Exploring the meaning of usable security–a literature review

M Lennartsson, J Kävrestad… - Information & Computer …, 2021 - emerald.com
Purpose For decades, literature has reported on the perceived conflict between usability and
security. This mutual trade-off needs to be considered and addressed whenever security …

Don't look at the data! How differential privacy reconfigures the practices of data science

J Sarathy, S Song, A Haque, T Schlatter… - Proceedings of the 2023 …, 2023 - dl.acm.org
Across academia, government, and industry, data stewards are facing increasing pressure
to make datasets more openly accessible for researchers while also protecting the privacy of …

Saqe: practical privacy-preserving approximate query processing for data federations

J Bater, Y Park, X He, X Wang, J Rogers - Proceedings of the VLDB …, 2020 - dl.acm.org
A private data federation enables clients to query the union of data from multiple data
providers without revealing any extra private information to the client or any other data …

Exploring design and governance challenges in the development of privacy-preserving computation

N Agrawal, R Binns, M Van Kleek, K Laine… - Proceedings of the …, 2021 - dl.acm.org
Homomorphic encryption, secure multi-party computation, and differential privacy are part of
an emerging class of Privacy Enhancing Technologies which share a common promise: to …

Synq: Public Policy Analytics Over Encrypted Data

Z Espiritu, M George, S Kamara… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
Data analytics is a core part of modern decision making, especially in public policy.
However, there exists a tension between data privacy and otherwise socially beneficial …

Recent advances in practical secure multi-party computation

S Ohata - IEICE Transactions on Fundamentals of Electronics …, 2020 - search.ieice.org
Secure multi-party computation (MPC) allows a set of parties to compute a function jointly
while keeping their inputs private. MPC has been actively studied, and there are many …

Scalable multiparty garbling

G Beck, A Goel, A Hegde, A Jain, Z Jin… - Proceedings of the 2023 …, 2023 - dl.acm.org
Multiparty garbling is the most popular approach for constant-round secure multiparty
computation (MPC). Despite being the focus of significant research effort, instantiating prior …

Multi-regulation computing: Examining the legal and policy questions that arise from secure multiparty computation

JM Walsh, M Varia, A Cohen, A Sellars… - Proceedings of the 2022 …, 2022 - dl.acm.org
This work examines privacy laws and regulations that limit disclosure of personal data, and
explores whether and how these restrictions apply when participants use cryptographically …

Evaluation of Arithmetic Sum-of-Products Expressions in Linear Secret Sharing Schemes with a Non-Interactive Computation Phase

M de Vega, A Lapets, S Jarecki, W Malten… - Cryptology ePrint …, 2023 - eprint.iacr.org
Among secure multi-party computation protocols, linear secret sharing schemes often do not
rely on cryptographic assumptions and are among the most straightforward to explain and to …

How the Future Works at SOUPS: Analyzing Future Work Statements and Their Impact on Usable Security and Privacy Research

J Suray, JH Klemmer, J Schmüser, S Fahl - arXiv preprint arXiv …, 2024 - arxiv.org
Extending knowledge by identifying and investigating valuable research questions and
problems is a core function of research. Research publications often suggest avenues for …