


default search action
Proceedings on Privacy Enhancing Technologies, Volume 2022
Volume 2022, Number 1, January 2022
- Florian Kerschbaum, Michelle L. Mazurek:

Editors' Introduction. 1-5 - Jacob Leon Kröger, Leon Gellrich, Sebastian Pape, Saba Rebecca Brause

, Stefan Ullrich:
Personal information inference from voice recordings: User awareness and privacy concerns. 6-27 - Jiafan Wang

, Sherman S. M. Chow
:
Forward and Backward-Secure Range-Searchable Symmetric Encryption. 28-48 - Mingyu Liang, Ioanna Karantaidou, Foteini Baldimtsi, S. Dov Gordon, Mayank Varia:

(∈, δ)-Indistinguishable Mixing for Cryptocurrencies. 49-74 - Hussein Darir

, Hussein Sibai, Chin-Yu Cheng, Nikita Borisov, Geir E. Dullerud, Sayan Mitra:
MLEFlow: Learning from History to Improve Load Balancing in Tor. 75-104 - Maryam Mehrnezhad

, Kovila P. L. Coopamootoo, Ehsan Toreini:
How Can and Would People Protect From Online Tracking? 105-125 - Michal Tereszkowski-Kaminski, Sergio Pastrana

, Jorge Blasco, Guillermo Suarez-Tangil:
Towards Improving Code Stylometry Analysis in Underground Forums. 126-147 - Thomas Cilloni

, Wei Wang, Charles Walter, Charles Fleming:
Ulixes: Facial Recognition Privacy with Adversarial Machine Learning. 148-165 - Mahsa Saeidi, McKenzie Calvert, Audrey Au, Anita Sarma, Rakesh B. Bobba

:
If This Context Then That Concern: Exploring users' concerns with IFTTT applets. 166-186 - Elham Al Qahtani, Yousra Javed, Mohamed Shehab

:
User Perceptions of Gmail's Confidential Mode. 187-206 - Ruben Recabarren, Bogdan Carbunar:

Toward Uncensorable, Anonymous and Private Access Over Satoshi Blockchains. 207-226 - Darion Cassel, Su-Chin Lin, Alessio Buraggina, William Wang, Andrew Zhang, Lujo Bauer

, Hsu-Chun Hsiao, Limin Jia
, Timothy Libert:
OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers. 227-252 - Josh Smith, Hassan Jameel Asghar, Gianpaolo Gioiosa, Sirine Mrabet, Serge Gaspers, Paul Tyler:

Making the Most of Parallel Composition in Differential Privacy. 253-273 - Dmitrii Usynin, Daniel Rueckert, Jonathan Passerat-Palmbach, Georgios Kaissis:

Zen and the art of model adaptation: Low-utility-cost attack mitigations in collaborative machine learning. 274-290 - Théo Ryffel, Pierre Tholoniat, David Pointcheval, Francis R. Bach:

AriaNN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing. 291-316 - Marvin Kowalewski, Franziska Herbert, Theodor Schnitzler

, Markus Dürmuth
:
Proof-of-Vax: Studying User Preferences and Perception of Covid Vaccination Certificates. 317-338 - Damien Desfontaines, James Voss, Bryant Gipson, Chinmoy Mandayam:

Differentially private partition selection. 339-352 - Nishanth Chandran, Divya Gupta, Akash Shah:

Circuit-PSI With Linear Complexity via Relaxed Batch OPPRF. 353-372 - Badih Ghazi, Ben Kreuter, Ravi Kumar, Pasin Manurangsi, Jiayu Peng, Evgeny Skvortsov, Yao Wang, Craig Wright:

Multiparty Reach and Frequency Histogram: Private, Secure, and Practical. 373-395 - Donghang Lu, Albert Yu, Aniket Kate, Hemanta K. Maji:

Polymath: Low-Latency MPC via Secure Polynomial Evaluations and Its Applications. 396-416 - Sepideh Avizheh, Preston Haffey, Reihaneh Safavi-Naini:

Privacy-preserving FairSwap: Fairness and privacy interplay. 417-439 - Jochen Schäfer

, Christian Müller
, Frederik Armknecht
:
If You Like Me, Please Don't "Like" Me: Inferring Vendor Bitcoin Addresses From Positive Reviews. 440-459 - Bogdan Kulynych

, Mohammad Yaghini, Giovanni Cherubin, Michael Veale
, Carmela Troncoso:
Disparate Vulnerability to Membership Inference Attacks. 460-480 - Xue Jiang, Xuebing Zhou, Jens Grossklags:

Privacy-Preserving High-dimensional Data Collection with Federated Generative Autoencoder. 481-500 - Konstantinos Athanasiou, Thomas Wahl, A. Adam Ding, Yunsi Fei:

Masking Feedforward Neural Networks Against Power Analysis Attacks. 501-521 - Lennart Oldenburg

, Gunes Acar
, Claudia Díaz:
From "Onion Not Found" to Guard Discovery. 522-543 - Shihui Fu, Guang Gong

:
Polaris: Transparent Succinct Zero-Knowledge Arguments for R1CS with Efficient Verifier. 544-564 - Vinh-Thong Ta

, Max Hashem Eiza
:
DataProVe: Fully Automated Conformance Verification Between Data Protection Policies and System Architectures. 565-585 - Maximilian Zinkus, Tushar M. Jois, Matthew Green:

SoK: Cryptographic Confidentiality of Data on Mobile Devices. 586-607 - Maggie Van Nortwick, Christo Wilson

:
Setting the Bar Low: Are Websites Complying With the Minimum Requirements of the CCPA? 608-628 - Moses Namara, Henry Sloan, Bart P. Knijnenburg:

The Effectiveness of Adaptation Methods in Improving User Engagement and Privacy Protection on Social Network Sites. 629-648
Volume 2022, Number 2, April 2022
- Florian Kerschbaum, Michelle L. Mazurek:

Editors' Introduction. 1-5 - Konrad Kollnig

, Anastasia Shuba, Reuben Binns, Max Van Kleek, Nigel Shadbolt:
Are iPhones Really Better for Privacy? A Comparative Study of iOS and Android Apps. 6-24 - Yohan Beugin

, Quinn Burke, Blaine Hoak
, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain, Patrick D. McDaniel:
Building a Privacy-Preserving Smart Camera System. 25-46 - Mansoor Ahmed-Rengers, Diana A. Vasile

, Daniel Hugenroth
, Alastair R. Beresford, Ross Anderson:
CoverDrop: Blowing the Whistle Through A News App. 47-67 - Jan Tolsdorf

, Delphine Reinhardt, Luigi Lo Iacono:
Employees' privacy perceptions: exploring the dimensionality and antecedents of personal data sensitivity and willingness to disclose. 68-94 - Mariano Di Martino, Isaac Meers

, Peter Quax
, Ken Andries, Wim Lamotte
:
Revisiting Identification Issues in GDPR 'Right Of Access' Policies: A Technical and Longitudinal Analysis. 95-113 - Mohammad Tahaei

, Tianshi Li
, Kami Vaniea:
Understanding Privacy-Related Advice on Stack Overflow. 114-131 - Chen Chen, Xiao Liang

, Bogdan Carbunar, Radu Sion
:
SoK: Plausibly Deniable Storage. 132-151 - Peter Story

, Daniel Smullen, Rex Chen
, Yaxing Yao, Alessandro Acquisti
, Lorrie Faith Cranor
, Norman M. Sadeh, Florian Schaub:
Increasing Adoption of Tor Browser Using Informational and Planning Nudges. 152-183 - Daniel Alabi, Audra McMillan, Jayshree Sarathy, Adam D. Smith, Salil P. Vadhan:

Differentially Private Simple Linear Regression. 184-204 - Samuel Adams, Chaitali Choudhary, Martine De Cock

, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen:
Privacy-preserving training of tree ensembles over continuous data. 205-226 - Aidmar Wainakh, Fabrizio Ventola, Till Müßig, Jens Keim, Carlos Garcia Cordero, Ephraim Zimmer

, Tim Grube, Kristian Kersting, Max Mühlhäuser:
User-Level Label Leakage from Gradients in Federated Learning. 227-244 - Rakibul Hasan

, Mario Fritz:
Understanding Utility and Privacy of Demographic Data in Education Technology by Causal Analysis and Adversarial-Censoring. 245-262 - Xue Jiang, Xuebing Zhou, Jens Grossklags:

Comprehensive Analysis of Privacy Leakage in Vertical Federated Learning During Prediction. 263-281 - Karel Kubicek

, Jakob Merane, Carlos Cotrini, Alexander Stremitzer, Stefan Bechtold, David A. Basin:
Checking Websites' GDPR Consent Compliance for Marketing Emails. 282-303 - Aarushi Goel, Matthew Green, Mathias Hall-Andersen, Gabriel Kaptchuk:

Efficient Set Membership Proofs using MPC-in-the-Head. 304-324 - Domien Schepers, Aanjhan Ranganathan

:
Privacy-Preserving Positioning in Wi-Fi Fine Timing Measurement. 325-343 - James K. Holland, Nicholas Hopper:

RegulaTor: A Straightforward Website Fingerprinting Defense. 344-362 - Rishav Chourasia

, Batnyam Enkhtaivan, Kunihiro Ito, Junki Mori
, Isamu Teranishi, Hikaru Tsuchida
:
Knowledge Cross-Distillation for Membership Privacy. 362-377 - Saikrishna Badrinarayanan, Peihan Miao, Tiancheng Xie:

Updatable Private Set Intersection. 378-406 - Lukas Prediger

, Niki Andreas Lopi, Samuel Kaski, Antti Honkela:
d3p - A Python Package for Differentially-Private Probabilistic Programming. 407-425 - Daniel Kats, David Luz Silva, Johann Roturier:

Who Knows I Like Jelly Beans? An Investigation Into Search Privacy. 426-446 - Valerie Fetzer

, Marcel Keller
, Sven Maier
, Markus Raiber
, Andy Rupp
, Rebecca Schwerdt
:
PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics. 447-516 - Pankaj Dayama, Arpita Patra, Protik Paul, Nitin Singh, Dhinakaran Vinayagamurthy:

How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge Protocols. 517-556 - Pouneh Nikkhah Bahrami, Umar Iqbal, Zubair Shafiq:

FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting. 557-577 - Dilawer Ahmed, Anupam Das, Fareed Zaffar:

Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices. 578-600 - Priyanka Nanayakkara, Johes Bater

, Xi He, Jessica Hullman, Jennie Rogers
:
Visualizing Privacy-Utility Trade-Offs in Differentially Private Data Releases. 601-618
Volume 2022, Number 3, July 2022
- Florian Kerschbaum, Michelle L. Mazurek:

Editors' Introduction. 1-5 - Patrick Bombik, Tom Wenzel

, Jens Grossklags, Sameer Patil:
A Multi-Region Investigation of the Perceptions and Use of Smart Home Devices. 6-32 - Mohammad Tahaei

, Kopo M. Ramokapane
, Tianshi Li
, Jason I. Hong, Awais Rashid
:
Charting App Developers' Journey Through Privacy Regulation Features in Ad Networks. 33-56 - Vanessa Bracamonte, Sebastian Pape, Sascha Löbner

:
"All apps do this": Comparing Privacy Concerns Towards Privacy Tools and Non-Privacy Tools for Social Media Content. 57-78 - Imane Fouad, Cristiana Teixeira Santos, Arnaud Legout, Nataliia Bielova:

My Cookie is a phoenix: detection, measurement, and lawfulness of cookie respawning with browser fingerprinting. 79-98 - Ahmed Alshehri, Joseph Spielman, Amiya Prasad, Chuan Yue:

Exploring the Privacy Concerns of Bystanders in Smart Homes from the Perspectives of Both Owners and Bystanders. 99-119 - Arezoo Rajabi, Mahdieh Abbasi, Rakesh B. Bobba

, Kimia Tajik:
Adversarial Images Against Super-Resolution Convolutional Neural Networks for Free. 120-139 - Dustin Kern

, Timm Lauser
, Christoph Krauß
:
Integrating Privacy into the Electric Vehicle Charging Architecture. 140-158 - Kejsi Take, Kevin Gallagher

, Andrea Forte, Damon McCoy, Rachel Greenstadt:
"It Feels Like Whack-a-mole": User Experiences of Data Removal from People Search Websites. 159-178 - Ryan Wails, Andrew Stange, Eliana Troper, Aylin Caliskan, Roger Dingledine, Rob Jansen, Micah Sherr:

Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs. 179-199 - Rajat Tandon, Pithayuth Charnsethikul, Ishank Arora, Dhiraj Murthy, Jelena Mirkovic:

I know what you did on Venmo: Discovering privacy leaks in mobile social payments. 200-221 - Valentin Hartmann, Vincent Bindschaedler

, Alexander Bentkamp, Robert West:
Privacy accounting εconomics: Improving differential privacy composition via a posteriori bounds. 222-246 - Amogh Pradeep, Hira Javaid, Ryan Williams, Antoine Rault, David R. Choffnes, Stevens Le Blond, Bryan Ford:

Moby: A Blackout-Resistant Anonymity Network for Mobile Devices. 247-267 - David Marco Sommer, Liwei Song, Sameer Wagh, Prateek Mittal:

Athena: Probabilistic Verification of Machine Unlearning. 268-290 - S. Dov Gordon, Carmit Hazay, Phi Hung Le:

Fully Secure PSI via MPC-in-the-Head. 291-313 - Vera Rimmer, Theodor Schnitzler, Tom van Goethem, Abel Rodríguez Romero, Wouter Joosen, Katharina Kohls:

Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor. 314-335 - Sarah Meiklejohn, Joe DeBlasio, Devon O'Brien, Chris Thompson, Kevin Yeo, Emily Stark:

SoK: SCT Auditing in Certificate Transparency. 336-353 - Szilvia Lestyán, Gergely Ács, Gergely Biczók:

In Search of Lost Utility: Private Location Data. 354-372 - Yucheng Yang, Jack West, George K. Thiruvathukal, Neil Klingensmith, Kassem Fawaz:

Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps. 373-393 - Moritz Gruber, Christian Höfig, Maximilian Golla, Tobias Urban, Matteo Große-Kampmann:

"We may share the number of diaper changes": A Privacy and Security Analysis of Mobile Child Care Applications. 394-414 - Ji Gao, Sanjam Garg

, Mohammad Mahmoody, Prashant Nalini Vasudevan:
Deletion inference, reconstruction, and compliance in machine (un)learning. 415-436 - Eduard Rupp, Emmanuel Syrmoudis

, Jens Grossklags:
Leave No Data Behind - Empirical Insights into Data Erasure from Online Services. 437-455 - Iness Ben Guirat

, Claudia Díaz:
Mixnet optimization methods. 456-477 - Michael Toth, Nataliia Bielova, Vincent Roca:

On dark patterns and manipulation of website publishers by CMPs. 478-497 - Mona Wang

, Anunay Kulshrestha, Liang Wang, Prateek Mittal:
Leveraging strategic connection migration-powered traffic splitting for privacy. 498-515 - Jeremiah Blocki, Wuwei Zhang:

DALock: Password Distribution-Aware Throttling. 516-537 - Christoph Egger

, Russell W. F. Lai
, Viktoria Ronge, Ivy K. Y. Woo
, Hoover H. F. Yin
:
On Defeating Graph Analysis of Anonymous Transactions. 538-557 - Sarah Pearman, Ellie Young

, Lorrie Faith Cranor
:
User-friendly yet rarely read: A case study on the redesign of an online HIPAA authorization. 558-581 - Debajyoti Das, Easwar Vivek Mangipudi, Aniket Kate:

OrgAn: Organizational Anonymity with Low Latency. 582-605 - Janus Varmarken, Jad Al Aaraj, Rahmadi Trimananda, Athina Markopoulou:

FingerprinTV: Fingerprinting Smart TV Apps. 606-629 - Yuanyi Sun, Sencun Zhu, Yu Chen:

ZoomP3: Privacy-Preserving Publishing of Online Video Conference Recordings. 630-649 - Mihai Bâce, Alia Saad, Mohamed Khamis, Stefan Schneegass, Andreas Bulling:

PrivacyScout: Assessing Vulnerability to Shoulder Surfing on Mobile Devices. 650-669 - Dominic Deuber

, Viktoria Ronge, Christian Rückert:
SoK: Assumptions Underlying Cryptocurrency Deanonymizations. 670-691 - Marcos Tileria, Jorge Blasco:

Watch Over Your TV: A Security and Privacy Analysis of the Android TV Ecosystem. 692-710 - Rujia Li, Qin Wang

, Qi Wang, David Galindo, Mark Ryan:
SoK: TEE-Assisted Confidential Smart Contract. 711-731 - Anisa Halimi, Leonard Dervishi, Erman Ayday, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux, Xiaoqian Jiang, Jaideep Vaidya:

Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies. 732-753
Volume 2022, Number 4, October 2022
- Florian Kerschbaum, Michelle L. Mazurek:

Editors' Introduction. 1-5 - Michael Smith, Peter Snyder, Moritz Haller, Benjamin Livshits, Deian Stefan, Hamed Haddadi:

Blocked or Broken? Automatically Detecting When Privacy Interventions Break Websites. 6-23 - Igor Zavalyshyn, Axel Legay, Annanda Rath, Etienne Rivière:

SoK: Privacy-enhancing Smart Home Hubs. 24-43 - Megumi Ando, Marilyn George:

On the Cost of Suppressing Volume for Encrypted Multi-maps. 44-65 - Kevin Deforth, Marc Desgroseilliers, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Marius Vuille:

XORBoost: Tree Boosting in the Multiparty Computation Setting. 66-85 - Abhishek Jana, Bipin Paudel, Md. Kamruzzaman Sarker, Monireh Ebrahimi, Pascal Hitzler, George T. Amariucai:

Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication. 86-104 - Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler

, Patrick Traynor, Kevin R. B. Butler:
Analyzing the Monetization Ecosystem of Stalkerware. 105-119 - Majed Almansoori, Andrea Gallardo, Julio Poveda, Adil Ahmed, Rahul Chatterjee:

A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance. 120-139 - Kazuki Nomoto, Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata, Tatsuya Mori:

On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework. 140-161 - Eugene Bagdasaryan, Peter Kairouz, Stefan Mellem

, Adrià Gascón, Kallista A. Bonawitz, Deborah Estrin, Marco Gruteser:
Towards Sparse Federated Analytics: Location Heatmaps under Distributed Differential Privacy with Secure Aggregation. 162-182 - Yue Niu, Ramy E. Ali, Salman Avestimehr:

3LegRace: Privacy-Preserving DNN Training over TEEs and GPUs. 183-203 - Shikun Zhang, Yuanyuan Feng, Yaxing Yao, Lorrie Faith Cranor

, Norman Sadeh:
How Usable Are iOS App Privacy Labels? 204-228 - Foteini Baldimtsi, Panagiotis Chatzigiannis, S. Dov Gordon, Phi Hung Le, Daniel McVicker:

gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies. 229-249 - Noura Alomar, Serge Egelman:

Developers Say the Darnedest Things: Privacy Compliance Processes Followed by Developers of Child-Directed Apps. 250-273 - Kanav Gupta, Deepak Kumaraswamy, Nishanth Chandran, Divya Gupta:

LLAMA: A Low Latency Math Library for Secure Inference. 274-294 - Maaz Bin Musa, Rishab Nithyanand:

ATOM: Ad-network Tomography. 295-313 - Marlene Saemann, Daniel Theis, Tobias Urban

, Martin Degeling:
Investigating GDPR Fines in the Light of Data Flows. 314-331 - Xinyu Tang, Milad Nasr, Saeed Mahloujifar, Virat Shejwalkar, Liwei Song, Amir Houmansadr, Prateek Mittal:

Machine Learning with Differentially Private Labels: Mechanisms and Frameworks. 332-350 - Sameer Wagh:

Pika: Secure Computation using Function Secret Sharing over Rings. 351-377 - Mário S. Alvim, Natasha Fernandes

, Annabelle McIver
, Carroll Morgan, Gabriel Henrique Nunes
:
Flexible and scalable privacy assessment for very large datasets, with an application to official governmental microdata. 378-399 - Karola Marky, Nina Gerber

, Michelle Gabriela Pelzer, Mohamed Khamis, Max Mühlhäuser:
"You offer privacy like you offer tea": Investigating Mechanisms for Improving Guest Privacy in IoT-Equipped Households. 400-420 - Gary Liu, Nathan Malkin:

Effects of Privacy Permissions on User Choices in Voice Assistant App Stores. 421-439 - Alexandra Kapp

:
Collection, usage and privacy of mobility data in the enterprise and public administrations. 440-456 - Angelica Goetzen, Samuel Dooley, Elissa M. Redmiles:

Ctrl-Shift: How Privacy Sentiment Changed from 2019 to 2021. 457-485 - Simon Koch

, Malte Wessels
, Benjamin Altpeter
, Madita Olvermann
, Martin Johns:
Keeping Privacy Labels Honest. 486-506 - Felix Engelmann, Thomas Kerber, Markulf Kohlweiss, Mikhail Volkhov:

Zswap: zk-SNARK Based Non-Interactive Multi-Asset Swaps. 507-527 - Anshuman Suri

, David Evans:
Formalizing and Estimating Distribution Inference Risks. 528-551 - Vadym Doroshenko, Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi:

Connect the Dots: Tighter Discrete Approximations of Privacy Loss Distributions. 552-570 - Daniel Bosk, Davide Frey, Mathieu Gestin, Guillaume Piolle:

Hidden Issuer Anonymous Credential. 571-607 - Danilo Fabrino Favato, Gabriel Coutinho, Mário S. Alvim, Natasha Fernandes

:
A novel reconstruction attack on foreign-trade official statistics, with a Brazilian case study. 608-625 - Badih Ghazi, Neel Kamal, Ravi Kumar, Pasin Manurangsi, Annika Zhang:

Private Aggregation of Trajectories. 626-644 - Tom Biselli, Enno Steinbrink

, Franziska Herbert, Gina Maria Schmidbauer-Wolf, Christian Reuter:
On the Challenges of Developing a Concise Questionnaire to Identify Privacy Personas. 645-669 - Ilia Iliashenko, Malika Izabachène, Axel Mertens

, Hilder V. L. Pereira:
Homomorphically counting elements with the same property. 670-683 - Zachary Espiritu

, Evangelia Anna Markatou
, Roberto Tamassia
:
Time- and Space-Efficient Aggregate Range Queries over Encrypted Databases. 684-704 - Michal Kepkowski, Lucjan Hanzlik, Ian D. Wood, Mohamed Ali Kâafar:

How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy. 705-726 - Christopher Ellis, Haohuang Wen, Zhiqiang Lin, Anish Arora:

Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification Contact Tracing. 727-745 - Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Takahiro Matsuda, Ibuki Mishina, Hiraku Morita, Jacob C. N. Schuldt:

Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation. 746-767 - Alexandros Bampoulidis, Alessandro Bruni, Lukas Helminger, Daniel Kales

, Christian Rechberger, Roman Walch:
Privately Connecting Mobility to Infectious Diseases via Applied Cryptography. 768-788

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














