[PDF][PDF] Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions

E Politou, E Alepis, C Patsakis - Journal of cybersecurity, 2018 - academic.oup.com
Abstract Upon the General Data Protection Regulation's (GDPR) application on 25 May
2018 across the European Union, new legal requirements for the protection of personal data …

Preserving privacy in speaker and speech characterisation

A Nautsch, A Jiménez, A Treiber, J Kolberg… - Computer Speech & …, 2019 - Elsevier
Speech recordings are a rich source of personal, sensitive data that can be used to support
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …

{ABY2. 0}: Improved {Mixed-Protocol} secure {Two-Party} computation

A Patra, T Schneider, A Suresh, H Yalame - 30th USENIX Security …, 2021 - usenix.org
Secure Multi-party Computation (MPC) allows a set of mutually distrusting parties to jointly
evaluate a function on their private inputs while maintaining input privacy. In this work, we …

Chameleon: A hybrid secure computation framework for machine learning applications

MS Riazi, C Weinert, O Tkachenko… - Proceedings of the …, 2018 - dl.acm.org
We present Chameleon, a novel hybrid (mixed-protocol) framework for secure function
evaluation (SFE) which enables two parties to jointly compute a function without disclosing …

[PDF][PDF] ABY-A framework for efficient mixed-protocol secure two-party computation.

D Demmler, T Schneider, M Zohner - NDSS, 2015 - encrypto.de
Secure computation enables mutually distrusting parties to jointly evaluate a function on
their private inputs without revealing anything but the function's output. Generic secure …

HMOG: New behavioral biometric features for continuous authentication of smartphone users

Z Sitová, J Šeděnka, Q Yang, G Peng… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
We introduce hand movement, orientation, and grasp (HMOG), a set of behavioral features
to continuously authenticate smartphone users. HMOG features unobtrusively capture subtle …

CloudID: Trustworthy cloud-based and cross-enterprise biometric identification

M Haghighat, S Zonouz, M Abdel-Mottaleb - Expert Systems with …, 2015 - Elsevier
In biometric identification systems, the biometric database is typically stored in a trusted
server, which is also responsible for performing the identification process. However, a …

Multi-biometric template protection based on homomorphic encryption

M Gomez-Barrero, E Maiorana, J Galbally, P Campisi… - Pattern Recognition, 2017 - Elsevier
In spite of the advantages of biometrics as an identity verification technology, some concerns
have been raised due to the high sensitivity of biometric data: any information leakage …

{SWIFT}: Super-fast and robust {Privacy-Preserving} machine learning

N Koti, M Pancholi, A Patra, A Suresh - 30th USENIX Security …, 2021 - usenix.org
Performing machine learning (ML) computation on private data while maintaining data
privacy, aka Privacy-preserving Machine Learning (PPML), is an emergent field of research …

EzPC: Programmable and efficient secure two-party computation for machine learning

N Chandran, D Gupta, A Rastogi… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
We present EzPC, a secure two-party computation (2PC) framework that generates efficient
2PC protocols from high-level, easy-to-write programs. EzPC provides formal correctness …