Search Results for ''

published presentations and documents on DocSlides.

Privacy-Preserving Data Quality Assessment for
Privacy-Preserving Data Quality Assessment for
by adhesivedisney
High-Fidelity Data Sharing. Julien Freudiger, Sh...
unFriendly
unFriendly
by cheryl-pisano
: Multi-Party Privacy Risks in Social Networks. K...
Hummingbird: Privacy at the time of Twitter
Hummingbird: Privacy at the time of Twitter
by lois-ondreau
Emiliano. De . Cristofaro. Claudio . Soriente. G...
Hummingbird: Privacy at the time of Twitter
Hummingbird: Privacy at the time of Twitter
by phoebe-click
Emiliano. De . Cristofaro. Claudio . Soriente. G...
BlindBox:  Deep Packet Inspection Over Encrypted Traffic
BlindBox: Deep Packet Inspection Over Encrypted Traffic
by karlyn-bohler
SIGCOMM 2015. Raluca Ada Popa. Joint work with: J...
On Garbling Schemes
On Garbling Schemes
by myesha-ticknor
with . and without Privacy. Carsten Baum. , Aarhu...
Differentially Private Aggregation
Differentially Private Aggregation
by danika-pritchard
of Distributed Time-Series. Vibhor. Rastogi . (...
Universally-
Universally-
by tatyana-admore
composable. Security of Key Distribution from Ca...
Receipt-Free
Receipt-Free
by alida-meadow
Universally-Verifiable Voting With Everlasting Pr...
Privacy, Democracy and the Secret Ballot
Privacy, Democracy and the Secret Ballot
by marina-yarberry
An Informal Introduction to Cryptographic Voting....
DECENT: A Decentralized Architecture for Enforcing Privacy
DECENT: A Decentralized Architecture for Enforcing Privacy
by min-jolicoeur
Sonia . Jahid. 1. , . Shirin. . Nilizadeh. 2. , ...
Expressive Privacy Control
Expressive Privacy Control
by min-jolicoeur
with Pseudonyms. Seungyeop Han. , Vincent Liu, . ...
Security and Usability Rachel Greenstadt
Security and Usability Rachel Greenstadt
by aaron
February 15, . 2016. Slide credits Lorrie . Crano...
Prof. Peter  Swire Georgia Tech
Prof. Peter Swire Georgia Tech
by fullyshro
Senior Counsel, Alston & Bird. . Sayers Secur...
Prof. Peter
Prof. Peter
by danika-pritchard
Swire. Georgia Tech. Senior Counsel, Alston &...
Privacy, Democracy and the Secret Ballot
Privacy, Democracy and the Secret Ballot
by luanne-stotts
An Informal Introduction to Cryptographic Voting....
A Language for Automatically Enforcing Privacy
A Language for Automatically Enforcing Privacy
by pamella-moone
Jean Yang. with . Kuat. . Yessenov. and. Armand...
Expressive Privacy Control
Expressive Privacy Control
by danika-pritchard
with Pseudonyms. Seungyeop Han. , Vincent Liu, . ...
DECENT: A Decentralized Architecture for Enforcing Privacy
DECENT: A Decentralized Architecture for Enforcing Privacy
by celsa-spraggs
Sonia . Jahid. 1. , . Shirin. . Nilizadeh. 2. , ...