Linked e-resources

Details

Intro; Foreword from the DPM 2019 Program Chairs; Organization; Foreword from the CBT 2019 Program Chairs; Organization; Contents; DPM Workshop: Privacy Preserving Data Analysis; PINFER: Privacy-Preserving Inference; 1 Introduction; 2 Preliminaries; 2.1 Linear Models and Beyond; 2.2 Cryptographic Tools; 3 Basic Protocols of Privacy-Preserving Inference; 3.1 Private Linear/Logistic Regression; 3.2 Private SVM Classification; 4 Application to Neural Networks; 4.1 Sign Activation; 4.2 ReLU Activation; 5 Conclusion; A A More Private Protocols; A.1 Linear Regression; A.2 SVM Classification

4.4 Privacy Attacks5 Conclusion; References; Skiplist Timing Attack Vulnerability; 1 Introduction; 2 Skiplist Timing Vulnerability; 2.1 Skiplist Mapping Algorithm; 2.2 Runtime Attack; 2.3 Hidden Channel Attack; 3 Defense from Timing Attacks: Splay Skiplist; 3.1 Splay Skiplist Algorithm; 4 Conclusions; References; DPM Workshop: Field/Lab Studies; A Study on Subject Data Access in Online Advertising After the GDPR; 1 Introduction; 2 Background; 2.1 Data Protection Law; 2.2 Advertising Economy; 3 Related Work; 4 Study Design; 4.1 Approach; 4.2 Analysis Corpus; 4.3 Transparency Requirements

4.4 Assessing the SAR Process5 Results and Evaluation; 5.1 Evaluation of Privacy Policies; 5.2 Subject Access Requests; 6 Limitations and Ethical Considerations; 7 Conclusion; A Provided Data; B Privacy Policy Overview; References; On Privacy Risks of Public WiFi Captive Portals; 1 Introduction; 2 Related Work; 3 CPInspector on Windows: Design and Data Collection; 4 Analysis and Results for Windows; 4.1 Personal Information Collection, Sharing, and Leaking; 4.2 Presence of Third-Party Tracking Domains and HTTP Cookies; 4.3 Device and Browser Fingerprinting; 5 CPInspector for Android

6 Privacy Policy and Anti-Tracking7 Conclusion and Future Work; References; User Perceptions of Security and Usability of Mobile-Based Single Password Authentication and Two-Factor Authentication; 1 Introduction; 2 Related Work; 3 Methodology; 3.1 Study Design; 3.2 Measures; 4 Results; 4.1 Further Discussion; 5 Conclusion, Recommendations, and Future Work; A Mobile-Based Single Password Authentication Scheme of Acar et al. acar2013single; References; DPM Workshop: Privacy by Design and Data Anonymization; Graph Perturbation as Noise Graph Addition: A New Perspective for Graph Anonymization

Browse Subjects

Show more subjects...

Statistics

from
to
Export