Synthesizing Privacy-Preserving Location Traces Including Co-locations
|
2022 |
Narita, Jun |
Interdependent Privacy Issues Are Pervasive Among Third-Party Applications
|
2022 |
Liu, Shuaishuai |
Rethinking the Limits of Mobile Operating System Permissions
|
2022 |
Krupp, Brian |
Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies
|
2022 |
Ganesh, Chaya |
Asymmetric Asynchronous Byzantine Consensus
|
2022 |
Cachin, Christian |
Using Degree Centrality to Identify Market Manipulation on Bitcoin
|
2022 |
Pereira, Daiane M. |
Homomorphic Decryption in Blockchains via Compressed Discrete-Log Lookup Tables
|
2022 |
Chatzigiannis, Panagiotis |
Quantitative Rubric for Privacy Policy Analysis
|
2022 |
O’Donnell, Paul |
Filling the Tax Gap via Programmable Money
|
2022 |
Karakostas, Dimitris |
Lattice-Based Proof-of-Work for Post-Quantum Blockchains
|
2022 |
Behnia, Rouzbeh |
Blockchain-Based Two-Factor Authentication for Credit Card Validation
|
2022 |
Mercan, Suat |
Best Security Measures to Reduce Cyber-Incident and Data Breach Risks
|
2022 |
Kikuchi, Hiroaki |
SPGC: An Integrated Framework of Secure Computation and Differential Privacy for Collaborative Learning
|
2022 |
Iwahana, Kazuki |
Augmenting MetaMask to Support TLS-endorsed Smart Contracts
|
2022 |
Gallersdörfer, Ulrich |
Anonymous Sidechains
|
2022 |
Baldimtsi, Foteini |
Impact of Delay Classes on the Data Structure in IOTA
|
2022 |
Penzkofer, Andreas |
A k-Anonymised Federated Learning Framework with Decision Trees
|
2022 |
Kwatra, Saloni |
Anonymizing Machine Learning Models
|
2022 |
Goldsteen, Abigail |
A New Privacy Enhancing Beacon Scheme in V2X Communication
|
2022 |
Yoshizawa, Takahito |
Next Generation Data Masking Engine
|
2022 |
Moffie, Micha |