Strategic information is valuable either by remaining private (for instance if it is sensitive) or, on the other hand, by being used publicly to increase some utility. These two objectives are antagonistic and leaking this information by taking full advant ...
Smartphones present many interesting opportunities for survey research, particularly through the use of mobile data collection applications (apps). There is still much to learn, however, about how to integrate apps in general population surveys. Recent stu ...
Secure retrieval of data requires integrity, confidentially, transparency, and metadata-privacy of the process. Existing protection mechanisms, however, provide only partially these properties: encryption schemes still expose cleartext metadata, protocols ...
The need for efficient, widespread and reliable security and user privacy technologies is important more so than ever before. This is in particular crucial for workflows involving image data. Images can be easily edited to give a false impression of realit ...
Contact tracing is an essential tool to mitigate the impact of a pandemic, such as the COVID-19 pandemic. In order to achieve efficient and scalable contact tracing in real time, digital devices can play an important role. While a lot of attention has been ...
Most communication systems (e.g., e-mails, instant messengers, VPNs) use encryption to prevent third parties from learning sensitive information.
However, encrypted communications protect the contents but often leak metadata: the amount of data sent and th ...
Under the umbrella of smart toys, a myriad of interactive systems have addressed a variety of scenarios considering entertainment, education, sustainability, social and environmental learning through play. Tangibles and small toy robots prevail; but intera ...
In human-computer interaction, self-disclosure of sensitive information regarding distressing experiences requires the establishment of a trust channel between the user and the digital tool. As privacy and security have been identified as factors that cont ...
In this thesis, we focus on the problem of achieving practical privacy guarantees in machine learning (ML), where the classic differential privacy (DP) fails to maintain a good trade-off between user privacy and data utility. Differential privacy guarantee ...