Reading-Group - Privacy Enhancing Technologies
- Typ: Übung
- Lehrstuhl: KIT-Fakultäten - KIT-Fakultät für Informatik - Institut für Telematik - ITM Strufe
- Semester: Sommer 2021
-
Ort:
online
-
Zeit:
22.04.2021
10:00 - 11:30
22.04.2021
14:00 - 15:30
06.05.2021
10:00 - 11:30
06.05.2021
14:00 - 15:30
20.05.2021
10:00 - 11:30
20.05.2021
14:00 - 15:30
17.06.2021
10:00 - 11:30
17.06.2021
14:00 - 15:30
01.07.2021
10:00 - 11:30
01.07.2021
14:00 - 15:30
15.07.2021
10:00 - 11:30
15.07.2021
14:00 - 15:30
-
Dozent:
Prof. Dr. Thorsten Strufe
Dr. Patricia Arias Cabarcos - SWS: 1
- LVNr.: 2400096
Organisatorisches | Die Veranstaltung gehört zur Vorlesung PETS und findet in englischer Sprache statt. This is the reading group of the lecture on Privacy-Enhancing-Technologies (PETS, LV 2400088), you will find all necessary information there! |
Zeitplan Reading Group
10.06. | 1) C. Diaz, S. Seys, J. Claessens, B. Preneel, "Towards measuring anonymity", In Proc. 2nd International Conference on Privacy-Enhancing Technologies (PETs), LNCS, vol. 2482., pp. 54–68, 2002. 2) Wuyts, Kim, Riccardo Scandariato, and Wouter Joosen. "Empirical evaluation of a privacy-focused threat modeling methodology." Journal of Systems and Software 96 (2014): 122-138. |
17.06. | 3) YA de Montjoye, CA Hidalgo, M Verleysen, VD Blondel Unique in the Crowd: The privacy bounds of human mobility Nature srep. 3 4) https://arxiv.org/pdf/2012.15112.pdf Juhi Kulshrestha, Marcos Oliveira, Orkut Karac ̧alık, Denis Bonnay, Claudia Wagner Web Routineness and Limits of Predictability:Investigating Demographic and Behavioral Differences Using Web Tracking Data |
24.06. | 5) A. Narayanan and V. Shmatikov, "Robust de-anonymization of large sparse datasets", in Proc. IEEE Symp. Secur., Priv. (SP). IEEE Comput. Soc., May 2008, pp. 111-125. 6) G. Acs, C. Castelluccia and R. Chen, "Differentially Private Histogram Publishing through Lossy Compression," 2012 IEEE 12th International Conference on Data Mining, Brussels, 2012, pp. 1-10. |
08.07. | 7) M. K. Reiter, A. D. Rubin, "Crowds: Anonymity for Web transactions", ACM Trans. Inform. Syst. Secur., vol. 1, no. 1, pp. 66-92, 1998. 8) Kuhn, Christiane, et al. "On Privacy Notions in Anonymous Communication." Proceedings on Privacy Enhancing Technologies 2 (2019): 105-125. |
15.07. | 9) Armknecht, Frederik, and Thorsten Strufe. "An efficient distributed privacy-preserving recommendation system." 2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop. IEEE, 2011. 10) Dantcheva, Antitza, Petros Elia, and Arun Ross. "What else does your biometric data reveal? A survey on soft biometrics." IEEE Transactions on Information Forensics and Security 11.3 (2015): 441-467. |
22.07. | 11) Weinshel, B., Wei, M., Mondal, M., Choi, E., Shan, S., Dolin, C., Mazurek, M.L. and Ur, B., 2019, November. Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 149-166). 12) Bonneau, Joseph, et al. "The quest to replace passwords: A framework for comparative evaluation of web authentication schemes." 2012 IEEE Symposium on Security and Privacy. IEEE, 2012. |