The composition theorems of differential privacy (DP) allow data curator...
Anycast messaging (i.e., sending a message to an unspecified receiver) h...
Biometric data contains distinctive human traits such as facial features...
Biometric data is a rich source of information that can be used to ident...
Data collection and aggregation by online services happens to an extent ...
Unlike suggested during their early years of existence, Bitcoin and simi...
Gait recognition is the process of identifying humans from their bipedal...
Our behavior (the way we talk, walk, or think) is unique and can be used...
Publish/Subscribe systems like Twitter and Reddit let users communicate ...
Due to its high efficiency, routing based on greedy embeddings of rooted...
Hierarchical models for text classification can leak sensitive or
confid...
Communicating anonymously comes at a cost - and large communities have b...
The recent SARS-CoV-2 pandemic gave rise to management approaches using
...
When working with joint collections of confidential data from multiple
s...
After several years of research on onion routing, Camenisch and Lysyansk...
Various vulnerabilities have been found in message parsers of protocol
i...
Route-restricted overlays are peer-to-peer networks where each node can ...
Many anonymous communication networks (ACNs) with different privacy goal...
Many anonymous communication networks (ACNs) with different privacy goal...
Benchmarking is an important measure for companies to investigate their
...
The join operation is a fundamental building block of parallel data
proc...
We propose a Bayesian nonparametric mixture model for prediction- and
in...