Reading-Group - Privacy Enhancing Technologies

  • Typ: Übung
  • Lehrstuhl: KIT-Fakultäten - KIT-Fakultät für Informatik - Institut für Telematik - ITM Strufe
  • Semester: Sommer 2021
  • Ort:

    online

  • Zeit: 22.04.2021
    10:00 - 11:30


    22.04.2021
    14:00 - 15:30

    06.05.2021
    10:00 - 11:30

    06.05.2021
    14:00 - 15:30

    20.05.2021
    10:00 - 11:30

    20.05.2021
    14:00 - 15:30

    17.06.2021
    10:00 - 11:30

    17.06.2021
    14:00 - 15:30

    01.07.2021
    10:00 - 11:30

    01.07.2021
    14:00 - 15:30

    15.07.2021
    10:00 - 11:30

    15.07.2021
    14:00 - 15:30


  • Dozent: Prof. Dr. Thorsten Strufe
    Dr. Patricia Arias Cabarcos
  • SWS: 1
  • LVNr.: 2400096
OrganisatorischesDie Veranstaltung gehört zur Vorlesung PETS und findet in englischer Sprache statt.

This is the reading group of the lecture on Privacy-Enhancing-Technologies (PETS, LV 2400088), you will find all necessary information there!

Zeitplan Reading Group

10.06. 1) C. Diaz, S. Seys, J. Claessens, B. Preneel, "Towards measuring anonymity", In Proc. 2nd International Conference on Privacy-Enhancing Technologies (PETs), LNCS, vol. 2482., pp. 54–68, 2002.
2) Wuyts, Kim, Riccardo  Scandariato, and Wouter Joosen. "Empirical evaluation of a  privacy-focused threat modeling methodology." Journal of Systems and  Software 96 (2014): 122-138.
17.06. 3) YA de Montjoye, CA Hidalgo, M Verleysen, VD Blondel Unique in the Crowd: The privacy bounds of human mobility Nature srep. 3
4) https://arxiv.org/pdf/2012.15112.pdf
Juhi Kulshrestha, Marcos Oliveira, Orkut Karac ̧alık, Denis Bonnay, Claudia Wagner
Web Routineness and Limits of Predictability:Investigating Demographic and Behavioral Differences Using Web Tracking Data
24.06. 5) A.    Narayanan and V.  Shmatikov, "Robust de-anonymization of large sparse    datasets", in  Proc. IEEE Symp. Secur., Priv. (SP). IEEE Comput. Soc.,    May 2008, pp.  111-125.
6) G.  Acs, C. Castelluccia and  R.  Chen, "Differentially Private Histogram  Publishing through Lossy   Compression," 2012 IEEE 12th International  Conference on Data Mining,   Brussels, 2012, pp. 1-10.
08.07. 7) M. K. Reiter, A. D. Rubin, "Crowds: Anonymity for Web transactions",  ACM   Trans. Inform.  Syst. Secur., vol. 1, no. 1, pp. 66-92, 1998.
8) Kuhn, Christiane, et al. "On Privacy Notions in Anonymous Communication." Proceedings on Privacy Enhancing Technologies 2 (2019): 105-125.
15.07. 9) Armknecht, Frederik, and  Thorsten Strufe. "An efficient distributed privacy-preserving  recommendation system." 2011 The 10th IFIP Annual Mediterranean Ad Hoc  Networking Workshop. IEEE, 2011.
10) Dantcheva, Antitza, Petros Elia, and Arun Ross. "What else does your biometric data reveal? A survey on soft biometrics." IEEE Transactions on Information Forensics and Security 11.3 (2015): 441-467.
22.07. 11) Weinshel,  B., Wei, M.,  Mondal, M., Choi, E., Shan, S., Dolin, C., Mazurek, M.L.  and Ur, B.,  2019, November. Oh, the Places You've Been! User Reactions  to  Longitudinal Transparency About Third-Party Web Tracking and   Inferencing. In Proceedings of the 2019 ACM SIGSAC Conference on   Computer and Communications Security (pp. 149-166).
12) Bonneau, Joseph, et al. "The quest to replace passwords: A framework for comparative evaluation of web authentication schemes." 2012 IEEE Symposium on Security and Privacy. IEEE, 2012.