Synthesizing Privacy-Preserving Location Traces Including Co-locations
|
2022 |
Narita, Jun |
Interdependent Privacy Issues Are Pervasive Among Third-Party Applications
|
2022 |
Liu, Shuaishuai |
Rethinking the Limits of Mobile Operating System Permissions
|
2022 |
Krupp, Brian |
Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies
|
2022 |
Ganesh, Chaya |
Asymmetric Asynchronous Byzantine Consensus
|
2022 |
Cachin, Christian |
Using Degree Centrality to Identify Market Manipulation on Bitcoin
|
2022 |
Pereira, Daiane M. |
Homomorphic Decryption in Blockchains via Compressed Discrete-Log Lookup Tables
|
2022 |
Chatzigiannis, Panagiotis |
A k-Anonymised Federated Learning Framework with Decision Trees
|
2022 |
Kwatra, Saloni |
Anonymizing Machine Learning Models
|
2022 |
Goldsteen, Abigail |
A New Privacy Enhancing Beacon Scheme in V2X Communication
|
2022 |
Yoshizawa, Takahito |
Next Generation Data Masking Engine
|
2022 |
Moffie, Micha |
Towards a Formal Approach for Data Minimization in Programs (Short Paper)
|
2022 |
Lanzinger, Florian |
Smart Contracts for Incentivized Outsourcing of Computation
|
2022 |
Küpçü, Alptekin |
Secure Static Content Delivery for CDN Using Blockchain Technology
|
2022 |
Conti, Mauro |
Quantitative Rubric for Privacy Policy Analysis
|
2022 |
O’Donnell, Paul |
Filling the Tax Gap via Programmable Money
|
2022 |
Karakostas, Dimitris |
Lattice-Based Proof-of-Work for Post-Quantum Blockchains
|
2022 |
Behnia, Rouzbeh |
Blockchain-Based Two-Factor Authentication for Credit Card Validation
|
2022 |
Mercan, Suat |
Best Security Measures to Reduce Cyber-Incident and Data Breach Risks
|
2022 |
Kikuchi, Hiroaki |
SPGC: An Integrated Framework of Secure Computation and Differential Privacy for Collaborative Learning
|
2022 |
Iwahana, Kazuki |