Online voting systems typically display a confirmation screen allowing voters to confirm their selections before casting. This paper considers whether a network-based observer can …
K Gellert, T Jager, L Lyu, T Neuschulten - Cryptographers' Track at the …, 2022 - Springer
It is well known that already the length of encrypted messages may reveal sensitive information about encrypted data. Fingerprinting attacks enable an adversary to determine …
Consider a set of users, each of which is choosing and downloading one file out of a central pool of public files, and an attacker that observes the download size for each user to identify …
This dissertation presents four published articles in the field of data ethics that extend our knowledge of fairness in machine learning and advance the state of the art of privacy in data …
A cryptosystem that performs compression before encryption may leak information about the plaintext from the ciphertext length, giving rise to a compression side channel. An attacker …
Online voting is increasingly prevalent in Ontario's municipalities, despite a lack of regulated technological and procedural safeguards. Individual municipalities, lacking deep knowledge …