},
  doi       = {10.1515/popets-2016-0001},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/DiazK16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DiazK16a,
  author    = {Claudia D{\'{\i}}az and
               Apu Kapadia},
  title     = {Editors' Introduction},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {3},
  pages     = {1--3},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0012},
  doi       = {10.1515/popets-2016-0012},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/DiazK16a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DiazK16b,
  author    = {Claudia D{\'{\i}}az and
               Apu Kapadia},
  title     = {Editors' Introduction},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {1--3},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0025},
  doi       = {10.1515/popets-2016-0025},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/DiazK16b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DouglasRPC16,
  author    = {Frederick Douglas and
               Rorshach and
               Weiyang Pan and
               Matthew Caesar},
  title     = {Salmon: Robust Proxy Distribution for Censorship Circumvention},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {4--20},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0026},
  doi       = {10.1515/popets-2016-0026},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/DouglasRPC16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ElahiDHMG16,
  author    = {Tariq Elahi and
               John A. Doucette and
               Hadi Hosseini and
               Steven J. Murdoch and
               Ian Goldberg},
  title     = {A Framework for the Game-theoretic Analysis of Censorship Resistance},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {83--101},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0030},
  doi       = {10.1515/popets-2016-0030},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/ElahiDHMG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/EnevTKK16,
  author    = {Miro Enev and
               Alex Takakuwa and
               Karl Koscher and
               Tadayoshi Kohno},
  title     = {Automobile Driver Fingerprinting},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {1},
  pages     = {34--50},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2015-0029},
  doi       = {10.1515/popets-2015-0029},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/EnevTKK16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/FantiPE16,
  author    = {Giulia C. Fanti and
               Vasyl Pihur and
               {\'{U}}lfar Erlingsson},
  title     = {Building a {RAPPOR} with the Unknown: Privacy-Preserving Learning
               of Associations and Data Dictionaries},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {3},
  pages     = {41--61},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0015},
  doi       = {10.1515/popets-2016-0015},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/FantiPE16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/FawazKS16,
  author    = {Kassem Fawaz and
               Kyu{-}Han Kim and
               Kang G. Shin},
  title     = {Privacy vs. Reward in Indoor Location-Based Services},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {102--122},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0031},
  doi       = {10.1515/popets-2016-0031},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/FawazKS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/FouqueOR16,
  author    = {Pierre{-}Alain Fouque and
               Cristina Onete and
               Benjamin Richard},
  title     = {Achieving Better Privacy for the 3GPP {AKA} Protocol},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {255--275},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0039},
  doi       = {10.1515/popets-2016-0039},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/FouqueOR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GhoshOT16,
  author    = {Esha Ghosh and
               Olga Ohrimenko and
               Roberto Tamassia},
  title     = {Efficient Verifiable Range and Closest Point Queries in Zero-Knowledge},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {373--388},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0045},
  doi       = {10.1515/popets-2016-0045},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/GhoshOT16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GroganM16,
  author    = {Samuel Grogan and
               Aleecia M. McDonald},
  title     = {Access Denied! Contrasting Data Access in the United States and Ireland},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {3},
  pages     = {191--211},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0023},
  doi       = {10.1515/popets-2016-0023},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/GroganM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GulyasAC16,
  author    = {G{\'{a}}bor Gy{\"{o}}rgy Guly{\'{a}}s and
               Gergely {\'{A}}cs and
               Claude Castelluccia},
  title     = {Near-Optimal Fingerprinting with Constraints},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {470--487},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0051},
  doi       = {10.1515/popets-2016-0051},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/GulyasAC16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/HarkousRKA16,
  author    = {Hamza Harkous and
               Rameez Rahman and
               Bojan Karlas and
               Karl Aberer},
  title     = {The Curious Case of the {PDF} Converter that Likes Mozart: Dissecting
               and Mitigating the Privacy Risk of Personal Cloud Apps},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {123--143},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0032},
  doi       = {10.1515/popets-2016-0032},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/HarkousRKA16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/Henry16,
  author    = {Ryan Henry},
  title     = {Polynomial Batch Codes for Efficient {IT-PIR}},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {202--218},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0036},
  doi       = {10.1515/popets-2016-0036},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/Henry16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/HillZSS16,
  author    = {Steven Hill and
               Zhimin Zhou and
               Lawrence Saul and
               Hovav Shacham},
  title     = {On the (In)effectiveness of Mosaicing and Blurring as Tools for Document
               Redaction},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {403--417},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0047},
  doi       = {10.1515/popets-2016-0047},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/HillZSS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/JagerR16,
  author    = {Tibor Jager and
               Andy Rupp},
  title     = {Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving
               Way},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {3},
  pages     = {62--82},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0016},
  doi       = {10.1515/popets-2016-0016},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/JagerR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/JainJP16,
  author    = {Sakshi Jain and
               Mobin Javed and
               Vern Paxson},
  title     = {Towards Mining Latent Client Identifiers from Network Traffic},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {2},
  pages     = {100--114},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0007},
  doi       = {10.1515/popets-2016-0007},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/JainJP16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/JiaBSL16,
  author    = {Yaoqi Jia and
               Guangdong Bai and
               Prateek Saxena and
               Zhenkai Liang},
  title     = {Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {294--314},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0041},
  doi       = {10.1515/popets-2016-0041},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/JiaBSL16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/Kapadia16,
  author    = {Apu Kapadia},
  title     = {Editor's Introduction},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {1},
  pages     = {1--3},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2015-0026},
  doi       = {10.1515/popets-2015-0026},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/Kapadia16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KhattakESSMG16,
  author    = {Sheharbano Khattak and
               Tariq Elahi and
               Laurent Simon and
               Colleen M. Swanson and
               Steven J. Murdoch and
               Ian Goldberg},
  title     = {SoK: Making Sense of Censorship Resistance Systems},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {37--61},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0028},
  doi       = {10.1515/popets-2016-0028},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/KhattakESSMG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KurtzGBRF16,
  author    = {Andreas Kurtz and
               Hugo Gascon and
               Tobias Becker and
               Konrad Rieck and
               Felix C. Freiling},
  title     = {Fingerprinting Mobile Devices Using Personalized Configurations},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {1},
  pages     = {4--19},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2015-0027},
  doi       = {10.1515/popets-2015-0027},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/KurtzGBRF16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KwonLDF16,
  author    = {Albert Kwon and
               David Lazar and
               Srinivas Devadas and
               Bryan Ford},
  title     = {Riffle: An Efficient Communication System With Strong Anonymity},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {2},
  pages     = {115--134},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0008},
  doi       = {10.1515/popets-2016-0008},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/KwonLDF16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/LegareSA16,
  author    = {Jean{-}S{\'{e}}bastien L{\'{e}}gar{\'{e}} and
               R{\'{o}}bert Sumi and
               William Aiello},
  title     = {Beeswax: a platform for private web apps},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {3},
  pages     = {24--40},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0014},
  doi       = {10.1515/popets-2016-0014},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/LegareSA16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/LeibengerMPPS16,
  author    = {Dominik Leibenger and
               Frederik M{\"{o}}llers and
               Anna Petrlic and
               Ronald Petrlic and
               Christoph Sorge},
  title     = {Privacy Challenges in the Quantified Self Movement - An {EU} Perspective},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {315--334},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0042},
  doi       = {10.1515/popets-2016-0042},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/LeibengerMPPS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/LiH16,
  author    = {Shuai Li and
               Nicholas Hopper},
  title     = {Mailet: Instant Social Networking under Censorship},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {2},
  pages     = {175--192},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0011},
  doi       = {10.1515/popets-2016-0011},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/LiH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/LinSL16,
  author    = {Dong Lin and
               Micah Sherr and
               Boon Thau Loo},
  title     = {Scalable and Anonymous Group Communication with MTor},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {2},
  pages     = {22--39},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0003},
  doi       = {10.1515/popets-2016-0003},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/LinSL16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MatosGC16,
  author    = {Jo{\~{a}}o Matos and
               Jo{\~{a}}o Garcia and
               Nuno Cora{\c{c}}{\~{a}}o},
  title     = {Isolating Graphical Failure-Inducing Input for Privacy Protection
               in Error Reporting Systems},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {2},
  pages     = {4--21},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0002},
  doi       = {10.1515/popets-2016-0002},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/MatosGC16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/McGregorRC16,
  author    = {Susan E. McGregor and
               Franziska Roesner and
               Kelly Caine},
  title     = {Individual versus Organizational Computer Security and Privacy Concerns
               in Journalism},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {418--435},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0048},
  doi       = {10.1515/popets-2016-0048},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/McGregorRC16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/McPhersonHS16,
  author    = {Richard McPherson and
               Amir Houmansadr and
               Vitaly Shmatikov},
  title     = {CovertCast: Using Live Streaming to Evade Internet Censorship},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {3},
  pages     = {212--225},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0024},
  doi       = {10.1515/popets-2016-0024},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/McPhersonHS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MelchorBFK16,
  author    = {Carlos Aguilar Melchor and
               Joris Barrier and
               Laurent Fousse and
               Marc{-}Olivier Killijian},
  title     = {{XPIR} : Private Information Retrieval for Everyone},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {2},
  pages     = {155--174},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0010},
  doi       = {10.1515/popets-2016-0010},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/MelchorBFK16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MelicherSTBCL16,
  author    = {William Melicher and
               Mahmood Sharif and
               Joshua Tan and
               Lujo Bauer and
               Mihai Christodorescu and
               Pedro Giovanni Leon},
  title     = {(Do Not) Track Me Sometimes: Users' Contextual Preferences for Web
               Tracking},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {2},
  pages     = {135--154},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0009},
  doi       = {10.1515/popets-2016-0009},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/MelicherSTBCL16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MohasselOR16,
  author    = {Payman Mohassel and
               Ostap Orobets and
               Ben Riva},
  title     = {Efficient Server-Aided 2PC for Mobile Phones},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {2},
  pages     = {82--99},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0006},
  doi       = {10.1515/popets-2016-0006},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/MohasselOR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/Moreno-SanchezZ16,
  author    = {Pedro Moreno{-}Sanchez and
               Muhammad Bilal Zafar and
               Aniket Kate},
  title     = {Listening to Whispers of Ripple: Linking Wallets and Deanonymizing
               Transactions in the Ripple Network},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {436--453},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0049},
  doi       = {10.1515/popets-2016-0049},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/Moreno-SanchezZ16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/OverdorfG16,
  author    = {Rebekah Overdorf and
               Rachel Greenstadt},
  title     = {Blogs, Twitter Feeds, and Reddit Comments: Cross-domain Authorship
               Attribution},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {3},
  pages     = {155--171},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0021},
  doi       = {10.1515/popets-2016-0021},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/OverdorfG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/PuG16,
  author    = {Yu Pu and
               Jens Grossklags},
  title     = {Towards a Model on the Factors Influencing Social App Users' Valuation
               of Interdependent Privacy},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {2},
  pages     = {61--81},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0005},
  doi       = {10.1515/popets-2016-0005},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/PuG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/SchanckWZ16,
  author    = {John M. Schanck and
               William Whyte and
               Zhenfei Zhang},
  title     = {Circuit-extension handshakes for Tor achieving forward secrecy in
               a quantum world},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {219--236},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0037},
  doi       = {10.1515/popets-2016-0037},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/SchanckWZ16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/SimonXA16,
  author    = {Laurent Simon and
               Wenduan Xu and
               Ross J. Anderson},
  title     = {Don't Interrupt Me While {I} Type: Inferring Text Entered Through
               Gesture Typing on Android Keyboards},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {3},
  pages     = {136--154},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0020},
  doi       = {10.1515/popets-2016-0020},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/SimonXA16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/SpenskySYSTHC16,
  author    = {Chad Spensky and
               Jeffrey Stewart and
               Arkady Yerukhimovich and
               Richard Shay and
               Ari Trachtenberg and
               Rick Housley and
               Robert K. Cunningham},
  title     = {SoK: Privacy on Mobile Devices - It's Complicated},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {3},
  pages     = {96--116},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0018},
  doi       = {10.1515/popets-2016-0018},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/SpenskySYSTHC16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/StarovGN16,
  author    = {Oleksii Starov and
               Phillipa Gill and
               Nick Nikiforakis},
  title     = {Are You Sure You Want to Contact Us? Quantifying the Leakage of {PII}
               via Website Contact Forms},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {1},
  pages     = {20--33},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2015-0028},
  doi       = {10.1515/popets-2015-0028},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/StarovGN16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/TanSZ16,
  author    = {Henry Tan and
               Micah Sherr and
               Wenchao Zhou},
  title     = {Data-plane Defenses against Routing Attacks on Tor},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {276--293},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0040},
  doi       = {10.1515/popets-2016-0040},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/TanSZ16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ToledoDG16,
  author    = {Raphael R. Toledo and
               George Danezis and
               Ian Goldberg},
  title     = {Lower-Cost {\(\in\)}-Private Information Retrieval},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {184--201},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0035},
  doi       = {10.1515/popets-2016-0035},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/ToledoDG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/WangG16,
  author    = {Tao Wang and
               Ian Goldberg},
  title     = {On Realistically Attacking Tor with Website Fingerprinting},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {21--36},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0027},
  doi       = {10.1515/popets-2016-0027},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/WangG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/WangXYH16,
  author    = {Yang Wang and
               Huichuan Xia and
               Yaxing Yao and
               Yun Huang},
  title     = {Flying Eyes and Hidden Controllers: {A} Qualitative Study of People's
               Privacy Perceptions of Civilian Drones in The {US}},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {3},
  pages     = {172--190},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0022},
  doi       = {10.1515/popets-2016-0022},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/WangXYH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/WuFNL16,
  author    = {David J. Wu and
               Tony Feng and
               Michael Naehrig and
               Kristin E. Lauter},
  title     = {Privately Evaluating Decision Trees and Random Forests},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {335--355},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0043},
  doi       = {10.1515/popets-2016-0043},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/WuFNL16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/WuH16,
  author    = {Hao Wu and
               Yih{-}Chun Hu},
  title     = {Location Privacy with Randomness Consistency},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {62--82},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0029},
  doi       = {10.1515/popets-2016-0029},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/WuH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/XueMCAR16,
  author    = {Minhui Xue and
               Gabriel Magno and
               Evandro Cunha and
               Virg{\'{\i}}lio A. F. Almeida and
               Keith W. Ross},
  title     = {The Right to be Forgotten in the Media: {A} Data-Driven Study},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2016},
  number    = {4},
  pages     = {389--402},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0046},
  doi       = {10.1515/popets-2016-0046},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/XueMCAR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ArfaouiLTDBG15,
  author    = {Ghada Arfaoui and
               Jean{-}Fran{\c{c}}ois Lalande and
               Jacques Traor{\'{e}} and
               Nicolas Desmoulins and
               Pascal Berthom{\'{e}} and
               Sa{\"{\i}}d Gharout},
  title     = {A Practical Set-Membership Proof for Privacy-Preserving {NFC} Mobile
               Ticketing},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {2},
  pages     = {25--45},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0019},
  doi       = {10.1515/popets-2015-0019},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/ArfaouiLTDBG15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BlassMN15,
  author    = {Erik{-}Oliver Blass and
               Travis Mayberry and
               Guevara Noubir},
  title     = {Practical Forward-Secure Range and Sort Queries with Update-Oblivious
               Linked Lists},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {2},
  pages     = {81--98},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0015},
  doi       = {10.1515/popets-2015-0015},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/BlassMN15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BorisovDG15,
  author    = {Nikita Borisov and
               George Danezis and
               Ian Goldberg},
  title     = {{DP5:} {A} Private Presence Service},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {2},
  pages     = {4--24},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0008},
  doi       = {10.1515/popets-2015-0008},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/BorisovDG15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BrandaoCDa15,
  author    = {Lu{\'{\i}}s T. A. N. Brand{\~{a}}o and
               Nicolas Christin and
               George Danezis and
               anonymous},
  title     = {Toward Mending Two Nation-Scale Brokered Identification Systems},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {2},
  pages     = {135--155},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0022},
  doi       = {10.1515/popets-2015-0022},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/BrandaoCDa15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ChaseS15,
  author    = {Melissa Chase and
               Emily Shen},
  title     = {Substring-Searchable Symmetric Encryption},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {2},
  pages     = {263--281},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0014},
  doi       = {10.1515/popets-2015-0014},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/ChaseS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/Chatzikokolakis15,
  author    = {Konstantinos Chatzikokolakis and
               Catuscia Palamidessi and
               Marco Stronati},
  title     = {Constructing elastic distinguishability metrics for location privacy},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {2},
  pages     = {156--170},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0023},
  doi       = {10.1515/popets-2015-0023},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/Chatzikokolakis15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DattaTD15,
  author    = {Amit Datta and
               Michael Carl Tschantz and
               Anupam Datta},
  title     = {Automated Experiments on Ad Privacy Settings},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {1},
  pages     = {92--112},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0007},
  doi       = {10.1515/popets-2015-0007},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/DattaTD15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/EnsafiWMC15,
  author    = {Roya Ensafi and
               Philipp Winter and
               Abdullah Mueen and
               Jedidiah R. Crandall},
  title     = {Analyzing the Great Firewall of China Over Space and Time},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {1},
  pages     = {61--76},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0005},
  doi       = {10.1515/popets-2015-0005},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/EnsafiWMC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/FifieldLHWP15,
  author    = {David Fifield and
               Chang Lan and
               Rod Hynes and
               Percy Wegmann and
               Vern Paxson},
  title     = {Blocking-resistant communication through domain fronting},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {2},
  pages     = {46--64},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0009},
  doi       = {10.1515/popets-2015-0009},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/FifieldLHWP15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GugelmannHAL15,
  author    = {David Gugelmann and
               Markus Happe and
               Bernhard Ager and
               Vincent Lenders},
  title     = {An Automated Approach for Complementing Ad Blockers' Blacklists},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {2},
  pages     = {282--298},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0018},
  doi       = {10.1515/popets-2015-0018},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/GugelmannHAL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/HayesD15,
  author    = {Jamie Hayes and
               George Danezis},
  title     = {Guard Sets for Onion Routing},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {2},
  pages     = {65--80},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0017},
  doi       = {10.1515/popets-2015-0017},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/HayesD15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/HumbertHHAH15,
  author    = {Mathias Humbert and
               K{\'{e}}vin Huguenin and
               Joachim Hugonot and
               Erman Ayday and
               Jean{-}Pierre Hubaux},
  title     = {De-anonymizing Genomic Databases Using Phenotypic Traits},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {2},
  pages     = {99--114},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0020},
  doi       = {10.1515/popets-2015-0020},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/HumbertHHAH15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/IrazoquiIES15,
  author    = {Gorka Irazoqui and
               Mehmet Sinan Inci and
               Thomas Eisenbarth and
               Berk Sunar},
  title     = {Know Thy Neighbor: Crypto Library Detection in Cloud},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {1},
  pages     = {25--40},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0003},
  doi       = {10.1515/popets-2015-0003},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/IrazoquiIES15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/JaggardJCSF15,
  author    = {Aaron D. Jaggard and
               Aaron Johnson and
               Sarah Cortes and
               Paul Syverson and
               Joan Feigenbaum},
  title     = {20, 000 In League Under the Sea: Anonymous Communication, Trust, MLATs,
               and Undersea Cables},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {1},
  pages     = {4--24},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0002},
  doi       = {10.1515/popets-2015-0002},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/JaggardJCSF15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/JuenJDBC15,
  author    = {Joshua Juen and
               Aaron Johnson and
               Anupam Das and
               Nikita Borisov and
               Matthew Caesar},
  title     = {Defending Tor from Network Adversaries: {A} Case Study of Network
               Path Prediction},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {2},
  pages     = {171--187},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0021},
  doi       = {10.1515/popets-2015-0021},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/JuenJDBC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KapadiaM15,
  author    = {Apu Kapadia and
               Steven J. Murdoch},
  title     = {Editors' Introduction},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {1},
  pages     = {1--3},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0001},
  doi       = {10.1515/popets-2015-0001},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/KapadiaM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KapadiaM15a,
  author    = {Apu Kapadia and
               Steven J. Murdoch},
  title     = {Editors' Introduction},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {2},
  pages     = {1--3},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0025},
  doi       = {10.1515/popets-2015-0025},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/KapadiaM15a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KiayiasLLPT15,
  author    = {Aggelos Kiayias and
               Nikos Leonardos and
               Helger Lipmaa and
               Kateryna Pavlyk and
               Qiang Tang},
  title     = {Optimal Rate Private Information Retrieval from Homomorphic Encryption},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {2},
  pages     = {222--243},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0016},
  doi       = {10.1515/popets-2015-0016},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/KiayiasLLPT15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KohlweissM15,
  author    = {Markulf Kohlweiss and
               Ian Miers},
  title     = {Accountable Metadata-Hiding Escrow: {A} Group Signature Case Study},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {2},
  pages     = {206--221},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0012},
  doi       = {10.1515/popets-2015-0012},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/KohlweissM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KrishnanS15,
  author    = {Rajesh Krishnan and
               Ravi Sundaram},
  title     = {Secure and scalable match: overcoming the universal circuit bottleneck
               using group programs},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {2},
  pages     = {244--262},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0013},
  doi       = {10.1515/popets-2015-0013},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/KrishnanS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/Laud15,
  author    = {Peeter Laud},
  title     = {Parallel Oblivious Array Access for Secure Multiparty Computation
               and Privacy-Preserving Minimum Spanning Trees},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {2},
  pages     = {188--205},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0011},
  doi       = {10.1515/popets-2015-0011},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/Laud15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MoatazBN15,
  author    = {Tarik Moataz and
               Erik{-}Oliver Blass and
               Guevara Noubir},
  title     = {Recursive Trees for Practical {ORAM}},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {2},
  pages     = {115--134},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0010},
  doi       = {10.1515/popets-2015-0010},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/MoatazBN15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/PertaBTHM15,
  author    = {Vasile Claudiu Perta and
               Marco Valerio Barbera and
               Gareth Tyson and
               Hamed Haddadi and
               Alessandro Mei},
  title     = {A Glance through the {VPN} Looking Glass: IPv6 Leakage and {DNS} Hijacking
               in Commercial {VPN} clients},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {1},
  pages     = {77--91},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0006},
  doi       = {10.1515/popets-2015-0006},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/PertaBTHM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/Shokri15,
  author    = {Reza Shokri},
  title     = {Privacy Games: Optimal User-Centric Data Obfuscation},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {2},
  pages     = {299--315},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0024},
  doi       = {10.1515/popets-2015-0024},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/Shokri15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/Shoshitaishvili15,
  author    = {Yan Shoshitaishvili and
               Christopher Kruegel and
               Giovanni Vigna},
  title     = {Portrait of a Privacy Invasion},
  journal   = {Proc. Priv. Enhancing Technol.},
  volume    = {2015},
  number    = {1},
  pages     = {41--60},
  year      = {2015},
  url       = {https://doi.org/10.1515/popets-2015-0004},
  doi       = {10.1515/popets-2015-0004},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/popets/Shoshitaishvili15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics