/PETS 2016/
|
Aaron Johnson - Opening Keynote HotPETS 2016.en.transcribed.srt
|
22.7 KB
|
Aaron Johnson - Opening Keynote HotPETS 2016.mp4
|
13.5 MB
|
Albert Kwon - Riffle Efficient Communication System With Strong Anonymity.en.transcribed.srt
|
45.2 KB
|
Albert Kwon - Riffle Efficient Communication System With Strong Anonymity.mp4
|
21.6 MB
|
Ame Elliott - Respecting Participants in Privacy-Related User Studies.en.transcribed.srt
|
35.0 KB
|
Ame Elliott - Respecting Participants in Privacy-Related User Studies.mp4
|
38.8 MB
|
Andy Rupp - Black-Box Accumulation Collecting Incentives in a Privacy-Preserving Way.en.transcribed.srt
|
27.5 KB
|
Andy Rupp - Black-Box Accumulation Collecting Incentives in a Privacy-Preserving Way.mp4
|
33.6 MB
|
Angela Sasse - Goodbye Passwords, Hello Biometrics Do We Understand the Privacy Implications.en.transcribed.srt
|
121.5 KB
|
Angela Sasse - Goodbye Passwords, Hello Biometrics Do We Understand the Privacy Implications.mp4
|
90.7 MB
|
Aylin Caliskan-Islam - A Story of Discrimination and Unfairness.en.transcribed.srt
|
40.6 KB
|
Aylin Caliskan-Islam - A Story of Discrimination and Unfairness.mp4
|
22.0 MB
|
Carlos Aguilar Melchor - XPIR Private Information Retrieval for Everyone.en.transcribed.srt
|
37.3 KB
|
Carlos Aguilar Melchor - XPIR Private Information Retrieval for Everyone.mp4
|
46.8 MB
|
Chad Spensky - SoK Privacy on Mobile Devices – It’s Complicated.en.transcribed.srt
|
42.8 KB
|
Cristina Onete - Achieving Better Privacy for the 3GPP AKA Protocol.en.transcribed.srt
|
34.8 KB
|
Cristina Onete - Achieving Better Privacy for the 3GPP AKA Protocol.mp4
|
26.0 MB
|
Dan Blah Meredith - Thank You for Protecting Human Rights - HotPETs Keynote 2016.en.transcribed.srt
|
106.9 KB
|
Dan Blah Meredith - Thank You for Protecting Human Rights - HotPETs Keynote 2016.mp4
|
128.2 MB
|
David J. Wu - Privately Evaluating Decision Trees and Random Forests.en.transcribed.srt
|
40.6 KB
|
David J. Wu - Privately Evaluating Decision Trees and Random Forests.mp4
|
24.1 MB
|
Emmanuel Bello-Ogunu - Crowdsourcing for Context.en.transcribed.srt
|
34.8 KB
|
Esha Ghosh - Efficient Verifiable Range and Closest Point Queries in Zero-Knowledge.en.transcribed.srt
|
32.8 KB
|
Esha Ghosh - Efficient Verifiable Range and Closest Point Queries in Zero-Knowledge.mp4
|
20.8 MB
|
Franz Kargl - Tales from the Dark Side Privacy Dark Strategies and Privacy Dark Patterns.en.transcribed.srt
|
26.9 KB
|
Frederick Douglas - Salmon Robust Proxy Distribution for Censorship Circumvention.en.transcribed.srt
|
27.7 KB
|
Frederick Douglas - Salmon Robust Proxy Distribution for Censorship Circumvention.mp4
|
39.1 MB
|
Frederik Möllers & Christoph Sorge - Privacy Challenges in the Quantified Self Movement.en.transcribed.srt
|
32.1 KB
|
Frederik Möllers & Christoph Sorge - Privacy Challenges in the Quantified Self Movement.mp4
|
37.0 MB
|
Gabor György Gulyás - Near-Optimal Fingerprinting with Constraints.mp4
|
19.3 MB
|
Giulia Fanti - Building a RAPPOR with the Unknown.en.transcribed.srt
|
43.7 KB
|
Giulia Fanti - Building a RAPPOR with the Unknown.mp4
|
17.6 MB
|
Hamza Harkous - The Curious Case of the PDF Converter that Likes Mozart.en.transcribed.srt
|
32.4 KB
|
Hamza Harkous - The Curious Case of the PDF Converter that Likes Mozart.mp4
|
32.5 MB
|
Hao Wu - Location Privacy with Randomness Consistency.en.transcribed.srt
|
23.9 KB
|
Hao Wu - Location Privacy with Randomness Consistency.mp4
|
26.2 MB
|
Harry Halpin - The Responsibility of Open Standards in the Era of Surveillance.en.transcribed.srt
|
42.1 KB
|
Harry Halpin - The Responsibility of Open Standards in the Era of Surveillance.mp4
|
33.5 MB
|
Jean-Sebastien Legare - Beeswax A Platform for Private Web Apps.en.transcribed.srt
|
33.9 KB
|
Jean-Sebastien Legare - Beeswax A Platform for Private Web Apps.mp4
|
25.0 MB
|
Jens Grossklags - Towards a Model on the Factors Influencing Social App Users' Valuation.en.transcribed.srt
|
36.6 KB
|
Jens Grossklags - Towards a Model on the Factors Influencing Social App Users' Valuation.mp4
|
29.4 MB
|
John M. Schanck - Circuit-Extension Handshakes for Tor Achieving Forward Secrecy in a Quantum World.en.transcribed.srt
|
34.8 KB
|
John M. Schanck - Circuit-Extension Handshakes for Tor Achieving Forward Secrecy in a Quantum World.mp4
|
23.2 MB
|
João Garcia - Isolating Graphical Failure-Inducing Input.en.transcribed.srt
|
30.6 KB
|
Kassem Fawaz - Privacy vs. Reward in Indoor Location-Based Services.en.transcribed.srt
|
42.1 KB
|
Kassem Fawaz - Privacy vs. Reward in Indoor Location-Based Services.mp4
|
22.5 MB
|
Keith Ross - The Right to be Forgotten in the Media A Data-Driven Study.en.transcribed.srt
|
41.2 KB
|
Laurent Simon - Don't Interrupt Me While I Type.en.transcribed.srt
|
35.5 KB
|
Laurent Simon - Don't Interrupt Me While I Type.mp4
|
24.9 MB
|
Linus Gasser - Managing Identities Using Blockchains and CoSi.en.transcribed.srt
|
34.6 KB
|
Linus Gasser - Managing Identities Using Blockchains and CoSi.mp4
|
22.3 MB
|
Marina Blanton and Fattaneh Bayatbabolghani - Efficient Server-Aided Secure Two-Party Function.en.transcribed.srt
|
36.4 KB
|
Marina Blanton and Fattaneh Bayatbabolghani - Efficient Server-Aided Secure Two-Party Function.mp4
|
62.4 MB
|
Marios Isaakidis - Eclipse and Re-Emergence of Anonymous P2P Storage Network Overlay Services.mp4
|
22.7 MB
|
Micah Sherr - Data-plane Defenses against Routing Attacks on Tor.en.transcribed.srt
|
36.0 KB
|
Micah Sherr - Scalable and Anonymous Group Communication with MTor.en.transcribed.srt
|
35.9 KB
|
Micah Sherr - Scalable and Anonymous Group Communication with MTor.mp4
|
31.9 MB
|
Miro Enev - Automobile Driver Fingerprinting.en.transcribed.srt
|
45.0 KB
|
Miro Enev - Automobile Driver Fingerprinting.mp4
|
50.4 MB
|
Oleskii Starov - Are You Sure You Want to Contact Us.mp4
|
25.5 MB
|
Ostap Orobets - Highly Efficient Server-Aided 2PC for Mobiles.en.transcribed.srt
|
30.1 KB
|
Ostap Orobets - Highly Efficient Server-Aided 2PC for Mobiles.mp4
|
70.9 MB
|
Pedro Moreno-Sanchez - Listening to Whispers of Ripple.en.transcribed.srt
|
49.9 KB
|
Pedro Moreno-Sanchez - Listening to Whispers of Ripple.mp4
|
41.9 MB
|
Pedro Moreno-Sanchez - Whispers A Distributed Architecture.mp4
|
46.5 MB
|
Raphael R Toledo - Lower-Cost epsilon-Private Information Retrieval.en.transcribed.srt
|
24.3 KB
|
Raphael R Toledo - Lower-Cost epsilon-Private Information Retrieval.mp4
|
18.3 MB
|
Rebekah Overdorf - Blogs, Twitter Feeds, and Reddit Comments.en.transcribed.srt
|
31.6 KB
|
Richard McPherson - CovertCast Using Live Streaming to Evade Internet Censorship.en.transcribed.srt
|
31.4 KB
|
Richard McPherson - CovertCast Using Live Streaming to Evade Internet Censorship.mp4
|
20.8 MB
|
Riivo Talviste - Students and Taxes a Privacy-Preserving Social Study Using Secure Computation.en.transcribed.srt
|
24.3 KB
|
Riivo Talviste - Students and Taxes a Privacy-Preserving Social Study Using Secure Computation.mp4
|
22.9 MB
|
Rinku Dewri - Linking Health Records for Federated Query Processing.en.transcribed.srt
|
32.6 KB
|
Rinku Dewri - Linking Health Records for Federated Query Processing.mp4
|
27.7 MB
|
Ryan Henry - Polynomial Batch Codes for Efficient IT-PIR.en.transcribed.srt
|
54.1 KB
|
Ryan Henry - Polynomial Batch Codes for Efficient IT-PIR.mp4
|
41.6 MB
|
Sakshi Jain and Mobin Javed - Towards Mining Latent Client Identifiers from Network Traffic.en.transcribed.srt
|
41.8 KB
|
Sakshi Jain and Mobin Javed - Towards Mining Latent Client Identifiers from Network Traffic.mp4
|
19.1 MB
|
Samuel Grogan - Access Denied! Contrasting Data Access in the United States and Ireland.en.transcribed.srt
|
29.8 KB
|
Samuel Grogan - Access Denied! Contrasting Data Access in the United States and Ireland.mp4
|
26.9 MB
|
Sebastian Meiser - Your Choice MATor(s) Large-scale Quantitative Anonymity Assessment.en.transcribed.srt
|
37.0 KB
|
Sebastian Meiser - Your Choice MATor(s) Large-scale Quantitative Anonymity Assessment.mp4
|
30.0 MB
|
Shuai Li - Mailet Instant Social Networking under Censorship.en.transcribed.srt
|
24.1 KB
|
Shuai Li - Mailet Instant Social Networking under Censorship.mp4
|
33.3 MB
|
Susan E. McGregor - Individual versus Organizational Computer Security Concerns in Journalism.en.transcribed.srt
|
39.8 KB
|
Susan E. McGregor - Individual versus Organizational Computer Security Concerns in Journalism.mp4
|
50.5 MB
|
Tao Wang - On Realistically Attacking Tor with Website Fingerprinting.en.transcribed.srt
|
43.9 KB
|
Tao Wang - On Realistically Attacking Tor with Website Fingerprinting.mp4
|
23.1 MB
|
Tariq Elahi - A Framework for the Game-theoretic Analysis of Censorship Resistance.en.transcribed.srt
|
37.0 KB
|
Tariq Elahi - A Framework for the Game-theoretic Analysis of Censorship Resistance.mp4
|
31.7 MB
|
Tariq Elahi - SoK Making Sense of Censorship Resistance Systems.en.transcribed.srt
|
36.5 KB
|
Tariq Elahi - SoK Making Sense of Censorship Resistance Systems.mp4
|
28.7 MB
|
Tommaso Frassetto - Selfrando Securing the Tor Browser against De-anonymization Exploits.mp4
|
21.4 MB
|
William Melicher - (Do Not) Track Me Sometimes Users' Contextual Preferences for Web Tracking.en.transcribed.srt
|
32.4 KB
|
William Melicher - (Do Not) Track Me Sometimes Users' Contextual Preferences for Web Tracking.mp4
|
28.2 MB
|
Yaoqi Jia - Anonymity in Peer-assisted CDNs Inference Attacks and Mitigation.en.transcribed.srt
|
28.2 KB
|
Yaoqi Jia - Anonymity in Peer-assisted CDNs Inference Attacks and Mitigation.mp4
|
22.6 MB
|
Yaxing Yao - Flying Eyes and Hidden Controllers Privacy Perceptions of Drones.en.transcribed.srt
|
29.0 KB
|
Yaxing Yao - Flying Eyes and Hidden Controllers Privacy Perceptions of Drones.mp4
|
21.7 MB
|
/PETS 2017/
|
Aaron Johnson - PeerFlow Secure Load Balancing in Tor.en.transcribed.srt
|
62.8 KB
|
Aaron Johnson - PeerFlow Secure Load Balancing in Tor.mp4
|
29.7 MB
|
Abdelaziz Alhadlaq - Privacy in the Amazon Alexa Skills Ecosystem.en.transcribed.srt
|
23.9 KB
|
Abdelaziz Alhadlaq - Privacy in the Amazon Alexa Skills Ecosystem.mp4
|
9.4 MB
|
Adria Gascon - Privacy Preserving Distributed Linear Regression on High-Dimensional Data.mp4
|
17.0 MB
|
Agnes Kiss - Private Set Intersection for Unequal Set Sizes with Mobile Applications.en.transcribed.srt
|
39.3 KB
|
Agnes Kiss - Private Set Intersection for Unequal Set Sizes with Mobile Applications.mp4
|
13.6 MB
|
Alexandra Dmitrienko - Phonion Practical Protection of Metadata in Telephony Networks.en.transcribed.srt
|
32.2 KB
|
Alexandra Dmitrienko - Phonion Practical Protection of Metadata in Telephony Networks.mp4
|
22.4 MB
|
Alisa Pankova - Preprocessing Based Verification of Multiparty Protocols with Honest Majority.mp4
|
13.1 MB
|
Anh Pham - PrivateRide A Privacy-Enhanced Ride-Hailing Service.en.transcribed.srt
|
41.4 KB
|
Anh Pham - PrivateRide A Privacy-Enhanced Ride-Hailing Service.mp4
|
18.0 MB
|
Anrin Chakraborti - DataLair Efficient Block Storage with Plausible Deniability.en.transcribed.srt
|
45.0 KB
|
Anrin Chakraborti - DataLair Efficient Block Storage with Plausible Deniability.mp4
|
14.6 MB
|
Apostolos Pyrgelis - Evaluating Aggregation-based Location Privacy.mp4
|
17.2 MB
|
Apu Kapadia - To Permit or Not to Permit... Crowdsourcing Mobile Apps’ Privacy.en.transcribed.srt
|
44.8 KB
|
Apu Kapadia - To Permit or Not to Permit... Crowdsourcing Mobile Apps’ Privacy.mp4
|
27.2 MB
|
Chen Chen - PHI a Path-Hidden Lightweight Anonymity Protocol at Network Layer.en.transcribed.srt
|
39.3 KB
|
Chen Chen - PHI a Path-Hidden Lightweight Anonymity Protocol at Network Layer.mp4
|
15.1 MB
|
Cédric Van Rompay - A Leakage-Abuse Attack Against Multi-User Searchable Encryption.en.transcribed.srt
|
32.8 KB
|
Cédric Van Rompay - A Leakage-Abuse Attack Against Multi-User Searchable Encryption.mp4
|
16.0 MB
|
Daniel Demmler - Privacy-Preserving Interdomain Routing at Internet Scale.en.transcribed.srt
|
43.7 KB
|
Daniel Demmler - Privacy-Preserving Interdomain Routing at Internet Scale.mp4
|
20.5 MB
|
David Froelicher - Unlynx A Decentralized System for Privacy-Conscious Data Sharing.mp4
|
18.7 MB
|
Diogo Barradas - DeltaShaper Censorship-resistant TCP Tunneling over Videoconferencing.en.transcribed.srt
|
50.7 KB
|
Diogo Barradas - DeltaShaper Censorship-resistant TCP Tunneling over Videoconferencing.mp4
|
23.9 MB
|
Dominik Schürmann - Wiretapping End-to-End Encrypted VoIP Calls Real-World Attacks on ZRTP.en.transcribed.srt
|
36.2 KB
|
Dominik Schürmann - Wiretapping End-to-End Encrypted VoIP Calls Real-World Attacks on ZRTP.mp4
|
25.4 MB
|
Fatemeh Rezaei - TagIt Tagging Network Flows using Blind Fingerprints.mp4
|
14.7 MB
|
Florentin Rochet - Waterfilling Balancing the Tor network with maximum diversity.en.transcribed.srt
|
30.4 KB
|
Florentin Rochet - Waterfilling Balancing the Tor network with maximum diversity.mp4
|
16.7 MB
|
Giovanni Cherubin - Bayes, not Naïve Security Bounds on Website Fingerprinting Defenses.en.transcribed.srt
|
35.1 KB
|
Giovanni Cherubin - Bayes, not Naïve Security Bounds on Website Fingerprinting Defenses.mp4
|
33.3 MB
|
Hadi Asghari - The Right of Access as a tool for Privacy Governance.en.transcribed.srt
|
40.5 KB
|
Hadi Asghari - The Right of Access as a tool for Privacy Governance.mp4
|
21.2 MB
|
Henry Birge-Lee - Using BGP to Acquire Bogus TLS Certificates.en.transcribed.srt
|
50.4 KB
|
Henry Birge-Lee - Using BGP to Acquire Bogus TLS Certificates.mp4
|
46.8 MB
|
Hoda Aghaei Khouzani - ErasuCrypto A Light-weight Secure Data Deletion Scheme for Solid State SSDs.en.transcribed.srt
|
37.6 KB
|
Hoda Aghaei Khouzani - ErasuCrypto A Light-weight Secure Data Deletion Scheme for Solid State SSDs.mp4
|
14.4 MB
|
HotPETs Opening Remarks.en.transcribed.srt
|
13.7 KB
|
HotPETs Opening Remarks.mp4
|
11.7 MB
|
Hung Dang - Privacy-preserving computation with trusted computing via Scramble-then-Compute.mp4
|
12.2 MB
|
Jack Grigg - I2P Open Research Questions about I2P.en.transcribed.srt
|
43.3 KB
|
Jack Grigg - I2P Open Research Questions about I2P.mp4
|
15.0 MB
|
Jeremy Martin - A Study of MAC Address Randomization in Mobile Devices and When it Fails.en.transcribed.srt
|
44.5 KB
|
Jeremy Martin - A Study of MAC Address Randomization in Mobile Devices and When it Fails.mp4
|
20.6 MB
|
Jesse Victors - The Onion Name System Tor-powered Decentralized DNS for Tor Onion Services.en.transcribed.srt
|
43.5 KB
|
Jesse Victors - The Onion Name System Tor-powered Decentralized DNS for Tor Onion Services.mp4
|
26.0 MB
|
Jian Liu - Are you The One to Share Secret Transfer with Access Structure.en.transcribed.srt
|
25.4 KB
|
Jian Liu - Are you The One to Share Secret Transfer with Access Structure.mp4
|
13.0 MB
|
Jonathan Albright - PETS Keynote - Emotional Targeting... and the Shaping of Social Discourse.en.transcribed.srt
|
197.1 KB
|
Jonathan Albright - PETS Keynote - Emotional Targeting... and the Shaping of Social Discourse.mp4
|
196.4 MB
|
Josh Aas - HotPETs Keynote - How We'll Encrypt the Web.en.transcribed.srt
|
102.0 KB
|
Josh Aas - HotPETs Keynote - How We'll Encrypt the Web.mp4
|
88.5 MB
|
Joshua Gancher - Externally Verifiable Oblivious RAM - YouTube.en.transcribed.srt
|
43.1 KB
|
Joshua Gancher - Externally Verifiable Oblivious RAM - YouTube.mp4
|
12.3 MB
|
Justin Bookman - Cross-Device Tracking Measurement and Disclosures.en.transcribed.srt
|
55.6 KB
|
Justin Bookman - Cross-Device Tracking Measurement and Disclosures.mp4
|
17.0 MB
|
Kevin Corre - Why Can't Users Choose Their Identity Providers On The Web.en.transcribed.srt
|
31.9 KB
|
Kevin Corre - Why Can't Users Choose Their Identity Providers On The Web.mp4
|
12.6 MB
|
Konstantinos Chatzikokolakis - Efficient utility improvement for location privacy.mp4
|
19.9 MB
|
Kovila P.L. Coopamootoo - An Empirical Study of Privacy & Sharing Attitude.en.transcribed.srt
|
29.9 KB
|
Kovila P.L. Coopamootoo - An Empirical Study of Privacy & Sharing Attitude.mp4
|
17.4 MB
|
Lachlan J. Gunn - Safety in Numbers Anonymization Makes Keyservers Trustworthy.en.transcribed.srt
|
43.8 KB
|
Lachlan J. Gunn - Safety in Numbers Anonymization Makes Keyservers Trustworthy.mp4
|
16.1 MB
|
Linda Lee - A Usability Evaluation of Tor Launcher.en.transcribed.srt
|
41.8 KB
|
Linda Lee - A Usability Evaluation of Tor Launcher.mp4
|
20.7 MB
|
M. Sadegh Riazi - Toward Practical Secure Stable Matching.en.transcribed.srt
|
34.7 KB
|
M. Sadegh Riazi - Toward Practical Secure Stable Matching.mp4
|
13.8 MB
|
Marc Juarez - Website Fingerprinting Defenses at the Application Layer.en.transcribed.srt
|
34.7 KB
|
Marc Juarez - Website Fingerprinting Defenses at the Application Layer.mp4
|
19.3 MB
|
Marios Isaakidis - Systematizing Decentralization and Privacy.mp4
|
23.0 MB
|
Matthew Wright - A Wide-Area Testbed for Tor.en.transcribed.srt
|
30.1 KB
|
Matthew Wright - A Wide-Area Testbed for Tor.mp4
|
16.0 MB
|
Michael Reiter - Personalized Pseudonyms for Servers in the Cloud.en.transcribed.srt
|
54.0 KB
|
Michael Reiter - Personalized Pseudonyms for Servers in the Cloud.mp4
|
19.7 MB
|
Mojtaba Eskandari - Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps.en.transcribed.srt
|
31.0 KB
|
Mojtaba Eskandari - Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps.mp4
|
14.6 MB
|
Muhammad Ikram - Towards Seamless Tracking-Free Web Improved Detection of Trackers.en.transcribed.srt
|
40.8 KB
|
Muhammad Ikram - Towards Seamless Tracking-Free Web Improved Detection of Trackers.mp4
|
20.1 MB
|
PETS Opening Remarks.en.transcribed.srt
|
48.3 KB
|
PETS Opening Remarks.mp4
|
36.9 MB
|
Paul Syverson - Oft Target Tor adversary models that don't miss the mark.en.transcribed.srt
|
47.8 KB
|
Paul Syverson - Oft Target Tor adversary models that don't miss the mark.mp4
|
19.2 MB
|
Pedro Moreno-Sanchez - PathShuffle Credit Mixing and Anonymous Payments for Ripple.en.transcribed.srt
|
46.8 KB
|
Pedro Moreno-Sanchez - PathShuffle Credit Mixing and Anonymous Payments for Ripple.mp4
|
21.4 MB
|
Peter Ney and Ian Smith - SeaGlass Enabling City-Wide IMSI-Catcher Detection.en.transcribed.srt
|
44.2 KB
|
Peter Ney and Ian Smith - SeaGlass Enabling City-Wide IMSI-Catcher Detection.mp4
|
24.8 MB
|
Rinku Dewri - Location Privacy for Rank-based Geo-Query Systems.en.transcribed.srt
|
47.0 KB
|
Rinku Dewri - Location Privacy for Rank-based Geo-Query Systems.mp4
|
28.9 MB
|
Ruben Recabarren - Hardening Stratum, the Bitcoin Pool Mining Protocol.en.transcribed.srt
|
41.9 KB
|
Ruben Recabarren - Hardening Stratum, the Bitcoin Pool Mining Protocol.mp4
|
19.3 MB
|
Saba Eskandarian - Certificate Transparency with Privacy.en.transcribed.srt
|
46.2 KB
|
Saba Eskandarian - Certificate Transparency with Privacy.mp4
|
18.2 MB
|
Se Eun Oh - Identifying Keywords in Search Engine Queries over Tor.en.transcribed.srt
|
32.9 KB
|
Se Eun Oh - Identifying Keywords in Search Engine Queries over Tor.mp4
|
22.5 MB
|
Spyros Boukoros - Two Is Not Enough Privacy Assessment of Aggregation Schemes in Smart Metering.mp4
|
20.4 MB
|
Steven Englehardt - Battery Status Not Included Assessing Privacy in Web Standards.en.transcribed.srt
|
41.4 KB
|
Steven Englehardt - Battery Status Not Included Assessing Privacy in Web Standards.mp4
|
14.5 MB
|
Takao Murakami - Expectation-Maximization Tensor Factorization for Location Privacy Attacks.mp4
|
19.7 MB
|
Vasilios Mavroudis - On the Privacy and Security of the Ultrasound Ecosystem.en.transcribed.srt
|
46.0 KB
|
Vasilios Mavroudis - On the Privacy and Security of the Ultrasound Ecosystem.mp4
|
21.4 MB
|
Wendi Diao - Vulnerable GPU Memory Management Towards Recovering Raw Data from GPU.en.transcribed.srt
|
25.9 KB
|
Wendi Diao - Vulnerable GPU Memory Management Towards Recovering Raw Data from GPU.mp4
|
14.6 MB
|
William Marczak - Social Engineering Attacks on Government Opponents....en.transcribed.srt
|
50.9 KB
|
William Marczak - Social Engineering Attacks on Government Opponents....mp4
|
20.9 MB
|
Wouter Lueks - IRMA decentralized and privacy-friendly identity management using smartphones.en.transcribed.srt
|
47.0 KB
|
Wouter Lueks - IRMA decentralized and privacy-friendly identity management using smartphones.mp4
|
19.5 MB
|
Yao Li - Cross-cultural Privacy Prediction.en.transcribed.srt
|
31.2 KB
|
Yao Li - Cross-cultural Privacy Prediction.mp4
|
21.6 MB
|
Yousra Javed - Look Before You Authorize Using Eye-Tracking To Enforce User.en.transcribed.srt
|
33.2 KB
|
Yousra Javed - Look Before You Authorize Using Eye-Tracking To Enforce User.mp4
|
17.9 MB
|
Zachary A. Kissel - Generic Adaptively Secure Searchable Phrase Encryption.en.transcribed.srt
|
30.6 KB
|
Zachary A. Kissel - Generic Adaptively Secure Searchable Phrase Encryption.mp4
|
11.3 MB
|
Zachary Weinberg - Topics of Controversy An Empirical Analysis of Web Censorship Lists.en.transcribed.srt
|
41.0 KB
|
Zachary Weinberg - Topics of Controversy An Empirical Analysis of Web Censorship Lists.mp4
|
18.1 MB
|
Zubair Shafiq - Detecting Anti Ad-blockers in the Wild.en.transcribed.srt
|
51.6 KB
|
Zubair Shafiq - Detecting Anti Ad-blockers in the Wild.mp4
|
19.8 MB
|
/PETS 2018/
|
PETS 2018 - Day 1 afternoon (Tuesday, July 24).mp4
|
381.8 MB
|
PETS 2018 - Day 1 morning (Tuesday, July 24).mp4
|
407.1 MB
|
PETS 2018 - Day 2 afternoon (Wednesday, July 25).mp4
|
343.4 MB
|
PETS 2018 - Day 2 morning (Wednesday, July 25).mp4
|
325.9 MB
|
PETS 2018 - Day 3 afternoon (Thursday, July 26).mp4
|
468.2 MB
|
PETS 2018 - Day 3 morning (Thursday, July 26).mp4
|
209.4 MB
|
PETS 2018 - Day 4 afternoon (Friday, July 27).mp4
|
341.0 MB
|
PETS 2018 - Day 4 morning (Friday, July 27).mp4
|
379.0 MB
|
/
|
PETS Logo.jpg
|
52.3 KB
|
PETS thank you.txt
|
1.1 KB
|
Total files 228
|