Date Paper Presenter
[slides]
Scribe
[blog link]
Jan 17 Introduction and Course Overview Nikita Borisov
[pdf]
Jan 19 Privacy-enhancing Technologies for the Internet
I. Goldberg, D. Wagner, E. Brewer, IEEE Spring COMPCON, 1997.
Nikita Borisov
[pdf]
Jodie Boyer
Privacy-enhancing technologies for the Internet, II: Five years later
I. Goldberg, PET 2002.
Jan 24 Untraceable electronic mail, return addresses, and digital pseudonyms
D. Chaum, Communications of the ACM, 1981.
Adam Lee
[ppt]
Chris Grier
[notes]
Mixminion: Design of a Type III Anonymous Remailer Protocol
G.Danezis, R.Dingledine, N.Mathewson, IEEE SSP (Oakland) 2003.
Michael LeMay
[ppt]
Jan 26 Towards an Analysis of Onion Routing Security
P.Syverson, G.Tsudik, M.Reed, C.Landwehr, PET 2000.
Adam Lee
[ppt]
Parisa Tabriz
[notes]
Tor: The Second-Generation Onion Router
R.Dingledine, N.Mathewson, P.Syverson, USENIX Security, 2004.
Jodie Boyer
[ppt]
Jan 31 Crowds: Anonymity for Web Transactions
M.Reiter, A.Rubin, ACM TISSEC, 1998.
Munawar Hafiz
[ppt]
Michael LeMay
Freenet: A Distributed Anonymous Information Storage and Retrieval System
I.Clarke, O.Sandberg, B.Wiley, T.W. Hong, PET 2000.
Chris Grier
[ppt]
Feb 2 The Sybil Attack
J.Douceur, IPTPS 2002.
Leon Arber Adam Lee
Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection
M.Rennhard, B.Plattner, WPES 2002.
Munawar Hafiz
Feb 7 Tarzan: A Peer-to-Peer Anonymizing Network Layer
M.J. Freedman, R.Morris, ACM CCS 2002.
Sundeep Reddy Munawar Hafiz
The Eternity Service
R.Anderson, Pragocrypt 1996.
Frank Stratton
Feb 9 Publius: A robust, tamper-evident, censorship-resistant and source-anonymous web publishing system
M.Waldman, A.Rubin, L.Cranor, USENIX Security 2000.
Jodie Boyer Frank Stratton
Tangler: a censorship-resistant publishing system based on document entanglements
M.Waldman, D.Mazíeres, ACM CCS 2001.
Ragib Hasan
Feb 14 Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems
A.Back, U.Möller, A.Stiglic, IH 2001.
Mehedi Bakht Fariba Khan
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
J.-F. Raymond, PET 2000.
Parisa Tabriz
Feb 16 The Traffic Analysis of Continuous-Time Mixes
G.Danezis, PET 2004.
Fariba Khan Omid Fatemieh
Low-Cost Traffic Analysis of Tor
S.J. Murdoch, G.Danezis, IEEE SSP (Oakland) 2005.
Frank Stratton
Feb 21 Practical Traffic Analysis: Extending and Resisting Statistical Disclosure
N.Mathewson, R.Dingledine, PET 2004.
Omid Fatemieh Jianqing Zhang
Towards measuring anonymity
C.Díaz,S .Seys, J.Claessens, B.Preneel, PET 2002.
Ragib Hasan
Feb 23 The disadvantages of free MIX routes and how to overcome them
O.Berthold, A.Pfitzmann, R.Standtke, PET 2000.
Fariba Khan Leon Arber
Synchronous Batching: From Cascades to Free Routes
R.Dingledine, V.Shmatikov, P.Syverson, PET 2004.
Zahid Anwar
Feb 28 Class cancelled
Mar 2 An Analysis of the Degradation of Anonymous Protocols
M.Wright, M.Adler, B.N.Levine, C.Shields, NDSS 2002.
Jianqing Zhang
Timing Attacks in Low-Latency Mix-Based Systems
B.N. Levine, M.K. Reiter, C.Wang, and M.K. Wright, FC 2004.
Frank Stratton
Mar 7 Secret-ballot receipts: true voter-verifiable elections
D.Chaum, IEEE Security & Privacy Magazine, 2004..
Michael LeMay
A verifiable secret shuffle and its application to e-voting.
C A.Neff, ACM CCS, 2001..
Chris Grier
Mar 9 Cryptographic Voting Protocols: A Systems Perspective
C.Karlof, N.Sastry, D.Wagner, USENIX Security 2005.
Ragib Hasan
Coercion-Resistant Electronic Elections
A.Juels, D.Catalano, M.Jakobsson, WPES 2005..
Michael LeMay
Mar 14 k-anonymity: a model for protecting privacy
L. Sweeney, International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 2002.
Munawar Hafiz
Obfuscated Databases and Group Privacy
A. Narayanan, V. Shmatikov, CCS 2005.
Jianqing Zhang
Mar 16 Privacy-Preserving Set Operations
L.Kissner, D.Song, CRYPTO 2005.
Nikita Borisov
Applications of Secure Electronic Voting to Automated Privacy-Preserving Troubleshooting
D.Jao, Q.Huang, H.Wang, ACM CCS 2005.
Omid Fatemieh
Mar 28 Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies fo Anonymization
A. Slagell, W. Yurcik, SECOVAL 2005.
Zahid Anwar Mehedi Bakht
The Devil and Packet Trace Anonymization
R. Pang, M. Allman, V. Paxson, J. Lee, CCR 2006.
Parisa Tabriz
Mar 30 Mix Zones: User Privacy in Location-aware Services
A.R. Beresford, F. Stajano, IEEE PerCom 2004.
Jodie Boyer
Location privacy in pervasive computing
A.R. Beresford, F. Stajano, IEEE PerCom 2003.
Yaniv Eytani
Apr 4 Privacy and Security in Library RFID: Issues, Practices, and Architectures
D. Molnar and D. Wagner, ACM CCS 2004.
Zahid Anwar
High-Power Proxies for Enhancing RFID Privacy and Utility
A.Juels, P.Syverson, D.Bailey, PET 2005.
Yaniv Eytani
Apr 6 Untraceable electronic cash
D. Chaum, CRYPTO 1990..
Jianqing Zhang
A Description of Protocols for Private Credentials
A.Glenn, I.Goldberg, F.Legare, A.Stiglic, ePrint report 2001/082.
(no summary)
Apr 11 An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
J.Camenisch, A.Lysyanskaya, EUROCRYPT, 2001.
(no summary)
OACerts: Oblivious Attribute Certificates
J.Li and N.Li, ACNS 2005.
Adam Lee
Apr 13 Policy-Hiding Access Control in Open Environment (Extended Abstract)
J.Li and N.Li, PODC 2005.
Fariba Khan Omid Fatemieh
Preventing Attribute Information Leakage in Automated Trust Negotiaton
K. Irwin and T. Yu, ACM CCS 2005.
Mehedi Bakht
Apr 18 Privacy-Preserving Data Mining
Y. Lindell and B. Pinkas, CRYPTO 2000.
Parisa Tabriz
Privacy-Preserving Data Mining
R. Agarwal and R. Srikant, ACM SIGMOD 2000.
Omid Fatemieh
Apr 20 Hierarchical Neighborhood Topology for Privacy Enhanced Collaborative Filtering
S. Berkovsky, Y. Eytani, T. Kuflik, F. Ricci, PEP 2006
(no summary)
Yaniv Eytani
The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval
L. Sassaman, B. Cohen, N. Mathewson, WPES 2005.
Mehedi Bakht
Apr 25 On the Economics of Anonymity
A. Acquisti, R. Dingledine, P. Syverson, FC 2003.
Chris Grier
Privacy in Electronic Commerce and the Economics of Immediate Gratification
A.Acquisti, EC 04.
Leon Arber
Apr 27 Taking the Byte Out of Cookies: Privacy, Consent, and the Web
D. Lin and M. Loui, ACM SIGCAS Computer and Society, 1998
Leon Arber
Project presentations
May 2 Project presentations