Publications — Arvind Narayanan

« Back

See also: Google scholar profile

Titles that are links point to blog posts, abstract pages or project pages from where the paper can be downloaded.

Policy
No silver bullet: De-identification still doesn’t work
Arvind Narayanan, Edward W. Felten.
Manuscript, 2014.
Position
Privacy concerns of implicit secondary factors for web authentication
Joseph Bonneau, Edward W. Felten, Prateek Mittal, Arvind Narayanan
Adventures in Authentication: WAY Workshop, 2014.
Conf
On Decentralizing Prediction Markets and Order Books
Jeremy Clark, Joseph Bonneau, Edward W. Felten, Joshua A. Kroll, Andrew Miller, Arvind Narayanan
WEIS 2014.
Preprint
Cookies that give you away: Evaluating the surveillance implications of web tracking
Dillon Reisman, Steven Englehardt, Christian Eubank, Peter Zimmerman, Arvind Narayanan.
Manuscript, 2014.
Preprint
Securing Bitcoin wallets via threshold signatures
Steven Goldfeder, Joseph Bonneau, Edward W. Felten, Joshua A. Kroll, Arvind Narayanan.
Manuscript, 2014.
Conf
Mixcoin: Anonymity for Bitcoin with accountable mixes
Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, Edward W. Felten
Financial Cryptography 2014
Related blog post: The importance of anonymous cryptocurrencies
Journal (invited)
Why software engineering courses should include ethics coverage
Arvind Narayanan, Shannon Vallor.
Communications of the ACM, 2014.
Journal
Routes for breaching and protecting genetic privacy
Yaniv Erlich, Arvind Narayanan.
Nature Reviews Genetics, 2014.
Law review
Privacy substitutes
Jonathan Mayer, Arvind Narayanan.
Special issue of Stanford Law Review Online, 2013.
Wrkshp
Privacy technologies: An annotated syllabus
Arvind Narayanan
HotPETs 2013.
Conf
A Scanner Darkly: Protecting User Privacy from Perceptual Applications
Suman Jana, Arvind Narayanan, Vitaly Shmatikov.
IEEE Security and Privacy (Oakland) 2013.
Wrkshp
Shining the Floodlights on Mobile Web Tracking — A Privacy Survey
Christian Eubank, Marcela Melara, Diego Perez-Botero, Arvind Narayanan.
Web 2.0 Security & Privacy (W2SP) 2013.
Journal (invited)
What Happened to the Crypto Dream?
Arvind Narayanan.
IEEE Security and Privacy Magazine 2013.
Journal (invited)
Unlikely Outcomes? A Distributed Discussion on Decentralized Personal Data Architectures
Solon Barocas, Seda Gürses, Arvind Narayanan, Vincent Toubiana.
Institute of Network Cultures — Unlike Us Reader 2013.
Policy
Privacy considerations of online behavioural tracking
Claude Castelluccia and Arvind Narayanan.
European Network and Information Security Agency (ENISA) expert report, 2012.
Haha
33 Bits of Entropy: Myths and Fallacies of “Personally Identifiable Information”
Arvind Narayanan.
Volume 1 of Tiny Transactions on Computer Science, 2012. ("The premier venue for computer science research of 140 characters or less.")
Wrkshp
A Critical Look at Decentralized Personal Data Architectures
Arvind Narayanan, Vincent Toubiana, Solon Barocas, Helen Nissenbaum, Dan Boneh.
Data Usage Management on the Web Workshop 2012.
Conf
On the Feasibility of Internet-Scale Author Identification
Arvind Narayanan, Hristo Paskov, Neil Gong, John Bethencourt, Emil Stefanov, Richard Shin, Dawn Song.
IEEE Security and Privacy (Oakland) 2012.
Report
An Adversarial Analysis of the Reidentifiability of the Heritage Health Prize Dataset.
Arvind Narayanan.
Manuscript, 2011.
Conf
“You Might Also Like:” Privacy Risks of Collaborative Filtering
Joseph A. Calandrino, Ann Kilzer, Arvind Narayanan, Edward W. Felten, Vitaly Shmatikov.
IEEE Security and Privacy (Oakland) 2011.
Conf
Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge
Arvind Narayanan, Elaine Shi, Benjamin I. P. Rubinstein.
International Joint Conference on Neural Networks 2011.
Policy
Do Not Track: A Universal Third-Party Web Tracking Opt Out
Jonathan Mayer, Arvind Narayanan, Sid Stamm.
IETF Internet-Draft, 2011.
Conf
Location Privacy via Private Proximity Testing
Arvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Mike Hamburg, Dan Boneh.
Network and Distributed Security Symposium 2011.
Distinguished paper award.
Policy
Do Not Track FTC Comment
Jonathan Mayer, Arvind Narayanan.
2011.
Position
SocialKeys: Transparent Cryptography via Key Distribution over Social Networks
Arvind Narayanan.
IAB/IETF/W3C Internet Privacy workshop position paper, 2010.
Policy
Comment on the Draft National Strategy for Trusted Identities in Cyberspace
Jonathan Mayer, Arvind Narayanan.
2010.
Journal (invited)
Myths and Fallacies of “Personally Identifiable Information”
Arvind Narayanan, Vitaly Shmatikov.
Communications of the ACM, 2010.
Conf
Adnostic: Privacy Preserving Targeted Advertising
Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, Solon Barocas.
Network and Distributed System Security Symposium 2010.
Conf
De-anonymizing Social Networks
Arvind Narayanan, Vitaly Shmatikov.
IEEE Security and Privacy 2009.
Conf
Robust De-anonymization of Large Sparse Datasets (How To Break Anonymity of the Netflix Prize Dataset)
Arvind Narayanan, Vitaly Shmatikov.
IEEE Security and Privacy (Oakland) 2008.
Book chapter
Uncircumventable Enforcement of Privacy Policies via Cryptographic Obfuscation
Arvind Narayanan, Vitaly Shmatikov.
In Digital Privacy: Theory, Technologies and Practices". Editors: A. Acquisti et al. Auerbach Publications 2007.
This is an expanded version of "Obfuscated Databases and Group Privacy" below.
Wrkshp
Domain extensions for random oracles: beyond the birthday-paradox bound
Ilya Mironov, Arvind Narayanan.
ECRYPT Hash Workshop 2007.
On the Limits of Point Function Obfuscation
Arvind Narayanan, Vitaly Shmatikov.
Manuscript, 2006.
Conf
Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff
Arvind Narayanan, Vitaly Shmatikov.
ACM Conference on Computer and Communications Security 2005.
Conf
Obfuscated Databases and Group Privacy
Arvind Narayanan, Vitaly Shmatikov.
ACM Conference on Computer and Communications Security 2005.

Undergrad/Master's work

Journal
Perfectly Reliable Message Transmission
Arvind Narayanan, Kannan Srinathan, C. Pandu Rangan.
Information Processing Letters 100:1, pages 23--28, 2006. [Abstract]
Conf
Optimal Perfectly Secure Message Transmission.
Kannan Srinathan, Arvind Narayanan, C. Pandu Rangan.
Advances in Cryptology -- CRYPTO 2004, volume 3152 of LNCS, pages 545--561. [Download: Postscript]
Conf
On the power of Computational Secret Sharing.
Vinod Vaikuntanathan, Arvind Narayanan, Kannan Srinathan, C. Pandu Rangan, Kwangjo Kim. Indocrypt 2003, volume 2904 of LNCS, pages 162--176.
Conf
Practical Pay TV Schemes
Arvind Narayanan, C. Pandu Rangan, Kwangjo Kim.
Australasian Conference on Information Security and Privacy (ACISP) 2003, volume 2727 of LNCS, pages 192--203.