Reading-Group - Privacy Enhancing Technologies
- Type: practice
- Chair: KIT-Fakultäten - KIT-Fakultät für Informatik - Institut für Telematik - ITM Strufe
- Semester: summer of 2021
-
Place:
online
-
Time:
22.04.2021
10:00 - 11:30
22.04.2021
14:00 - 15:30
06.05.2021
10:00 - 11:30
06.05.2021
14:00 - 15:30
20.05.2021
10:00 - 11:30
20.05.2021
14:00 - 15:30
17.06.2021
10:00 - 11:30
17.06.2021
14:00 - 15:30
01.07.2021
10:00 - 11:30
01.07.2021
14:00 - 15:30
15.07.2021
10:00 - 11:30
15.07.2021
14:00 - 15:30
-
Lecturer:
Prof. Dr. Thorsten Strufe
Dr. Patricia Arias Cabarcos - SWS: 1
- Lv-No.: 2400096
organizational matters | Die Veranstaltung gehört zur Vorlesung PETS und findet in englischer Sprache statt.
This is the reading group of the lecture on Privacy-Enhancing-Technologies (PETS, LV 2400088), you will find all necessary information there! |
reading group schedule
10.06. |
1) C. Diaz, S. Seys, J. Claessens, B. Preneel, "Towards measuring anonymity", In Proc. 2nd International Conference on Privacy-Enhancing Technologies (PETs), LNCS, vol. 2482., pp. 54–68, 2002. |
17.06. |
3) YA de Montjoye, CA Hidalgo, M Verleysen, VD Blondel Unique in the Crowd: The privacy bounds of human mobility Nature srep. 3 |
24.06. |
5) A. Narayanan and V. Shmatikov, "Robust de-anonymization of large sparse datasets", in Proc. IEEE Symp. Secur., Priv. (SP). IEEE Comput. Soc., May 2008, pp. 111-125. |
08.07. |
7) M. K. Reiter, A. D. Rubin, "Crowds: Anonymity for Web transactions", ACM Trans. Inform. Syst. Secur., vol. 1, no. 1, pp. 66-92, 1998. |
15.07. |
9) Armknecht, Frederik, and Thorsten Strufe. "An efficient distributed privacy-preserving recommendation system." 2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop. IEEE, 2011. |
22.07. |
11) Weinshel, B., Wei, M., Mondal, M., Choi, E., Shan, S., Dolin, C., Mazurek, M.L. and Ur, B., 2019, November. Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 149-166). |