The WOTE program is here.
Wednesday, June 20
9:00 - 9:30   Introduction and Welcome (PET and WOTE)9:30 - 10:45   Invited speaker: Mike Gurski
11:00 - 12:30   Joint session #1: PET papers (Chair: Paul Syverson)
-
Attacking Unlinkability: The Importance of Context
Matthias Franz, Bernd Meyer, Andreas Pashalidis (Siemens AG Corporate Technology) -
A Fresh Look at the Generalised Mix Framework
Andrei Serjantov (The FreeHaven Project, UK) -
Two-sided Statistical Disclosure Attack
George Danezis, Claudia Díaz, Carmela Troncoso (K.U. Leuven)
2:00 - 3:15   Invited speaker: David Chaum
3:30 - 5:00   Joint session #2: WOTE papers
- Bare-Handed Electronic Voting with Pre-processing
Ben Riva and Amnon Ta-Shma - Component Based Electronic Voting Systems
David Lundin - Split-Ballot Voting: Everlasting Privacy With Distributed Trust
Tal Moran and Moni Naor
7:00 - 11:00   Banquet (river cruise)
Thursday, June 21
9:00 - 10:30   PET session #3 (Chair: Steven Murdoch)-
A Family of Dunces
Gene Tsudik (University of California, Irvine) -
Louis, Lester and Pierre: Three Protocols for Location Privacy
Ge Zhong, Ian Goldberg, Urs Hengartner (University of Waterloo) -
Efficient Oblivious Augmented Maps: Location-Based Services with a
Payment Broker
Sebastian Faust (K.U. Leuven), Lothar Fritsch (Johan-Wolfgang Goethe-Universität), Bartek Gedrojc (TU Delft), Markulf Kohlweiss, Bart Preneel (K.U. Leuven)
2:00 - 3:30   PET session #4 (Chair: Mikhail Atallah)
-
Pairing-Based Onion Routing
Aniket Kate, Greg Zaverucha, Ian Goldberg (University of Waterloo) -
Nymble: Anonymous IP-address Blocking
Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, Sean W. Smith (Dartmouth College) -
Improving Efficiency and Simplicity of Tor circuit establishment and
hidden services
Lasse Øverlier (Norwegian Defence Research Establishment) and Paul Syverson (US Naval Research Laboratory)
6:00 - 8:00   PET Privacy Award and Drinks reception
Friday, June 22
9:00 - 10:00   CIPPIC panel10:30 - 12:00   PET session #5 (Chair: Andrei Serjantov)
-
Identity Trail: Covert Surveillance Using DNS
Saikat Guha and Paul Francis (Cornell University) -
Sampled Traffic Analysis by Internet-Exchange-Level Adversaries
Steven J. Murdoch and Piotr Zielinski (University of Cambridge) -
Browser-Based Attacks on Tor
Timothy G. Abbott, Katherine J. Lai, Michael R. Lieberman, Eric C. Price (MIT)
-
Enforcing P3P Policies Using a Digital Rights Management System
Farzad Salim, Nicholas Paul Sheppard (University of Wollongong), Rei Safavi-Naini (University of Calgary) -
Simplified Privacy Controls for Aggregated Services - Suspend and
Resume of Personal Data
Matthias Schunter and Michael Waidner (IBM) -
Performance Comparison of low-latency Anonymisation Services from a
User Perspective
Rolf Wendolsky, Dominik Herrmann, Hannes Federrath (University of Regensburg) -
Anonymity in the wild: Mixes on unstructured networks
Shishir Nagaraja (University of Cambridge)