| Date | 
      Paper | 
      Presenter [slides] | 
      Scribe [blog link] | 
    
    
      | Jan 17 | 
      Introduction and Course Overview | 
      Nikita Borisov 
      [pdf] | 
       | 
    
    
      | Jan 19 | 
      
        Privacy-enhancing Technologies for the
      Internet 
        I. Goldberg, D. Wagner, E.
          Brewer, 
      IEEE Spring COMPCON,
        1997.
     | 
      Nikita Borisov 
	[pdf] | 
      Jodie Boyer | 
    
    
      Privacy-enhancing technologies for the Internet,
      II: Five years later I. Goldberg, PET
      2002. | 
    
    
      | Jan 24 | 
      Untraceable electronic mail, return addresses, and
      digital pseudonyms D. Chaum, Communications
      of the ACM, 1981. | 
      Adam Lee [ppt] | 
      Chris Grier [notes] | 
    
    
      Mixminion: Design of a Type III Anonymous Remailer
      Protocol G.Danezis, R.Dingledine,
      N.Mathewson, IEEE SSP (Oakland)
      2003. | 
      Michael LeMay [ppt] | 
    
    
      | Jan 26 | 
      Towards an Analysis of Onion Routing
      Security P.Syverson, G.Tsudik, M.Reed,
      C.Landwehr, PET 2000. | 
      Adam Lee [ppt] | 
      Parisa Tabriz [notes] | 
    
    
      Tor: The
      Second-Generation Onion Router R.Dingledine, N.Mathewson,
      P.Syverson, USENIX Security, 2004. | 
      Jodie Boyer [ppt] | 
    
    
      | Jan 31 | 
      Crowds: Anonymity for Web
          Transactions M.Reiter, A.Rubin, ACM TISSEC,
      1998. | 
  Munawar Hafiz [ppt] | 
      Michael LeMay | 
    
    
      Freenet: A Distributed
      Anonymous Information Storage and Retrieval System I.Clarke, O.Sandberg, B.Wiley, T.W.
      Hong, PET 2000. | 
  Chris Grier [ppt] | 
    
    
      | Feb 2 | 
      The Sybil Attack J.Douceur, IPTPS 2002. | 
      Leon Arber | 
      Adam Lee | 
    
    
      Introducing MorphMix: Peer-to-Peer
      based Anonymous Internet Usage with Collusion
      Detection M.Rennhard, B.Plattner, WPES
      2002. | 
      Munawar Hafiz | 
    
    
      | Feb 7 | 
      Tarzan: A Peer-to-Peer Anonymizing
      Network Layer M.J. Freedman, R.Morris, ACM CCS
      2002. | 
      Sundeep Reddy | 
      Munawar Hafiz | 
    
    
      The Eternity Service R.Anderson, Pragocrypt 1996. | 
      Frank Stratton | 
    
    
      | Feb 9 | 
      Publius: A robust, tamper-evident,
      censorship-resistant and source-anonymous web publishing
      system M.Waldman, A.Rubin, L.Cranor, USENIX Security
      2000. | 
      Jodie Boyer | 
      Frank Stratton | 
    
    
      Tangler: a censorship-resistant
      publishing system based on document entanglements M.Waldman, D.Mazíeres, ACM CCS 2001. | 
      Ragib Hasan | 
    
    
      | Feb 14 | 
      Traffic Analysis
      Attacks and Trade-Offs in Anonymity Providing Systems A.Back, U.Möller,
      A.Stiglic, IH 2001. | 
      Mehedi Bakht | 
      Fariba Khan | 
    
    
      Traffic Analysis: Protocols, Attacks, Design
      Issues, and Open Problems J.-F. Raymond, PET 2000. | 
      Parisa Tabriz | 
    
    
      | Feb 16 | 
      The Traffic Analysis of Continuous-Time
      Mixes G.Danezis, PET 2004. | 
      Fariba Khan | 
      Omid Fatemieh | 
    
    
      Low-Cost Traffic Analysis of
      Tor S.J. Murdoch, G.Danezis, IEEE SSP (Oakland) 2005. | 
      Frank Stratton | 
    
    
      | Feb 21 | 
      
      Practical
      Traffic Analysis: Extending and Resisting Statistical
      Disclosure 
    N.Mathewson, R.Dingledine, 
    PET 2004. | 
      Omid Fatemieh | 
      Jianqing Zhang | 
    
    
      Towards measuring
      anonymity C.Díaz,S .Seys, J.Claessens,
      B.Preneel, PET
      2002. | 
      Ragib Hasan | 
       | 
    
    
      | Feb 23 | 
      The disadvantages
      of free MIX routes and how to overcome them O.Berthold, A.Pfitzmann,
      R.Standtke, PET 2000. | 
      Fariba Khan | 
      Leon Arber | 
    
    
      Synchronous
      Batching: From Cascades to Free Routes R.Dingledine, V.Shmatikov,
      P.Syverson, PET 2004. | 
      Zahid Anwar | 
    
    
      | Feb 28 | 
      Class cancelled | 
    
    
      | Mar 2 | 
      An Analysis of the
      Degradation of Anonymous Protocols M.Wright, M.Adler, B.N.Levine,
      C.Shields, NDSS 2002. | 
      Jianqing Zhang | 
       | 
   
      
        Timing Attacks in Low-Latency Mix-Based Systems 
      B.N. Levine, M.K. Reiter, C.Wang, and M.K. Wright,
      FC 2004. | 
      Frank Stratton | 
    
    
      | Mar 7 | 
      Secret-ballot receipts: true voter-verifiable elections D.Chaum, IEEE Security & Privacy Magazine, 2004.. | 
      Michael LeMay | 
       | 
    
    
A verifiable secret shuffle and its application to e-voting. C A.Neff, ACM CCS, 2001.. | 
      Chris Grier | 
       | 
    
    
      | Mar 9 | 
Cryptographic Voting Protocols: A Systems Perspective C.Karlof, N.Sastry, D.Wagner, USENIX Security 2005. | 
      Ragib Hasan | 
       | 
    
    
      Coercion-Resistant Electronic Elections A.Juels, D.Catalano, M.Jakobsson, WPES 2005.. | 
      Michael LeMay | 
       | 
    
    
      | Mar 14 | 
      
        k-anonymity: a model for protecting privacy  
        L. Sweeney,
International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 2002. | 
      Munawar Hafiz | 
       | 
    
    
Obfuscated Databases and Group Privacy A. Narayanan, V. Shmatikov, CCS 2005. | 
      Jianqing Zhang | 
       | 
    
    
      | Mar 16 | 
Privacy-Preserving Set Operations L.Kissner, D.Song, CRYPTO 2005. | 
      Nikita Borisov | 
       | 
    
	
Applications of Secure Electronic Voting to Automated Privacy-Preserving Troubleshooting D.Jao, Q.Huang, H.Wang, ACM CCS 2005. | 
      Omid Fatemieh | 
       | 
    
    
      | Mar 28 | 
      Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies fo Anonymization A. Slagell, W. Yurcik, SECOVAL 2005. | 
      Zahid Anwar | 
      Mehedi Bakht | 
    
    
      The Devil and Packet Trace Anonymization R. Pang, M. Allman, V. Paxson, J. Lee, CCR 2006. | 
      Parisa Tabriz | 
    
    
      | Mar 30 | 
      Mix Zones: User Privacy in Location-aware Services 
A.R. Beresford, F. Stajano, IEEE PerCom 2004. | 
      Jodie Boyer | 
       | 
    
    
      Location privacy in pervasive computing 
A.R. Beresford, F. Stajano, IEEE PerCom 2003. | 
      Yaniv Eytani | 
       | 
    
    
      | Apr 4 | 
Privacy and Security in Library RFID: Issues, Practices, and Architectures D. Molnar and D. Wagner, ACM CCS 2004. | 
      Zahid Anwar | 
       | 
    
    
      
      High-Power Proxies for Enhancing RFID Privacy and Utility A.Juels, P.Syverson, D.Bailey, PET 2005. | 
      Yaniv Eytani | 
       | 
    
    
      | Apr 6 | 
      Untraceable electronic cash D. Chaum, CRYPTO 1990.. | 
      Jianqing Zhang | 
       | 
    
    
A Description of Protocols for Private Credentials A.Glenn, I.Goldberg, F.Legare, A.Stiglic, ePrint report 2001/082. | 
      (no summary) | 
       | 
    
    
      | Apr 11 | 
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation J.Camenisch, A.Lysyanskaya, EUROCRYPT, 2001. | 
      (no summary) | 
       | 
    
    
OACerts: Oblivious Attribute Certificates J.Li and N.Li, ACNS 2005. | 
      Adam Lee | 
       | 
    
    
      | Apr 13 | 
      Policy-Hiding Access Control in Open Environment (Extended Abstract) J.Li and N.Li, PODC 2005. | 
      Fariba Khan | 
      Omid Fatemieh | 
    
    
      Preventing Attribute Information Leakage in Automated Trust Negotiaton K. Irwin and T. Yu, 
ACM CCS 2005. | 
      Mehedi Bakht | 
    
    
      | Apr 18 | 
      Privacy-Preserving Data Mining Y. Lindell and B. Pinkas, CRYPTO 2000. | 
      Parisa Tabriz | 
       | 
    
    
      Privacy-Preserving Data Mining R. Agarwal and R. Srikant, ACM SIGMOD 2000. | 
      Omid Fatemieh | 
       | 
    
    
      | Apr 20 | 
Hierarchical Neighborhood Topology for Privacy 
Enhanced Collaborative Filtering 
S. Berkovsky, Y. Eytani, T. Kuflik, F. Ricci, PEP 2006 
(no summary)
       | Yaniv Eytani | 
       | 
    
    
The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval L. Sassaman, B. Cohen, N. Mathewson, WPES 2005. | 
      Mehedi Bakht | 
       | 
    
    
      | Apr 25 | 
On the Economics of Anonymity A. Acquisti, R. Dingledine, P. Syverson, FC 2003. | 
      Chris Grier | 
       | 
    
    
      Privacy in Electronic Commerce and the Economics of Immediate Gratification A.Acquisti, EC 04. | 
      Leon Arber | 
       | 
    
    
      | Apr 27 | 
      Taking the Byte Out of Cookies: Privacy, Consent, and the Web 
D. Lin and M. Loui, ACM SIGCAS Computer and Society, 1998 | 
      Leon Arber | 
       | 
    
    
      | Project presentations | 
       | 
    
    
      | May 2 | 
      Project presentations | 
       | 
       |