Machine Learning and PrivacyExplores machine learning fundamentals and privacy risks, focusing on privacy attacks and collaborative machine learning.
Homomorphic EncryptionExplores homomorphic encryption, enabling computations on encrypted data without decryption, with practical applications in secure medical clouds.
Data Protection Law: Principles and PracticesExplores the historical development and legal aspects of data protection laws, international instruments, challenges of online tracking, legal bases for processing personal data, and privacy regulations.
Homomorphic EncryptionCovers the historical development and key concepts of homomorphic encryption, focusing on the Paillier cryptosystem and the BGV cryptosystem.
Privacy-preserving authenticationExplores privacy-preserving authentication methods, zero-knowledge proofs, Schnorr's proof of identification, and their real-world applications.
Location PrivacyExplores the sensitivity of location data, inference of points of interest, and techniques for protecting location privacy.
Location PrivacyCovers the measurement of privacy in location data, defense mechanisms, and challenges in protecting location privacy.
Anonymous communicationsExplores the significance of anonymous communications in safeguarding privacy and security, covering challenges, applications, system design, and quantifying anonymity levels.
Anonymous CommunicationsDelves into anonymous communication systems, discussing Herbivore protocol, statistical disclosure attacks, Crowds system, and anonymity analysis.