FileMood

Download PETS

PETS

Name

PETS

 DOWNLOAD Copy Link

Total Size

6.0 GB

Total Files

228

Hash

710D0ABB4A160B16D50D45FCAC6E37435C3FD506

/PETS 2016/

Aaron Johnson - Opening Keynote HotPETS 2016.en.transcribed.srt

22.7 KB

Aaron Johnson - Opening Keynote HotPETS 2016.mp4

13.5 MB

Albert Kwon - Riffle Efficient Communication System With Strong Anonymity.en.transcribed.srt

45.2 KB

Albert Kwon - Riffle Efficient Communication System With Strong Anonymity.mp4

21.6 MB

Ame Elliott - Respecting Participants in Privacy-Related User Studies.en.transcribed.srt

35.0 KB

Ame Elliott - Respecting Participants in Privacy-Related User Studies.mp4

38.8 MB

Andy Rupp - Black-Box Accumulation Collecting Incentives in a Privacy-Preserving Way.en.transcribed.srt

27.5 KB

Andy Rupp - Black-Box Accumulation Collecting Incentives in a Privacy-Preserving Way.mp4

33.6 MB

Angela Sasse - Goodbye Passwords, Hello Biometrics Do We Understand the Privacy Implications.en.transcribed.srt

121.5 KB

Angela Sasse - Goodbye Passwords, Hello Biometrics Do We Understand the Privacy Implications.mp4

90.7 MB

Aylin Caliskan-Islam - A Story of Discrimination and Unfairness.en.transcribed.srt

40.6 KB

Aylin Caliskan-Islam - A Story of Discrimination and Unfairness.mp4

22.0 MB

Carlos Aguilar Melchor - XPIR Private Information Retrieval for Everyone.en.transcribed.srt

37.3 KB

Carlos Aguilar Melchor - XPIR Private Information Retrieval for Everyone.mp4

46.8 MB

Chad Spensky - SoK Privacy on Mobile Devices – It’s Complicated.en.transcribed.srt

42.8 KB

Cristina Onete - Achieving Better Privacy for the 3GPP AKA Protocol.en.transcribed.srt

34.8 KB

Cristina Onete - Achieving Better Privacy for the 3GPP AKA Protocol.mp4

26.0 MB

Dan Blah Meredith - Thank You for Protecting Human Rights - HotPETs Keynote 2016.en.transcribed.srt

106.9 KB

Dan Blah Meredith - Thank You for Protecting Human Rights - HotPETs Keynote 2016.mp4

128.2 MB

David J. Wu - Privately Evaluating Decision Trees and Random Forests.en.transcribed.srt

40.6 KB

David J. Wu - Privately Evaluating Decision Trees and Random Forests.mp4

24.1 MB

Emmanuel Bello-Ogunu - Crowdsourcing for Context.en.transcribed.srt

34.8 KB

Esha Ghosh - Efficient Verifiable Range and Closest Point Queries in Zero-Knowledge.en.transcribed.srt

32.8 KB

Esha Ghosh - Efficient Verifiable Range and Closest Point Queries in Zero-Knowledge.mp4

20.8 MB

Franz Kargl - Tales from the Dark Side Privacy Dark Strategies and Privacy Dark Patterns.en.transcribed.srt

26.9 KB

Frederick Douglas - Salmon Robust Proxy Distribution for Censorship Circumvention.en.transcribed.srt

27.7 KB

Frederick Douglas - Salmon Robust Proxy Distribution for Censorship Circumvention.mp4

39.1 MB

Frederik Möllers & Christoph Sorge - Privacy Challenges in the Quantified Self Movement.en.transcribed.srt

32.1 KB

Frederik Möllers & Christoph Sorge - Privacy Challenges in the Quantified Self Movement.mp4

37.0 MB

Gabor György Gulyás - Near-Optimal Fingerprinting with Constraints.mp4

19.3 MB

Giulia Fanti - Building a RAPPOR with the Unknown.en.transcribed.srt

43.7 KB

Giulia Fanti - Building a RAPPOR with the Unknown.mp4

17.6 MB

Hamza Harkous - The Curious Case of the PDF Converter that Likes Mozart.en.transcribed.srt

32.4 KB

Hamza Harkous - The Curious Case of the PDF Converter that Likes Mozart.mp4

32.5 MB

Hao Wu - Location Privacy with Randomness Consistency.en.transcribed.srt

23.9 KB

Hao Wu - Location Privacy with Randomness Consistency.mp4

26.2 MB

Harry Halpin - The Responsibility of Open Standards in the Era of Surveillance.en.transcribed.srt

42.1 KB

Harry Halpin - The Responsibility of Open Standards in the Era of Surveillance.mp4

33.5 MB

Jean-Sebastien Legare - Beeswax A Platform for Private Web Apps.en.transcribed.srt

33.9 KB

Jean-Sebastien Legare - Beeswax A Platform for Private Web Apps.mp4

25.0 MB

Jens Grossklags - Towards a Model on the Factors Influencing Social App Users' Valuation.en.transcribed.srt

36.6 KB

Jens Grossklags - Towards a Model on the Factors Influencing Social App Users' Valuation.mp4

29.4 MB

John M. Schanck - Circuit-Extension Handshakes for Tor Achieving Forward Secrecy in a Quantum World.en.transcribed.srt

34.8 KB

John M. Schanck - Circuit-Extension Handshakes for Tor Achieving Forward Secrecy in a Quantum World.mp4

23.2 MB

João Garcia - Isolating Graphical Failure-Inducing Input.en.transcribed.srt

30.6 KB

Kassem Fawaz - Privacy vs. Reward in Indoor Location-Based Services.en.transcribed.srt

42.1 KB

Kassem Fawaz - Privacy vs. Reward in Indoor Location-Based Services.mp4

22.5 MB

Keith Ross - The Right to be Forgotten in the Media A Data-Driven Study.en.transcribed.srt

41.2 KB

Laurent Simon - Don't Interrupt Me While I Type.en.transcribed.srt

35.5 KB

Laurent Simon - Don't Interrupt Me While I Type.mp4

24.9 MB

Linus Gasser - Managing Identities Using Blockchains and CoSi.en.transcribed.srt

34.6 KB

Linus Gasser - Managing Identities Using Blockchains and CoSi.mp4

22.3 MB

Marina Blanton and Fattaneh Bayatbabolghani - Efficient Server-Aided Secure Two-Party Function.en.transcribed.srt

36.4 KB

Marina Blanton and Fattaneh Bayatbabolghani - Efficient Server-Aided Secure Two-Party Function.mp4

62.4 MB

Marios Isaakidis - Eclipse and Re-Emergence of Anonymous P2P Storage Network Overlay Services.mp4

22.7 MB

Micah Sherr - Data-plane Defenses against Routing Attacks on Tor.en.transcribed.srt

36.0 KB

Micah Sherr - Scalable and Anonymous Group Communication with MTor.en.transcribed.srt

35.9 KB

Micah Sherr - Scalable and Anonymous Group Communication with MTor.mp4

31.9 MB

Miro Enev - Automobile Driver Fingerprinting.en.transcribed.srt

45.0 KB

Miro Enev - Automobile Driver Fingerprinting.mp4

50.4 MB

Oleskii Starov - Are You Sure You Want to Contact Us.mp4

25.5 MB

Ostap Orobets - Highly Efficient Server-Aided 2PC for Mobiles.en.transcribed.srt

30.1 KB

Ostap Orobets - Highly Efficient Server-Aided 2PC for Mobiles.mp4

70.9 MB

Pedro Moreno-Sanchez - Listening to Whispers of Ripple.en.transcribed.srt

49.9 KB

Pedro Moreno-Sanchez - Listening to Whispers of Ripple.mp4

41.9 MB

Pedro Moreno-Sanchez - Whispers A Distributed Architecture.mp4

46.5 MB

Raphael R Toledo - Lower-Cost epsilon-Private Information Retrieval.en.transcribed.srt

24.3 KB

Raphael R Toledo - Lower-Cost epsilon-Private Information Retrieval.mp4

18.3 MB

Rebekah Overdorf - Blogs, Twitter Feeds, and Reddit Comments.en.transcribed.srt

31.6 KB

Richard McPherson - CovertCast Using Live Streaming to Evade Internet Censorship.en.transcribed.srt

31.4 KB

Richard McPherson - CovertCast Using Live Streaming to Evade Internet Censorship.mp4

20.8 MB

Riivo Talviste - Students and Taxes a Privacy-Preserving Social Study Using Secure Computation.en.transcribed.srt

24.3 KB

Riivo Talviste - Students and Taxes a Privacy-Preserving Social Study Using Secure Computation.mp4

22.9 MB

Rinku Dewri - Linking Health Records for Federated Query Processing.en.transcribed.srt

32.6 KB

Rinku Dewri - Linking Health Records for Federated Query Processing.mp4

27.7 MB

Ryan Henry - Polynomial Batch Codes for Efficient IT-PIR.en.transcribed.srt

54.1 KB

Ryan Henry - Polynomial Batch Codes for Efficient IT-PIR.mp4

41.6 MB

Sakshi Jain and Mobin Javed - Towards Mining Latent Client Identifiers from Network Traffic.en.transcribed.srt

41.8 KB

Sakshi Jain and Mobin Javed - Towards Mining Latent Client Identifiers from Network Traffic.mp4

19.1 MB

Samuel Grogan - Access Denied! Contrasting Data Access in the United States and Ireland.en.transcribed.srt

29.8 KB

Samuel Grogan - Access Denied! Contrasting Data Access in the United States and Ireland.mp4

26.9 MB

Sebastian Meiser - Your Choice MATor(s) Large-scale Quantitative Anonymity Assessment.en.transcribed.srt

37.0 KB

Sebastian Meiser - Your Choice MATor(s) Large-scale Quantitative Anonymity Assessment.mp4

30.0 MB

Shuai Li - Mailet Instant Social Networking under Censorship.en.transcribed.srt

24.1 KB

Shuai Li - Mailet Instant Social Networking under Censorship.mp4

33.3 MB

Susan E. McGregor - Individual versus Organizational Computer Security Concerns in Journalism.en.transcribed.srt

39.8 KB

Susan E. McGregor - Individual versus Organizational Computer Security Concerns in Journalism.mp4

50.5 MB

Tao Wang - On Realistically Attacking Tor with Website Fingerprinting.en.transcribed.srt

43.9 KB

Tao Wang - On Realistically Attacking Tor with Website Fingerprinting.mp4

23.1 MB

Tariq Elahi - A Framework for the Game-theoretic Analysis of Censorship Resistance.en.transcribed.srt

37.0 KB

Tariq Elahi - A Framework for the Game-theoretic Analysis of Censorship Resistance.mp4

31.7 MB

Tariq Elahi - SoK Making Sense of Censorship Resistance Systems.en.transcribed.srt

36.5 KB

Tariq Elahi - SoK Making Sense of Censorship Resistance Systems.mp4

28.7 MB

Tommaso Frassetto - Selfrando Securing the Tor Browser against De-anonymization Exploits.mp4

21.4 MB

William Melicher - (Do Not) Track Me Sometimes Users' Contextual Preferences for Web Tracking.en.transcribed.srt

32.4 KB

William Melicher - (Do Not) Track Me Sometimes Users' Contextual Preferences for Web Tracking.mp4

28.2 MB

Yaoqi Jia - Anonymity in Peer-assisted CDNs Inference Attacks and Mitigation.en.transcribed.srt

28.2 KB

Yaoqi Jia - Anonymity in Peer-assisted CDNs Inference Attacks and Mitigation.mp4

22.6 MB

Yaxing Yao - Flying Eyes and Hidden Controllers Privacy Perceptions of Drones.en.transcribed.srt

29.0 KB

Yaxing Yao - Flying Eyes and Hidden Controllers Privacy Perceptions of Drones.mp4

21.7 MB

/PETS 2017/

Aaron Johnson - PeerFlow Secure Load Balancing in Tor.en.transcribed.srt

62.8 KB

Aaron Johnson - PeerFlow Secure Load Balancing in Tor.mp4

29.7 MB

Abdelaziz Alhadlaq - Privacy in the Amazon Alexa Skills Ecosystem.en.transcribed.srt

23.9 KB

Abdelaziz Alhadlaq - Privacy in the Amazon Alexa Skills Ecosystem.mp4

9.4 MB

Adria Gascon - Privacy Preserving Distributed Linear Regression on High-Dimensional Data.mp4

17.0 MB

Agnes Kiss - Private Set Intersection for Unequal Set Sizes with Mobile Applications.en.transcribed.srt

39.3 KB

Agnes Kiss - Private Set Intersection for Unequal Set Sizes with Mobile Applications.mp4

13.6 MB

Alexandra Dmitrienko - Phonion Practical Protection of Metadata in Telephony Networks.en.transcribed.srt

32.2 KB

Alexandra Dmitrienko - Phonion Practical Protection of Metadata in Telephony Networks.mp4

22.4 MB

Alisa Pankova - Preprocessing Based Verification of Multiparty Protocols with Honest Majority.mp4

13.1 MB

Anh Pham - PrivateRide A Privacy-Enhanced Ride-Hailing Service.en.transcribed.srt

41.4 KB

Anh Pham - PrivateRide A Privacy-Enhanced Ride-Hailing Service.mp4

18.0 MB

Anrin Chakraborti - DataLair Efficient Block Storage with Plausible Deniability.en.transcribed.srt

45.0 KB

Anrin Chakraborti - DataLair Efficient Block Storage with Plausible Deniability.mp4

14.6 MB

Apostolos Pyrgelis - Evaluating Aggregation-based Location Privacy.mp4

17.2 MB

Apu Kapadia - To Permit or Not to Permit... Crowdsourcing Mobile Apps’ Privacy.en.transcribed.srt

44.8 KB

Apu Kapadia - To Permit or Not to Permit... Crowdsourcing Mobile Apps’ Privacy.mp4

27.2 MB

Chen Chen - PHI a Path-Hidden Lightweight Anonymity Protocol at Network Layer.en.transcribed.srt

39.3 KB

Chen Chen - PHI a Path-Hidden Lightweight Anonymity Protocol at Network Layer.mp4

15.1 MB

Cédric Van Rompay - A Leakage-Abuse Attack Against Multi-User Searchable Encryption.en.transcribed.srt

32.8 KB

Cédric Van Rompay - A Leakage-Abuse Attack Against Multi-User Searchable Encryption.mp4

16.0 MB

Daniel Demmler - Privacy-Preserving Interdomain Routing at Internet Scale.en.transcribed.srt

43.7 KB

Daniel Demmler - Privacy-Preserving Interdomain Routing at Internet Scale.mp4

20.5 MB

David Froelicher - Unlynx A Decentralized System for Privacy-Conscious Data Sharing.mp4

18.7 MB

Diogo Barradas - DeltaShaper Censorship-resistant TCP Tunneling over Videoconferencing.en.transcribed.srt

50.7 KB

Diogo Barradas - DeltaShaper Censorship-resistant TCP Tunneling over Videoconferencing.mp4

23.9 MB

Dominik Schürmann - Wiretapping End-to-End Encrypted VoIP Calls Real-World Attacks on ZRTP.en.transcribed.srt

36.2 KB

Dominik Schürmann - Wiretapping End-to-End Encrypted VoIP Calls Real-World Attacks on ZRTP.mp4

25.4 MB

Fatemeh Rezaei - TagIt Tagging Network Flows using Blind Fingerprints.mp4

14.7 MB

Florentin Rochet - Waterfilling Balancing the Tor network with maximum diversity.en.transcribed.srt

30.4 KB

Florentin Rochet - Waterfilling Balancing the Tor network with maximum diversity.mp4

16.7 MB

Giovanni Cherubin - Bayes, not Naïve Security Bounds on Website Fingerprinting Defenses.en.transcribed.srt

35.1 KB

Giovanni Cherubin - Bayes, not Naïve Security Bounds on Website Fingerprinting Defenses.mp4

33.3 MB

Hadi Asghari - The Right of Access as a tool for Privacy Governance.en.transcribed.srt

40.5 KB

Hadi Asghari - The Right of Access as a tool for Privacy Governance.mp4

21.2 MB

Henry Birge-Lee - Using BGP to Acquire Bogus TLS Certificates.en.transcribed.srt

50.4 KB

Henry Birge-Lee - Using BGP to Acquire Bogus TLS Certificates.mp4

46.8 MB

Hoda Aghaei Khouzani - ErasuCrypto A Light-weight Secure Data Deletion Scheme for Solid State SSDs.en.transcribed.srt

37.6 KB

Hoda Aghaei Khouzani - ErasuCrypto A Light-weight Secure Data Deletion Scheme for Solid State SSDs.mp4

14.4 MB

HotPETs Opening Remarks.en.transcribed.srt

13.7 KB

HotPETs Opening Remarks.mp4

11.7 MB

Hung Dang - Privacy-preserving computation with trusted computing via Scramble-then-Compute.mp4

12.2 MB

Jack Grigg - I2P Open Research Questions about I2P.en.transcribed.srt

43.3 KB

Jack Grigg - I2P Open Research Questions about I2P.mp4

15.0 MB

Jeremy Martin - A Study of MAC Address Randomization in Mobile Devices and When it Fails.en.transcribed.srt

44.5 KB

Jeremy Martin - A Study of MAC Address Randomization in Mobile Devices and When it Fails.mp4

20.6 MB

Jesse Victors - The Onion Name System Tor-powered Decentralized DNS for Tor Onion Services.en.transcribed.srt

43.5 KB

Jesse Victors - The Onion Name System Tor-powered Decentralized DNS for Tor Onion Services.mp4

26.0 MB

Jian Liu - Are you The One to Share Secret Transfer with Access Structure.en.transcribed.srt

25.4 KB

Jian Liu - Are you The One to Share Secret Transfer with Access Structure.mp4

13.0 MB

Jonathan Albright - PETS Keynote - Emotional Targeting... and the Shaping of Social Discourse.en.transcribed.srt

197.1 KB

Jonathan Albright - PETS Keynote - Emotional Targeting... and the Shaping of Social Discourse.mp4

196.4 MB

Josh Aas - HotPETs Keynote - How We'll Encrypt the Web.en.transcribed.srt

102.0 KB

Josh Aas - HotPETs Keynote - How We'll Encrypt the Web.mp4

88.5 MB

Joshua Gancher - Externally Verifiable Oblivious RAM - YouTube.en.transcribed.srt

43.1 KB

Joshua Gancher - Externally Verifiable Oblivious RAM - YouTube.mp4

12.3 MB

Justin Bookman - Cross-Device Tracking Measurement and Disclosures.en.transcribed.srt

55.6 KB

Justin Bookman - Cross-Device Tracking Measurement and Disclosures.mp4

17.0 MB

Kevin Corre - Why Can't Users Choose Their Identity Providers On The Web.en.transcribed.srt

31.9 KB

Kevin Corre - Why Can't Users Choose Their Identity Providers On The Web.mp4

12.6 MB

Konstantinos Chatzikokolakis - Efficient utility improvement for location privacy.mp4

19.9 MB

Kovila P.L. Coopamootoo - An Empirical Study of Privacy & Sharing Attitude.en.transcribed.srt

29.9 KB

Kovila P.L. Coopamootoo - An Empirical Study of Privacy & Sharing Attitude.mp4

17.4 MB

Lachlan J. Gunn - Safety in Numbers Anonymization Makes Keyservers Trustworthy.en.transcribed.srt

43.8 KB

Lachlan J. Gunn - Safety in Numbers Anonymization Makes Keyservers Trustworthy.mp4

16.1 MB

Linda Lee - A Usability Evaluation of Tor Launcher.en.transcribed.srt

41.8 KB

Linda Lee - A Usability Evaluation of Tor Launcher.mp4

20.7 MB

M. Sadegh Riazi - Toward Practical Secure Stable Matching.en.transcribed.srt

34.7 KB

M. Sadegh Riazi - Toward Practical Secure Stable Matching.mp4

13.8 MB

Marc Juarez - Website Fingerprinting Defenses at the Application Layer.en.transcribed.srt

34.7 KB

Marc Juarez - Website Fingerprinting Defenses at the Application Layer.mp4

19.3 MB

Marios Isaakidis - Systematizing Decentralization and Privacy.mp4

23.0 MB

Matthew Wright - A Wide-Area Testbed for Tor.en.transcribed.srt

30.1 KB

Matthew Wright - A Wide-Area Testbed for Tor.mp4

16.0 MB

Michael Reiter - Personalized Pseudonyms for Servers in the Cloud.en.transcribed.srt

54.0 KB

Michael Reiter - Personalized Pseudonyms for Servers in the Cloud.mp4

19.7 MB

Mojtaba Eskandari - Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps.en.transcribed.srt

31.0 KB

Mojtaba Eskandari - Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps.mp4

14.6 MB

Muhammad Ikram - Towards Seamless Tracking-Free Web Improved Detection of Trackers.en.transcribed.srt

40.8 KB

Muhammad Ikram - Towards Seamless Tracking-Free Web Improved Detection of Trackers.mp4

20.1 MB

PETS Opening Remarks.en.transcribed.srt

48.3 KB

PETS Opening Remarks.mp4

36.9 MB

Paul Syverson - Oft Target Tor adversary models that don't miss the mark.en.transcribed.srt

47.8 KB

Paul Syverson - Oft Target Tor adversary models that don't miss the mark.mp4

19.2 MB

Pedro Moreno-Sanchez - PathShuffle Credit Mixing and Anonymous Payments for Ripple.en.transcribed.srt

46.8 KB

Pedro Moreno-Sanchez - PathShuffle Credit Mixing and Anonymous Payments for Ripple.mp4

21.4 MB

Peter Ney and Ian Smith - SeaGlass Enabling City-Wide IMSI-Catcher Detection.en.transcribed.srt

44.2 KB

Peter Ney and Ian Smith - SeaGlass Enabling City-Wide IMSI-Catcher Detection.mp4

24.8 MB

Rinku Dewri - Location Privacy for Rank-based Geo-Query Systems.en.transcribed.srt

47.0 KB

Rinku Dewri - Location Privacy for Rank-based Geo-Query Systems.mp4

28.9 MB

Ruben Recabarren - Hardening Stratum, the Bitcoin Pool Mining Protocol.en.transcribed.srt

41.9 KB

Ruben Recabarren - Hardening Stratum, the Bitcoin Pool Mining Protocol.mp4

19.3 MB

Saba Eskandarian - Certificate Transparency with Privacy.en.transcribed.srt

46.2 KB

Saba Eskandarian - Certificate Transparency with Privacy.mp4

18.2 MB

Se Eun Oh - Identifying Keywords in Search Engine Queries over Tor.en.transcribed.srt

32.9 KB

Se Eun Oh - Identifying Keywords in Search Engine Queries over Tor.mp4

22.5 MB

Spyros Boukoros - Two Is Not Enough Privacy Assessment of Aggregation Schemes in Smart Metering.mp4

20.4 MB

Steven Englehardt - Battery Status Not Included Assessing Privacy in Web Standards.en.transcribed.srt

41.4 KB

Steven Englehardt - Battery Status Not Included Assessing Privacy in Web Standards.mp4

14.5 MB

Takao Murakami - Expectation-Maximization Tensor Factorization for Location Privacy Attacks.mp4

19.7 MB

Vasilios Mavroudis - On the Privacy and Security of the Ultrasound Ecosystem.en.transcribed.srt

46.0 KB

Vasilios Mavroudis - On the Privacy and Security of the Ultrasound Ecosystem.mp4

21.4 MB

Wendi Diao - Vulnerable GPU Memory Management Towards Recovering Raw Data from GPU.en.transcribed.srt

25.9 KB

Wendi Diao - Vulnerable GPU Memory Management Towards Recovering Raw Data from GPU.mp4

14.6 MB

William Marczak - Social Engineering Attacks on Government Opponents....en.transcribed.srt

50.9 KB

William Marczak - Social Engineering Attacks on Government Opponents....mp4

20.9 MB

Wouter Lueks - IRMA decentralized and privacy-friendly identity management using smartphones.en.transcribed.srt

47.0 KB

Wouter Lueks - IRMA decentralized and privacy-friendly identity management using smartphones.mp4

19.5 MB

Yao Li - Cross-cultural Privacy Prediction.en.transcribed.srt

31.2 KB

Yao Li - Cross-cultural Privacy Prediction.mp4

21.6 MB

Yousra Javed - Look Before You Authorize Using Eye-Tracking To Enforce User.en.transcribed.srt

33.2 KB

Yousra Javed - Look Before You Authorize Using Eye-Tracking To Enforce User.mp4

17.9 MB

Zachary A. Kissel - Generic Adaptively Secure Searchable Phrase Encryption.en.transcribed.srt

30.6 KB

Zachary A. Kissel - Generic Adaptively Secure Searchable Phrase Encryption.mp4

11.3 MB

Zachary Weinberg - Topics of Controversy An Empirical Analysis of Web Censorship Lists.en.transcribed.srt

41.0 KB

Zachary Weinberg - Topics of Controversy An Empirical Analysis of Web Censorship Lists.mp4

18.1 MB

Zubair Shafiq - Detecting Anti Ad-blockers in the Wild.en.transcribed.srt

51.6 KB

Zubair Shafiq - Detecting Anti Ad-blockers in the Wild.mp4

19.8 MB

/PETS 2018/

PETS 2018 - Day 1 afternoon (Tuesday, July 24).mp4

381.8 MB

PETS 2018 - Day 1 morning (Tuesday, July 24).mp4

407.1 MB

PETS 2018 - Day 2 afternoon (Wednesday, July 25).mp4

343.4 MB

PETS 2018 - Day 2 morning (Wednesday, July 25).mp4

325.9 MB

PETS 2018 - Day 3 afternoon (Thursday, July 26).mp4

468.2 MB

PETS 2018 - Day 3 morning (Thursday, July 26).mp4

209.4 MB

PETS 2018 - Day 4 afternoon (Friday, July 27).mp4

341.0 MB

PETS 2018 - Day 4 morning (Friday, July 27).mp4

379.0 MB

/

PETS Logo.jpg

52.3 KB

PETS thank you.txt

1.1 KB

 

Total files 228


Copyright © 2024 FileMood.com