Topics · Papers
Anonymity
How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion ServicesRebekah Overdorf (Drexel University), Marc Juarez (KU Leuven), Gunes Acar (KU Leuven), Rachel Greenstadt (Drexel University), Claudia Diaz (KU Leuven)
Practical UC-Secure Delegatable Credentials with Attributes and Their Application to BlockchainJan Camenisch (IBM Research - Zürich), Manu Drijvers (IBM Research - Zürich / ETH Zürich), Maria Dubovitskaya (IBM Research - Zürich)
Distributed Measurement with Private Set-Union CardinalityEllis Fenske (Tulane University), Akshaya Mani (Georgetown University), Aaron Johnson (U.S. Naval Research Lab), Micah Sherr (Georgetown University)
BBA+: Improving the Security and Applicability of Privacy-Preserving Point CollectionGunnar Hartung (Karlsruhe Institute of Technology), Max Hoffmann (Ruhr-Universität Bochum), Matthias Nagel (Karlsruhe Institute of Technology), Andy Rupp (Karlsruhe Institute of Technology)
The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing AttacksMilad Nasr (University of Massachusetts Amherst), Hadi Zolfaghari (University of Massachusetts Amherst), Amir Houmansadr (University of Massachusetts Amherst)
Compressive Traffic Analysis: A New Paradigm for Scalable Traffic AnalysisMilad Nasr (University of Massachusetts Amherst), Amir Houmansadr (University of Massachusetts Amherst), Arya Mazumdar (University of Massachusetts Amherst)
Bolt: Anonymous Payment Channels for Decentralized CurrenciesMatthew Green (Johns Hopkins University), Ian Miers (Johns Hopkins University)