Czasopismo

Proceedings on Privacy Enhancing Technologies's Cover Image

Proceedings on Privacy Enhancing Technologies

Informacje o czasopiśmie
access type Otwarty dostęp
License
Format
Czasopismo
eISSN
2299-0984
Pierwsze wydanie
16 Apr 2015
Języki
Angielski
Dziedziny czasopisma
Informatyka, Technologia informacyjna, Bezpieczeństwo teleinformatyczne i kryptologia, Bazy danych i eksploracja danych, inne

Proceedings on Privacy Enhancing Technologies (PoPETs) is the journal that publishes papers accepted to the annual Privacy Enhancing Technologies Symposium (PETS). PETS brings together privacy and anonymity experts from around the world to discuss recent advances and new perspectives on research in privacy technologies. PETS/PoPETs is the premier venue for novel applied and/or theoretical research into the design, analysis, experimentation, or fielding of privacy-enhancing technologies.

Submitted papers undergo a journal-style reviewing process and accepted papers are published in the PoPETs journal. PoPETs is a scholarly, open access journal for timely research papers on privacy, and has been established as a way to improve reviewing and publication quality while retaining the highly successful PETS community event. PoPETs is published by Sciendo, part of De Gruyter, which has over 260 years of publishing history. PoPETs does not have article processing charges (APCs) or article submission charges. Authors can submit papers to PoPETs four times a year, every three months on a predictable schedule. Authors are notified of the decisions two months after submission. 

Scope

Papers submitted to PETS/PoPETs should present novel practical and/or theoretical research into the requirements, design, analysis, experimentation, or fielding of privacy-enhancing technologies and the social, cultural, legal or situational contexts in which they are used. Note that a paper's relevance to privacy applications is crucial for our community. PETS is open to topics from the wider area of security and privacy (cryptographic primitives, security mechanisms, differentially-private mechanisms, etc.) as long as it is clear how these serve to improve or understand privacy in technology (e.g., it includes a use case, evaluation on real data, integration with an application, etc.). PETS is also open to interdisciplinary research examining people's and communities' privacy needs, preferences, and expectations, as long as it is clear how these findings can impact the design, development, or deployment of technology with privacy implications.

The PETS website (petsymposium.org) provides a call for papers with more information for authors and a list of example topics in the scope of PoPETs.

Acceptance Rate:

  • Volume 2015: 20.35%
  • Volume 2016: 23,8%
  • Volume 2017: 22,5%

Archiving

Sciendo archives the contents of this journal in Portico - digital long-term preservation service of scholarly books, journals and collections.

Plagiarism Policy

The editorial board is participating in a growing community of Similarity Check System's users in order to ensure that the content published is original and trustworthy. Similarity Check is a medium that allows for comprehensive manuscripts screening, aimed to eliminate plagiarism and provide a high standard and quality peer-review process.

Co-Editors-in-Chief
Florian Kerschbaum, University of Waterloo, Canada
Michelle L. Mazurek, University of Maryland, United States

pets22-chairs@petsymposium.org

Editorial Advisory Board
Nikita Borisov, University of Illinois at Urbana-Champaign
Kostas Chatzikokolakis, University of Athens
Jeremy Clark, Concordia University
Gemma Galdón Clavell, Eticas
Richard Clayton, University of Cambridge
George Danezis, University College London
Emiliano De Cristofaro, University College London
Claudia Diaz, University of Leuven
Roger Dingledine, The Tor Project
Simone Fischer-Hübner, Karlstad University
Sébastien Gambs, Université du Québec à Montréal
Ian Goldberg, University of Waterloo
Rachel Greenstadt, New York University
Kat Hanna, The Tor Project
Nicholas Hopper, University of Minnesota
Aaron Johnson, U.S. Naval Research Laboratory
Dali Kaafar, Macquarie University, Sydney
Apu Kapadia, Indiana University Bloomington
Florian Kerschbaum, University of Waterloo
Michelle Mazurek, University of Maryland
Damon McCoy, New York University
Susan McGregor, Columbia University
Steven Murdoch, University College London
Panos Papadimitratos, KTH Royal Institute of Technology
Ahmad-Reza Sadeghi, TU Darmstadt
Andrei Serjantov
Adam Shostack
Paul Syverson, Naval Research Laboratory
Carmela Troncoso, EPFL
Xiaofeng Wang, Indiana University Bloomington
Matthew Wright, Rochester Institute of Technology

Senior Program Committee/Editorial Board
Adam Aviv, George Washington University
Lujo Bauer, Carnegie Mellon University
Alvaro Cardenas, University of California Santa Cruz
Sherman Chow, Chinese University of Hong Kong
Chris Clifton, Purdue University
George Danezis, University College London
Emiliano De Cristofaro, University College London
Claudia Diaz, KU Leuven
David Evans, University of Virginia
Rachel Greenstadt, New York University
Jaap-Henk Hoepman, Radboud University
Nick Hopper, University of Minnesota
Aaron Johnson, U.S. Naval Research Laboratory
Dali Kaafar, Macquarie University
Apu Kapadia, Indiana University
Stefan Katzenbeisser, University of Passau
Ninghui Li, Purdue University
Damon McCoy, New York University
Melek Önen, EURECOM
Catuscia Palamidessi, INRIA
Bart Preneel, KU Leuven
Mike Rosulek, Oregon State University
Micah Sherr, Georgetown University
Paul Syverson, Naval Research Lab
Nina Taft, Google
Carmela Troncoso, EPFL
Blase Ur, University of Chicago
Christo Wilson, Northeastern University
Matthew Wright, Rochester Institute of Technology

Program Committee/Editorial Board
Yasemin Acar, Max Planck Institute for Security and Privacy
Gunes Acar, Radboud University
Gergely Acs, Budapest University of Technology and Economics
Shashank Agrawal, Western Digital Research
Muhammad Ahmad Bashir, Google
Mashael Al-Sabah, Qatar University
Denise Anthony, University of Michigan
Frederik Armknecht, Universität Mannheim
Oshrat Ayalon, Max Planck Institute for Software Systems
Erman Ayday, Bilkent University
Saikrishna Badrinarayanan, Visa Research
Borja Balle, DeepMind
Diogo Barradas, University of Waterloo
Debabrota Basu, INRIA
Sonia Ben Mokhtar, CNRS
Zinaida Benenson, University of Erlangen-Nürnberg
Alastair Beresford, University of Cambridge
Pascal Berrang, University of Birmingham
Gergely Biczok, Budapest University of Technology and Economics
Nataliia Bielova, CNIL/INRIA
Erik-Oliver Blass, Airbus
Jonas Böhler, SAP
Glencora Borradaile, Oregon State University
Rahul Chatterjee, University of Wisconsin-Madison
Sze Yiu Chau, Chinese University of Hong Kong
David Choffnes, Northeastern University
Omar Chowdhury, University of Iowa
Camille Cobb, Carnegie Mellon University
Jed Crandall, Arizona State University
Robert Cunningham, Carnegie Mellon University
Lucas Davi, Universität Duisburg Essen
Martin Degeling, Ruhr-University Bochum
Soteris Demetriou, Imperial College London
Damien Desfontaines, Tumult Labs
Rinku Dewri, University of Denver
Roger Dingledine, The Tor Project
Josep Domingo-Ferrer, Universitat Rovira i Virgili
Markus Dürmuth, Ruhr University Bochum
Tariq Elahi, University of Edinburgh
Pardis Emami-Naeini, University of Washington
Zeki Erkin, TU Delft
Saba Eskandarian, UNC Chapel Hill
Shehroze Farooqi, Palo Alto Networks
Kassem Fawaz, University of Wisconsin-Madison
Ellis Fenske, U.S. Naval Academy
>Ferdinando Fioretto, Syracuse University
Bryan Ford, EPFL
Alisa Frik, International Computer Science Institute
Chaya Ganesh, Indian Institute of Science
Simson Garfinkel, George Washington University
Christina Garman, Purdue University
Gennie Gebhart, Electronic Frontier Foundation
Badih Ghazi, Google
Yossi Gilad, Hebrew University
Neil Gong, Duke University
Adam Groce, Reed College
Thomas Gross, Newcastle University
Paul Grubbs, University of Michigan
Cheng Guo, Clemson University / Google
Mehmet Emre Gürsoy, Koc University
Florian Hahn, University of Twente
Rakibul Hasan, CISPA Helmholtz Center for Information Security
Jamie Hayes, University College London
Xi He, University of Waterloo
Urs Hengartner, University of Waterloo
Ryan Henry, University of Calgary
Dominik Herrmann, University of Bamberg
Julia Hesse, IBM
Yuan Hong, Illinois Institute of Technology
Kevin Huguenin, University of Lausanne
Mathias Humbert, armasuisse W+T
Muhammad Ikram, Macquarie University
Umar Iqbal, University of Iowa
Limin Jia, Carnegie Mellon University
Kangsoo Jung, INRIA
Ghassan Karame, Ruhr University Bochum
Marcel Keller, CSIRO Data61
Agnes Kiss, CISPA Helmholtz Center for Information Security
Katharina Kohls, Radboud University
Steve Kremer, INRIA
Christiane Kuhn, Karlsruhe Institute of Technology
Alptekin Küpcü , Koc University
Peeter Laud, Cybernetica
Arnaud Legout, INRIA
Ming Li, University of Texas at Arlington
Heather Lipford, University of North Carolina at Charlotte
Martin Lopatka, Visualping
Saeed Mahloujifar, Princeton
Pasin Manurangsi, Google
Piotr Mardziel, Truera
Shrirang Mare, Western Washington University
Athina Markopolou, University of California Irvine
Abigail Marsh, Macalester College
Atefeh Mashatan, Ryerson University
Fabio Massacci, University of Trento
Nick Mathewson, The Tor Project
Travis Mayberry, U.S. Naval Academy
Peter Mayer, Karlsruhe Institute of Technology
Susan McGregor, Tow Center for Digital Journalism / Columbia Journalism School
Shagufta Mehnaz, Dartmouth College
Luca Melis, Amazon
David Mohaisen, University of Central Florida
Meisam Mohammady, CSIRO Data 61
Veelasha Moonsamy, Radboud University
Steven Murdoch, University College London
Sashank Narain, University of Massachusetts Lowell
Milad Nasr, University of Massachusetts Amherst
Chan Nam Ngo, University of Warsaw
Rishab Nithyanand, University of Iowa
Cristina Onete, University of Limoges / XLIM
Simon Oya, University of Waterloo
Omkant Pandey, Stony Brook University
Panagiotis Papadopoulos, Telefonica Research
Stefano Paraboschi, Universita degli Studi di Bergamo
Sikhar Patranabis, Visa Research
Balazs Pejo, Budapest University of Technology and Economics
Andreas Peter, University of Oldenburg
Christina Pöpper, New York University Abu Dhabi
Erica Portnoy, Electronic Frontier Foundation
Tobias Pulls, Karlstad University
Apostolos Pyrgelis, EPFL
Sazzadur Rahaman, University of Arizona
Abbas Razaghpanah, International Computer Science Institute - UC Berkeley
Joel Reardon, University of Calgary
Karen Renaud, University of Strathclyde
Alfredo Rial, University of Luxembourg
Daniel Roche, U.S. Naval Academy
Florentin Rochet, Universite catholique de Louvain
Thomas Roesler, Google
Ryan Rogers, LinkedIn
Stefanie Roos, TU Delft
Paul Rösler, TU Darmstadt
Andy Rupp, University of Luxembourg
Reihaneh Safavi-Naini, University of Calgary
Nitesh Saxena, University of Alabama at Birmingham
Florian Schaub, University of Michigan
Dominique Schröder, University of Erlangen-Nürnberg
Wendy Seltzer, W3C
Mahmood Sharif, Tel Aviv University and VMware
Anastasia Shuba, Broadcom
Mark Simkin, Aarhus University
Claudio Soriente, NEC Laboratories
Yixin Sun, University of Virginia
Sai Teja Peddinti, Google
Yuan Tian, University of Virginia
Florian Tramer, Stanford University
Ni Trieu, Arizona State University
Tobias Urban, Secunet Security Networks AG
Eugene Vasserman, Kansas State University
Daniel Votipka, Tufts University
Sameer Wagh, University of California Berkeley
Tao Wang, Simon Fraser University
Tianhao Wang, Purdue University
Liang Wang, Princeton University Ding Wang, Nankai University
Jason Xue, The University of Adelaide
Yaxing Yao, University of Maryland Baltimore County
Attila Yavuz, University of South Florida
Arkady Yerukhimovich, George Washington University
Yang Zhang, CISPA Helmholtz Center for Information Security
Yupeng Zhang, Texas A&M University
Fan Zhang, Duke University
Zhikun Zhang, CISPA Helmholtz Center for Information Security
Yongjun Zhao, Nanyang Technological University

Contact
popets-editors@petsymposium.org

Publisher
De Gruyter Poland
Bogumiła Zuga 32A Str.
01-811 Warsaw, Poland

Proceedings on Privacy Enhancing Technologies is covered by the following services:

  • Baidu Scholar
  • Cabell's Whitelist
  • CNKI Scholar (China National Knowledge Infrastructure)
  • CNPIEC - cnpLINKer
  • DBLP Computer Science Bibliography
  • Dimensions
  • DOAJ (Directory of Open Access Journals)
  • EBSCO (relevant databases)
  • EBSCO Discovery Service
  • Engineering Village
  • Google Scholar
  • Inspec
  • Japan Science and Technology Agency (JST)
  • J-Gate
  • JournalTOCs
  • KESLI-NDSL (Korean National Discovery for Science Leaders)
  • MyScienceWork
  • Naver Academic
  • Naviga (Softweco)
  • Primo Central (ExLibris)
  • ProQuest (relevant databases)
  • Publons
  • QOAM (Quality Open Access Market)
  • ReadCube
  • Semantic Scholar
  • Summon (ProQuest)
  • TDNet
  • TEMA Technik und Management
  • Ulrich's Periodicals Directory/ulrichsweb
  • WanFang Data
  • WorldCat (OCLC)

PoPETs is the journal that publishes papers accepted to the Privacy Enhancing Technologies Symposium (PETS). More information about PETS can be found here: petsymposium.org

All submitted papers are judged based on their quality and relevance through double-blind reviewing, where the identities of the authors are withheld from the reviewers. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings.

PoPETs does not have article processing charges (APCs) or article submission charges.

For more information about deadlines, page limits, topics of interest, ethical considerations, and detailed instructions on how to prepare your article for submission, please go to the call for papers:
petsymposium.org/cfp.php

Open Access Statement

The journal is an Open Access journal that allows a free unlimited access to all its contents without any restrictions upon publication to all users.

Open Access License

Informacje o czasopiśmie
access type Otwarty dostęp
License
Format
Czasopismo
eISSN
2299-0984
Pierwsze wydanie
16 Apr 2015
Języki
Angielski
Dziedziny czasopisma
Informatyka, Technologia informacyjna, Bezpieczeństwo teleinformatyczne i kryptologia, Bazy danych i eksploracja danych, inne

Zaplanuj zdalną konferencję ze Sciendo