Date Presenter Paper Title Link
9-5 Tao Wang "I've Got Nothing to Hide" and Other Misunderstandings of Privacy (D. Solove - 2007)
9-5 Tao Wang Privacy-enhancing technologies for the Internet (I. Goldberg, D. Wagner, E. Brewer - 1997)
9-9 Tao Wang Privacy-enhancing technologies for the Internet, II: Five years later (I. Goldberg - 2002)
9-9 Tao Wang Privacy Enhancing Technologies for the Internet III: Ten Years Later (I. Goldberg - 2007)

Anonymity Networks

Date Presenter Paper Title
9-12 Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms (D. Chaum - C. ACM 1981)
9-12 Tor: The Second-Generation Router (R. Dingledine, N. Matthewson, P. Syverson - USENIX 2004)
9-19 Shadow: Running Tor in a Box for Accurate and Efficient Experimentation (R. Jansen, N. Hopper - 2011)
9-19 An Empirical Evaluation of Relay Selection in Tor (C. Wacek, H. Tan, K. Bauer, M. Sherr - NDSS 2013)
9-23 Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services (A. Kwon, M. AlSabah, D. Lazar, M. Dacier, S. Devadas - USENIX 2015)
9-23 Website Fingerprinting at Internet Scale (A. Panchenko, F. Lanze, A. Zinnen, M. Henze, J. Pannekamp, K. Wehrle, T. Engel - NDSS 2016)

Private Computation

Date Presenter Paper Title Link
9-26 Computationally Private Information Retrieval (B. Chor, N. Gilboa - STOC 1997)
9-26 Off-the-Record Communication, or, Why Not To Use PGP (N. Borisov, I. Goldberg, E. Brewer - WPES 2004)
9-30 Riposte: An Anonymous Messaging System Handling Millions of Users (H. Corrigan-Gibbs, D. Boneh, D. Mazières - Oakland 2015)
9-30 Privacy-Preserving Deep Learning (R. Shokri, V. Shmatikov - CCS 2015)

Sybil Attacks

Date Presenter Paper Title Link
10-3 The Sybil Attack (J. Douceur - 2002)
10-3 DSybil: Optimal Sybil-Resistance for Recommendation Systems (H. Yu, C. Shi, M. Kaminsky, P. Gibbons, F. Xiao - Oakland 2009)
10-7 Social Turing Tests: Crowdsourcing Sybil Detection (G. Wang, M. Mohanlal, C. Wilson, X. Wang, M. Metzger, H. Zheng, B. Zhao - NDSS 2013)
10-7 Identifying and Characterizing Sybils in the Tor Network (P. Winter, R. Ensafi, K. Loesing, N. Feamaster - USENIX 2016)

Location Privacy

Date Presenter Paper Title Link
10-14 Protecting Location Privacy: Optimal Strategy against Localization Attacks (R. Shokri, G. Theodorakopoulos, C. Troncoso, J. Hubaux, J. Le Boudec - CCS 2012)
10-14 Where’s Wally? Precise User Discovery Attacks in Location Proximity Services (I. Polakis, G. Argyros, T. Petsios, S. Sivakorn, A. Keromytis - CCS 2015)

Differential Privacy

Date Presenter Paper Title Link
10-17 Calibrating noise to sensitivity in private data analysis (C Dwork, F McSherry, K Nissim, A Smith - TCC 2006)
10-17 Differential Privacy via Wavelet Transforms (X. Xiao, G. Wang, J. Gehrke - IEEE TKDE 2011)
10-21 Privex: Private collection of traffic statistics for anonymous communication networks (T Elahi, G Danezis, I Goldberg - CCS 2014)


Date Presenter Paper Title Link
10-21 k-Anonymity: A Model For Protecting Privacy (L. Sweeney - 2002)
10-24 t-Closeness: Privacy Beyond k-Anonymity and l-Diversity (N. Li, T. Li, S. Venkatasubramanian - IEEE ICDE 2007)
10-24 Maintaining k-Anonymity against Incremental Updates (J. Pei, J. Xu, Z. Wang, W. Wang, K. Wang - IEEE SSDBM 2007)

Censorship Resistance

Date Presenter Paper Title Link
10-28 Decoy Routing: Toward Unblockable Internet Communication (J. Karlin, D. Ellard, A. Jackson, C. Jones, G. Lauer, D. Mankins, W. Strayer - FOCI 2011).
10-28 TapDance: End-to-Middle Anticensorship without Flow Blocking (E. Wustrow, C. Swanson, J. Halderman - USENIX 2014)
10-31 Analyzing the Great Firewall of China Over Space and Time (R. Ensafi, P. Winter, A. Mueen, J. Crandall - PETS 2015)
10-31 Seeing through Network-Protocol Obfuscation (L. Wang, K. Dyer, A. Akella, T. Ristenpart, T. Shrimpton - CCS 2015)


Date Presenter Paper Title Link
11-4 Honeywords: Making Password-Cracking Detectable (A. Juels, R. Rivest - CCS 2013)
11-4 Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks (W. Melicher, B. Ur, S. Segreti, S. Komanduri, L. Bauer, N. Christin, L. Cranor - USENIX 2016)

Bitcoin and Privacy

Date Presenter Paper Title Link
11-7 Bitcoin: A Peer-to-Peer Electronic Cash System (S. Nakamoto - 2008)
11-7 Evaluating User Privacy in Bitcoin (E. Androulaki, G. Karame, M. Roeschlin, T. Scherer, S. Capkun - FC 2013)
11-11 Zerocash: Decentralized Anonymous Payments from Bitcoin (E. Ben-Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, M. Virsa - Oakland 2014)

Policy and Governance

Date Presenter Paper Title Link
11-11 Security Analysis of the Estonian Internet Voting System (D. Springall, T. Finkenauer, Z. Durumeric, J. Kitcat, H. Hursti, M. MacAlpine, J. Halderman - CCS 2014)
11-14 The Right to be Forgotten in the Media: A Data-Driven Study (M. Xue, G. Magno, E. Cunha, V. Almeida, K. Ross - PETS 2016)
11-14 Access Denied! Contrasting Data Access in the United States and Ireland (S. Grogan, A. McDonald - PETS 2016)


Date Presenter Paper Title Link
11-18 Why Doesn't Jane Protect her Privacy? (K. Renaud, M. Volkamer, A. Renkema-Padmos - PETS 2014)
11-18 "My Data Just Goes Everywhere:" User Mental Models of the Internet and Implications for Privacy and Security (R. Kang, L. Dabbish, N. Fruchter, S. Kiesler - SOUPS 2015)