On the Challenges of Developing a Concise Questionnaire to Identify Privacy Personas
|
|
Mixnet optimization methods
|
|
OrgAn: Organizational Anonymity with Low Latency
|
|
Leveraging Strategic Connection Migration-Powered Traffic Splitting for Privacy
|
|
Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF
|
|
Keeping Privacy Labels Honest
|
|
User-friendly yet rarely read: A case study on the redesign of an online HIPAA authorization
|
|
Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies
|
|
Polymath: Low-Latency MPC via Secure Polynomial Evaluations and its Applications
|
|
OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers
|
|
Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification Contact Tracing
|
|
Privately Connecting Mobility to Infectious Diseases via Applied Cryptography
|
|
On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework
|
|
Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps
|
|
Privacy accounting εconomics: Improving differential privacy composition via a posteriori bounds
|
|
Differentially private partition selection
|
|
d3p - A Python Package for Differentially-Private Probabilistic Programming
|
|
ATOM: Ad-network Tomography
|
|
Setting the Bar Low: Are Websites Complying With the Minimum Requirements of the CCPA?
|
|
A Multi-Region Investigation of Use and Perceptions of Smart Home Devices
|
|
LLAMA: A Low Latency Math Library for Secure Inference
|
|
Hidden Issuer Anonymous Credential
|
|
DataProVe: Fully Automated Conformance Verification Between Data Protection Policies and System Architectures
|
|
Integrating Privacy into the Electric Vehicle Charging Architecture
|
|
Machine Learning with Differentially Private Labels: Mechanisms and Frameworks
|
|
Masking Feedforward Neural Networks against Power Analysis Attacks
|
|
A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance
|
|
Are iPhones Really Better for Privacy? A Comparative Study of iOS and Android Apps
|
|
Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices
|
|
Formalizing and Estimating Distribution Inference Risks
|
|
Disparate Vulnerability to Membership Inference Attacks
|
|
Athena: Probabilistic Verification of Machine Unlearning
|
|
Deletion Inference, Reconstruction, and Compliance in Machine (Un)Learning
|
|
On Defeating Graph Analysis of Anonymous Transactions
|
|
FingerprinTV: Fingerprinting Smart TV Apps
|
|
Watch Over Your TV: A Security and Privacy Analysis of the Android TV ecosystem
|
|
Building a Privacy-Preserving Smart Camera System
|
|
gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies
|
|
Zswap: zk-SNARK Based Non-Interactive Multi-Asset Swaps
|
|
Privacy-preserving FairSwap: Fairness and Privacy Interplay
|
|
I know what you did on Venmo: Discovering privacy leaks in mobile social payments
|
|
MLEFlow: Learning from History to Improve Load Balancing in Tor
|
|
From "Onion Not Found" to Guard Discovery
|
|
Increasing Adoption of Tor Browser Using Informational and Planning Nudges
|
|
Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor
|
|
If You Like Me, Please Don’t "Like" Me: Inferring Vendor Bitcoin Addresses From Positive Reviews
|
|
Flexible and scalable privacy assessment for very large datasets, with an application to official governmental microdata
|
|
Visualizing Privacy-Utility Trade-Offs in Differentially Private Data Releases
|
|