14:28 Franz Kargl Tales from the Dark Side Privacy Dark Strategies and Privacy Dark Patterns All Hacking Cons
15:17 Frederik Möllers & Christoph Sorge Privacy Challenges in the Quantified Self Movement All Hacking Cons
15:03 John M Schanck Circuit Extension Handshakes for Tor Achieving Forward Secrecy in a Quantum World All Hacking Cons
15:43 Jens Grossklags Towards a Model on the Factors Influencing Social App Users' Valuation All Hacking Cons
15:25 Andy Rupp Black Box Accumulation Collecting Incentives in a Privacy Preserving Way All Hacking Cons
12:26 Frederick Douglas Salmon Robust Proxy Distribution for Censorship Circumvention All Hacking Cons
13:29 Esha Ghosh Efficient Verifiable Range and Closest Point Queries in Zero Knowledge All Hacking Cons
16:09 Marina Blanton and Fattaneh Bayatbabolghani Efficient Server Aided Secure Two Party Function All Hacking Cons
55:27 Angela Sasse Goodbye Passwords, Hello Biometrics Do We Understand the Privacy Implications All Hacking Cons
15:10 Sebastian Meiser Your Choice MATors Large scale Quantitative Anonymity Assessment All Hacking Cons
14:38 Tommaso Frassetto Selfrando Securing the Tor Browser against De anonymization Exploits All Hacking Cons
12:41 Richard McPherson CovertCast Using Live Streaming to Evade Internet Censorship All Hacking Cons
14:18 William Melicher Do Not Track Me Sometimes Users' Contextual Preferences for Web Tracking All Hacking Cons
13:33 Sakshi Jain and Mobin Javed Towards Mining Latent Client Identifiers from Network Traffic All Hacking Cons
15:11 Susan E McGregor Individual versus Organizational Computer Security Concerns in Journalism All Hacking Cons
14:43 Riivo Talviste Students and Taxes a Privacy Preserving Social Study Using Secure Computation All Hacking Cons
15:22 Tariq Elahi A Framework for the Game theoretic Analysis of Censorship Resistance All Hacking Cons
15:51 Marios Isaakidis Eclipse and Re Emergence of Anonymous P2P Storage Network Overlay Services All Hacking Cons
12:22 Samuel Grogan Access Denied Contrasting Data Access in the United States and Ireland All Hacking Cons