Full Papers:

  • Shuai Li, Mike Schliep and Nick Hopper. Facet: Streaming over Videoconferencing for Censorship Circumvention
  • Aylin Caliskan-Islam, Jonathan Walsh and Rachel Greenstadt. Privacy Detective: Detecting Private Information and Collective Privacy Behavior in a Large Social Network
  • Haya Shulman. Pretty Bad Privacy:\\Pitfalls of DNS Encryption
  • George Theodorakopoulos, Reza Shokri, Carmela Troncoso, Jean-Pierre Hubaux and Jean-Yves Le Boudec. Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services
  • Kumar Sharad and George Danezis. An Automated Social Graph De-anonymization Technique
  • Imdad Ullah, Roksana Boreli, Salil Kanhere and Sanjay Chawla. ProfileGuard: Privacy Preserving Obfuscation for Mobile User Profiles
  • Xiang Cai, Rishab Nithyanand and Rob Johnson. CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense
  • Xianyi Gao, Yulong Yang, Huiqing Fu, Janne Lindqvist and Yang Wang. Private Browsing: an Inquiry on Usability and Privacy Protection
  • Li Xi and Dengguo Feng. FARB: Fast Anonymous Reputation-Based Blacklisting without TTPs
  • Nikolaos Karvelas, Andreas Peter, Stefan Katzenbeisser, Erik Tews and Kay Hamacher. Privacy Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM
  • Aziz Mohaisen and Matthew Thomas. Measuring the Leakage of Onion at the Root
  • Mathias Humbert, Erman Ayday, Jean-Pierre Hubaux and Amalio Telenti. Reconciling Utility with Privacy in Genomics
  • Fatemeh Shirazi and Melanie Volkamer. Why Doesn't Johnny Try to Prevent Identification and Tracking on the Web?
  • Hirohito Sasakawa, Hiroki Harada, David Duverle, Hiroki Arimura, Koji Tsuda and Jun Sakuma. Oblivious Evaluation of Non-deterministic Finite Automata with Application to Privacy-Preserving Virus Genome Detection
  • George Bissias, A. Pinar Ozisik, Brian N. Levine and Marc Liberatore. Sybil-Resistant Mixing for Bitcoin
  • Lei Jin, Hassan Takabi, Xuelian Long and James Joshi. Exploiting Users’ Inconsistent Preferences in a Social Network System to Discover Private Friendship Links
  • John Geddes, Rob Jansen and Nicholas Hopper. Tor IMUX: Managing Connections from Two to Infinity, and Beyond

Short papers:

  • Rishab Nithyanand, Xiang Cai and Rob Johnson. Glove: A Bespoke Website Fingerprinting Defense
  • George Danezis and Emiliano De Cristofaro. Fast and Private Genomic Testing for Disease Susceptibility
  • Huiqing Fu and Janne Lindqvist. General Area or Approximate Location? How People Understand Location Permissions
  • Jose M. Such and Natalia Criado. Adaptive Conflict Resolution Mechanism for Multi-party Privacy Management in Social Media
  • Budi Arief, Kovila P.L. Coopamootoo, Martin Emms and Aad Van Moorsel. Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse
  • Mishari Almishari, Gene Tsudik, Mohamed Ali Kaafar and Ekin Oguz. Stylometric Linkability of Tweets
  • Mentari Djatmiko, Arik Friedman, Roksana Boreli, Felix Lawrence, Brian Thorne and Stephen Hardy. Secure Evaluation Protocol for Personalized Medicine
  • Jiangmin Yu and Eric Chan-Tin. Identifying Webbrowsers in Encrypted Communications
  • Jan Hajny, Petr Dzurenda and Lukas Malina. Privacy-PAC: Privacy-Enhanced Physical Access Control