Synthesis of probabilistic privacy enforcement

M Kučera, P Tsankov, T Gehr, M Guarnieri… - Proceedings of the 2017 …, 2017 - dl.acm.org
Existing probabilistic privacy enforcement approaches permit the execution of a program
that processes sensitive data only if the information it leaks is within the bounds specified by …

Securing encrypted communication

DA Vasile - 2024 - repository.cam.ac.uk
Secure messaging has led to the mass adoption of strong security principles such as end-to-
end encryption and perfect forward secrecy, which had previously failed to gain traction …

“I wasn't there”—Deniable, privacy-aware scheme for decentralized Location-based Services

T Dimitriou, N Al Ibrahim - Future Generation Computer Systems, 2018 - Elsevier
Abstract The use of Location Based Services (LBS) allow mobile users to interact with the
environment and query for the location of persons, objects and services. Such applications …

Fighting Uphill Battles: Improvements in Personal Data Privacy

DM Sommer - 2021 - research-collection.ethz.ch
With the rise of modern information technology and the Internet, the worldwide
interconnectivity is resulting in a massive collection and evaluation of potentially sensitive …