
De-anonymizing Genomic Databases Using Phenotypic Traits Abstract: People increasingly have their genomes se-quenced and some of them share their genomic data on-line. They do so for various …
PoPETs Proceedings — Volume 2015
Issue 1 Editors’ Introduction Apu Kapadia (Indiana University Bloomington), Steven J. Murdoch (University College London) 20,000 In League Under the Sea: Anonymous Communication, Trust, …
De-anonymizing Genomic Databases Using Phenotypic Traits
De-anonymizing Genomic Databases Using Phenotypic Traits Authors: Mathias Humbert (EPFL, Lausanne, Switzerland), Kévin Huguenin (LAAS-CNRS, Toulouse, France), Joachim Hugonot …
PoPETs Proceedings — DP5: A Private Presence Service
DP5: A Private Presence Service Authors: Nikita Borisov (University of Illinois at Urbana-Champaign), George Danezis (University College London), Ian Goldberg ...
PoPETs Proceedings — Editors’ Introduction
Editors’ Introduction Authors: Apu Kapadia (Indiana University Bloomington), Steven J. Murdoch (University College London) Volume: 2015 Issue: 2 Pages: 1–3 DOI ...
PoPETs Proceedings — 20,000 In League Under the Sea: Anonymous ...
20,000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables
PoPETs Proceedings — A Glance through the VPN Looking Glass: IPv6 ...
A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients Authors: Vasile C. Perta (Sapienza University of Rome), Marco V. Barbera (Sapienza University of …
Abstract:The Tor anonymity network has been shown vul- nerable to traffic analysis attacks by autonomous systems (ASes) and Internet exchanges (IXes), which can observe dif- ferent overlay …
PoPETs Proceedings — Automated Experiments on Ad Privacy Settings
Abstract: To partly address people’s concerns over web tracking, Google has created the Ad Settings webpage to provide information about and some choice over the profiles Google creates on users. …
PoPETs Proceedings — Parallel Oblivious Array Access for Secure ...
Parallel Oblivious Array Access for Secure Multiparty Computation and Privacy-Preserving Minimum Spanning Trees Authors: Peeter Laud (Cybernetica AS) Volume: 2015 ...