Parent directory/ | - | - |
Aaron Johnson - PeerFlow Secure Load Balancing in Tor.en.transcribed.srt | 61.4 KiB | 2019 Oct 01 07:48 |
Aaron Johnson - PeerFlow Secure Load Balancing in Tor.mp4 | 28.3 MiB | 2019 Oct 01 07:48 |
Abdelaziz Alhadlaq - Privacy in the Amazon Alexa Skills Ecosystem.en.transcribed.srt | 23.3 KiB | 2019 Oct 01 07:48 |
Abdelaziz Alhadlaq - Privacy in the Amazon Alexa Skills Ecosystem.mp4 | 9.0 MiB | 2019 Oct 01 07:48 |
Adria Gascon - Privacy Preserving Distributed Linear Regression on High-Dimensional Data.mp4 | 16.2 MiB | 2019 Oct 01 07:48 |
Agnes Kiss - Private Set Intersection for Unequal Set Sizes with Mobile Applications.en.transcribed.srt | 38.4 KiB | 2019 Oct 01 07:48 |
Agnes Kiss - Private Set Intersection for Unequal Set Sizes with Mobile Applications.mp4 | 13.0 MiB | 2019 Oct 01 07:48 |
Alexandra Dmitrienko - Phonion Practical Protection of Metadata in Telephony Networks.en.transcribed.srt | 31.4 KiB | 2019 Oct 01 07:48 |
Alexandra Dmitrienko - Phonion Practical Protection of Metadata in Telephony Networks.mp4 | 21.4 MiB | 2019 Oct 01 07:48 |
Alisa Pankova - Preprocessing Based Verification of Multiparty Protocols with Honest Majority.mp4 | 12.5 MiB | 2019 Oct 01 07:48 |
Anh Pham - PrivateRide A Privacy-Enhanced Ride-Hailing Service.en.transcribed.srt | 40.4 KiB | 2019 Oct 01 07:48 |
Anh Pham - PrivateRide A Privacy-Enhanced Ride-Hailing Service.mp4 | 17.2 MiB | 2019 Oct 01 07:48 |
Anrin Chakraborti - DataLair Efficient Block Storage with Plausible Deniability.en.transcribed.srt | 43.9 KiB | 2019 Oct 01 07:48 |
Anrin Chakraborti - DataLair Efficient Block Storage with Plausible Deniability.mp4 | 13.9 MiB | 2019 Oct 01 07:48 |
Apostolos Pyrgelis - Evaluating Aggregation-based Location Privacy.mp4 | 16.4 MiB | 2019 Oct 01 07:48 |
Apu Kapadia - To Permit or Not to Permit... Crowdsourcing Mobile Apps’ Privacy.en.transcribed.srt | 43.7 KiB | 2019 Oct 01 07:48 |
Apu Kapadia - To Permit or Not to Permit... Crowdsourcing Mobile Apps’ Privacy.mp4 | 25.9 MiB | 2019 Oct 01 07:48 |
Chen Chen - PHI a Path-Hidden Lightweight Anonymity Protocol at Network Layer.en.transcribed.srt | 38.4 KiB | 2019 Oct 01 07:48 |
Chen Chen - PHI a Path-Hidden Lightweight Anonymity Protocol at Network Layer.mp4 | 14.4 MiB | 2019 Oct 01 07:48 |
Cédric Van Rompay - A Leakage-Abuse Attack Against Multi-User Searchable Encryption.en.transcribed.srt | 32.0 KiB | 2019 Oct 01 07:48 |
Cédric Van Rompay - A Leakage-Abuse Attack Against Multi-User Searchable Encryption.mp4 | 15.2 MiB | 2019 Oct 01 07:48 |
Daniel Demmler - Privacy-Preserving Interdomain Routing at Internet Scale.en.transcribed.srt | 42.7 KiB | 2019 Oct 01 07:48 |
Daniel Demmler - Privacy-Preserving Interdomain Routing at Internet Scale.mp4 | 19.6 MiB | 2019 Oct 01 07:48 |
David Froelicher - Unlynx A Decentralized System for Privacy-Conscious Data Sharing.mp4 | 17.8 MiB | 2019 Oct 01 07:48 |
Diogo Barradas - DeltaShaper Censorship-resistant TCP Tunneling over Videoconferencing.en.transcribed.srt | 49.6 KiB | 2019 Oct 01 07:48 |
Diogo Barradas - DeltaShaper Censorship-resistant TCP Tunneling over Videoconferencing.mp4 | 22.8 MiB | 2019 Oct 01 07:48 |
Dominik Schürmann - Wiretapping End-to-End Encrypted VoIP Calls Real-World Attacks on ZRTP.en.transcribed.srt | 35.3 KiB | 2019 Oct 01 07:48 |
Dominik Schürmann - Wiretapping End-to-End Encrypted VoIP Calls Real-World Attacks on ZRTP.mp4 | 24.3 MiB | 2019 Oct 01 07:48 |
Fatemeh Rezaei - TagIt Tagging Network Flows using Blind Fingerprints.mp4 | 14.0 MiB | 2019 Oct 01 07:48 |
Florentin Rochet - Waterfilling Balancing the Tor network with maximum diversity.en.transcribed.srt | 29.7 KiB | 2019 Oct 01 07:48 |
Florentin Rochet - Waterfilling Balancing the Tor network with maximum diversity.mp4 | 16.0 MiB | 2019 Oct 01 07:48 |
Giovanni Cherubin - Bayes, not Naïve Security Bounds on Website Fingerprinting Defenses.en.transcribed.srt | 34.2 KiB | 2019 Oct 01 07:48 |
Giovanni Cherubin - Bayes, not Naïve Security Bounds on Website Fingerprinting Defenses.mp4 | 31.7 MiB | 2019 Oct 01 07:48 |
Hadi Asghari - The Right of Access as a tool for Privacy Governance.en.transcribed.srt | 39.5 KiB | 2019 Oct 01 07:48 |
Hadi Asghari - The Right of Access as a tool for Privacy Governance.mp4 | 20.2 MiB | 2019 Oct 01 07:48 |
Henry Birge-Lee - Using BGP to Acquire Bogus TLS Certificates.en.transcribed.srt | 49.2 KiB | 2019 Oct 01 07:48 |
Henry Birge-Lee - Using BGP to Acquire Bogus TLS Certificates.mp4 | 44.6 MiB | 2019 Oct 01 07:48 |
Hoda Aghaei Khouzani - ErasuCrypto A Light-weight Secure Data Deletion Scheme for Solid State SSDs.en.transcribed.srt | 36.7 KiB | 2019 Oct 01 07:48 |
Hoda Aghaei Khouzani - ErasuCrypto A Light-weight Secure Data Deletion Scheme for Solid State SSDs.mp4 | 13.7 MiB | 2019 Oct 01 07:48 |
HotPETs Opening Remarks.en.transcribed.srt | 13.4 KiB | 2019 Oct 01 07:48 |
HotPETs Opening Remarks.mp4 | 11.1 MiB | 2019 Oct 01 07:48 |
Hung Dang - Privacy-preserving computation with trusted computing via Scramble-then-Compute.mp4 | 11.6 MiB | 2019 Oct 01 07:48 |
Jack Grigg - I2P Open Research Questions about I2P.en.transcribed.srt | 42.3 KiB | 2019 Oct 01 07:48 |
Jack Grigg - I2P Open Research Questions about I2P.mp4 | 14.3 MiB | 2019 Oct 01 07:48 |
Jeremy Martin - A Study of MAC Address Randomization in Mobile Devices and When it Fails.en.transcribed.srt | 43.5 KiB | 2019 Oct 01 07:48 |
Jeremy Martin - A Study of MAC Address Randomization in Mobile Devices and When it Fails.mp4 | 19.7 MiB | 2019 Oct 01 07:48 |
Jesse Victors - The Onion Name System Tor-powered Decentralized DNS for Tor Onion Services.en.transcribed.srt | 42.4 KiB | 2019 Oct 01 07:48 |
Jesse Victors - The Onion Name System Tor-powered Decentralized DNS for Tor Onion Services.mp4 | 24.8 MiB | 2019 Oct 01 07:48 |
Jian Liu - Are you The One to Share Secret Transfer with Access Structure.en.transcribed.srt | 24.8 KiB | 2019 Oct 01 07:48 |
Jian Liu - Are you The One to Share Secret Transfer with Access Structure.mp4 | 12.4 MiB | 2019 Oct 01 07:48 |
Jonathan Albright - PETS Keynote - Emotional Targeting... and the Shaping of Social Discourse.en.transcribed.srt | 192.5 KiB | 2019 Oct 01 07:48 |
Jonathan Albright - PETS Keynote - Emotional Targeting... and the Shaping of Social Discourse.mp4 | 187.3 MiB | 2019 Oct 01 07:48 |
Josh Aas - HotPETs Keynote - How We'll Encrypt the Web.en.transcribed.srt | 99.6 KiB | 2019 Oct 01 07:48 |
Josh Aas - HotPETs Keynote - How We'll Encrypt the Web.mp4 | 84.4 MiB | 2019 Oct 01 07:48 |
Joshua Gancher - Externally Verifiable Oblivious RAM - YouTube.en.transcribed.srt | 42.1 KiB | 2019 Oct 01 07:48 |
Joshua Gancher - Externally Verifiable Oblivious RAM - YouTube.mp4 | 11.7 MiB | 2019 Oct 01 07:48 |
Justin Bookman - Cross-Device Tracking Measurement and Disclosures.en.transcribed.srt | 54.3 KiB | 2019 Oct 01 07:48 |
Justin Bookman - Cross-Device Tracking Measurement and Disclosures.mp4 | 16.3 MiB | 2019 Oct 01 07:48 |
Kevin Corre - Why Can't Users Choose Their Identity Providers On The Web.en.transcribed.srt | 31.1 KiB | 2019 Oct 01 07:48 |
Kevin Corre - Why Can't Users Choose Their Identity Providers On The Web.mp4 | 12.1 MiB | 2019 Oct 01 07:48 |
Konstantinos Chatzikokolakis - Efficient utility improvement for location privacy.mp4 | 19.0 MiB | 2019 Oct 01 07:48 |
Kovila P.L. Coopamootoo - An Empirical Study of Privacy & Sharing Attitude.en.transcribed.srt | 29.2 KiB | 2019 Oct 01 07:48 |
Kovila P.L. Coopamootoo - An Empirical Study of Privacy & Sharing Attitude.mp4 | 16.6 MiB | 2019 Oct 01 07:48 |
Lachlan J. Gunn - Safety in Numbers Anonymization Makes Keyservers Trustworthy.en.transcribed.srt | 42.7 KiB | 2019 Oct 01 07:48 |
Lachlan J. Gunn - Safety in Numbers Anonymization Makes Keyservers Trustworthy.mp4 | 15.3 MiB | 2019 Oct 01 07:48 |
Linda Lee - A Usability Evaluation of Tor Launcher.en.transcribed.srt | 40.8 KiB | 2019 Oct 01 07:48 |
Linda Lee - A Usability Evaluation of Tor Launcher.mp4 | 19.7 MiB | 2019 Oct 01 07:48 |
M. Sadegh Riazi - Toward Practical Secure Stable Matching.en.transcribed.srt | 33.8 KiB | 2019 Oct 01 07:48 |
M. Sadegh Riazi - Toward Practical Secure Stable Matching.mp4 | 13.2 MiB | 2019 Oct 01 07:48 |
Marc Juarez - Website Fingerprinting Defenses at the Application Layer.en.transcribed.srt | 33.9 KiB | 2019 Oct 01 07:48 |
Marc Juarez - Website Fingerprinting Defenses at the Application Layer.mp4 | 18.4 MiB | 2019 Oct 01 07:48 |
Marios Isaakidis - Systematizing Decentralization and Privacy.mp4 | 21.9 MiB | 2019 Oct 01 07:48 |
Matthew Wright - A Wide-Area Testbed for Tor.en.transcribed.srt | 29.4 KiB | 2019 Oct 01 07:48 |
Matthew Wright - A Wide-Area Testbed for Tor.mp4 | 15.2 MiB | 2019 Oct 01 07:48 |
Michael Reiter - Personalized Pseudonyms for Servers in the Cloud.en.transcribed.srt | 52.7 KiB | 2019 Oct 01 07:48 |
Michael Reiter - Personalized Pseudonyms for Servers in the Cloud.mp4 | 18.8 MiB | 2019 Oct 01 07:48 |
Mojtaba Eskandari - Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps.en.transcribed.srt | 30.3 KiB | 2019 Oct 01 07:48 |
Mojtaba Eskandari - Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps.mp4 | 13.9 MiB | 2019 Oct 01 07:48 |
Muhammad Ikram - Towards Seamless Tracking-Free Web Improved Detection of Trackers.en.transcribed.srt | 39.9 KiB | 2019 Oct 01 07:48 |
Muhammad Ikram - Towards Seamless Tracking-Free Web Improved Detection of Trackers.mp4 | 19.2 MiB | 2019 Oct 01 07:48 |
PETS Opening Remarks.en.transcribed.srt | 47.1 KiB | 2019 Oct 01 07:48 |
PETS Opening Remarks.mp4 | 35.2 MiB | 2019 Oct 01 07:48 |
Paul Syverson - Oft Target Tor adversary models that don't miss the mark.en.transcribed.srt | 46.7 KiB | 2019 Oct 01 07:48 |
Paul Syverson - Oft Target Tor adversary models that don't miss the mark.mp4 | 18.3 MiB | 2019 Oct 01 07:48 |
Pedro Moreno-Sanchez - PathShuffle Credit Mixing and Anonymous Payments for Ripple.en.transcribed.srt | 45.7 KiB | 2019 Oct 01 07:48 |
Pedro Moreno-Sanchez - PathShuffle Credit Mixing and Anonymous Payments for Ripple.mp4 | 20.4 MiB | 2019 Oct 01 07:48 |
Peter Ney and Ian Smith - SeaGlass Enabling City-Wide IMSI-Catcher Detection.en.transcribed.srt | 43.1 KiB | 2019 Oct 01 07:48 |
Peter Ney and Ian Smith - SeaGlass Enabling City-Wide IMSI-Catcher Detection.mp4 | 23.6 MiB | 2019 Oct 01 07:48 |
Rinku Dewri - Location Privacy for Rank-based Geo-Query Systems.en.transcribed.srt | 45.9 KiB | 2019 Oct 01 07:48 |
Rinku Dewri - Location Privacy for Rank-based Geo-Query Systems.mp4 | 27.6 MiB | 2019 Oct 01 07:48 |
Ruben Recabarren - Hardening Stratum, the Bitcoin Pool Mining Protocol.en.transcribed.srt | 40.9 KiB | 2019 Oct 01 07:48 |
Ruben Recabarren - Hardening Stratum, the Bitcoin Pool Mining Protocol.mp4 | 18.4 MiB | 2019 Oct 01 07:48 |
Saba Eskandarian - Certificate Transparency with Privacy.en.transcribed.srt | 45.1 KiB | 2019 Oct 01 07:48 |
Saba Eskandarian - Certificate Transparency with Privacy.mp4 | 17.3 MiB | 2019 Oct 01 07:48 |
Se Eun Oh - Identifying Keywords in Search Engine Queries over Tor.en.transcribed.srt | 32.1 KiB | 2019 Oct 01 07:48 |
Se Eun Oh - Identifying Keywords in Search Engine Queries over Tor.mp4 | 21.4 MiB | 2019 Oct 01 07:48 |
Spyros Boukoros - Two Is Not Enough Privacy Assessment of Aggregation Schemes in Smart Metering.mp4 | 19.4 MiB | 2019 Oct 01 07:48 |
Steven Englehardt - Battery Status Not Included Assessing Privacy in Web Standards.en.transcribed.srt | 40.5 KiB | 2019 Oct 01 07:48 |
Steven Englehardt - Battery Status Not Included Assessing Privacy in Web Standards.mp4 | 13.9 MiB | 2019 Oct 01 07:48 |
Takao Murakami - Expectation-Maximization Tensor Factorization for Location Privacy Attacks.mp4 | 18.8 MiB | 2019 Oct 01 07:48 |
Vasilios Mavroudis - On the Privacy and Security of the Ultrasound Ecosystem.en.transcribed.srt | 44.9 KiB | 2019 Oct 01 07:48 |
Vasilios Mavroudis - On the Privacy and Security of the Ultrasound Ecosystem.mp4 | 20.4 MiB | 2019 Oct 01 07:48 |
Wendi Diao - Vulnerable GPU Memory Management Towards Recovering Raw Data from GPU.en.transcribed.srt | 25.3 KiB | 2019 Oct 01 07:48 |
Wendi Diao - Vulnerable GPU Memory Management Towards Recovering Raw Data from GPU.mp4 | 13.9 MiB | 2019 Oct 01 07:48 |
William Marczak - Social Engineering Attacks on Government Opponents....en.transcribed.srt | 49.7 KiB | 2019 Oct 01 07:48 |
William Marczak - Social Engineering Attacks on Government Opponents....mp4 | 19.9 MiB | 2019 Oct 01 07:48 |
Wouter Lueks - IRMA decentralized and privacy-friendly identity management using smartphones.en.transcribed.srt | 45.9 KiB | 2019 Oct 01 07:48 |
Wouter Lueks - IRMA decentralized and privacy-friendly identity management using smartphones.mp4 | 18.6 MiB | 2019 Oct 01 07:48 |
Yao Li - Cross-cultural Privacy Prediction.en.transcribed.srt | 30.5 KiB | 2019 Oct 01 07:48 |
Yao Li - Cross-cultural Privacy Prediction.mp4 | 20.6 MiB | 2019 Oct 01 07:48 |
Yousra Javed - Look Before You Authorize Using Eye-Tracking To Enforce User.en.transcribed.srt | 32.5 KiB | 2019 Oct 01 07:48 |
Yousra Javed - Look Before You Authorize Using Eye-Tracking To Enforce User.mp4 | 17.1 MiB | 2019 Oct 01 07:48 |
Zachary A. Kissel - Generic Adaptively Secure Searchable Phrase Encryption.en.transcribed.srt | 29.8 KiB | 2019 Oct 01 07:48 |
Zachary A. Kissel - Generic Adaptively Secure Searchable Phrase Encryption.mp4 | 10.8 MiB | 2019 Oct 01 07:48 |
Zachary Weinberg - Topics of Controversy An Empirical Analysis of Web Censorship Lists.en.transcribed.srt | 40.0 KiB | 2019 Oct 01 07:48 |
Zachary Weinberg - Topics of Controversy An Empirical Analysis of Web Censorship Lists.mp4 | 17.3 MiB | 2019 Oct 01 07:48 |
Zubair Shafiq - Detecting Anti Ad-blockers in the Wild.en.transcribed.srt | 50.4 KiB | 2019 Oct 01 07:48 |
Zubair Shafiq - Detecting Anti Ad-blockers in the Wild.mp4 | 18.9 MiB | 2019 Oct 01 07:48 |