Search Results

1 - 10 of 13 items :

  • European Union x
  • IT-Security and Cryptology x
Clear All
Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps

/ACM 1st International Workshop on, pages 2-7, May 2015. [12] Shauvik Roy Choudhary, Alessandra Gorla, and Alessandro Orso. Automated Test Input Generation for Android: Are We There Yet?(E). In Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on, pages 429-440. IEEE, 2015. [13] Fred Chung. Custom Class Loading in Dalvik. http: //android-developers.blogspot.it/2011/07/custom-classloading- in-dalvik.html. [14] Court of Justice of the European Union. The court of justice declares that the

Open access
4 Years of EU Cookie Law: Results and Lessons Learned

. https://www.webpagetest.org/ . [9] Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, A Digital Single Market Strategy for Europe, COM(2015) 192 final), 2015. [10] A car , G., E ubank , C., E nglehardt , S., J uarez , M., N arayanan , A., and D iaz , C. The web never forgets: Persistent tracking mechanisms in the wild. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (New York, NY, USA, 2014), CCS ’14, ACM, pp

Open access
Access Denied! Contrasting Data Access in the United States and Ireland

://www.cint.com/about [Accessed: 06- Apr- 2015]. [19] M. Cogley. Of course Facebook would go to a country with the lowest levels of data protection, 2015. http://www.newstalk.com/Of-course-Facebook-would-go-to-a-countrywith- the-lowest-levels-of-data-protection- [Accessed: 20- Jul- 2015]. [20] Administration discussion draft: Consumer Privacy Bill of Rights Act of 2015, 2015. https://www.whitehouse.gov/sites/default/files/omb/legislative/letters/cpbr-act-of-2015-discussion-draft.pdf [Accessed: 15- Jun- 2015]. [21] Council of the European Union

Open access
The privacy of the TLS 1.3 protocol

Rogaway. Entity authentication and key distribution. In CRYPTO , pages 232–249, 1993. [9] Benjamin Berdouche, Kartikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre Yves Strub, and Jean Karim Zinzindohoue. A messy state of the union: Taming the composite state machines of TLS. In Proceedings of IEEE S&P 2015 , pages 535–552. IEEE, 2015. [10] Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, and Jean Karim Zinzindohoue

Open access
Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS)

Processing of Personal Data and on the Free Movement of Such Data, 1995. [11] European Parliament. Regulation 2016/679 of the European Parliament and the Council of the European Union of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation), 2016. [12] Federal Aviation Administration. Access to Aircraft Situation Display (ASDI) and National Airspace System Status Information (NASSI), 2011

Open access
SecureNN: 3-Party Secure Computation for Neural Network Training

free movement of such data, and repealing Directive 95/46/EC (GDPR). Official Journal of the European Union , L119, May 2016. [6] Toshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, and Kazuma Ohara. High-throughput semi-honest secure three-party computation with an honest majority. In ACM CCS , 2016. [7] Donald Beaver. Efficient multiparty protocols using circuit randomization. In Annual International Cryptology Conference , pages 420–432. Springer, 1991. [8] Michael Ben-Or, Shafi Goldwasser, and Avi Wigderson. Completeness theorems for

Open access
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering

References [1] European Parliament and Council of the European Union, “Directive 2006/32/ec of the european parliament and of the council,” 2006. [2] G. W. Hart, “Nonintrusive appliance load monitoring,” Proceedings of the IEEE , vol. 80, no. 12, pp. 1870–1891, 1992. [3] H. Lam, G. Fung, and W. Lee, “A novel method to construct taxonomy electrical appliances based on load signatures of,” IEEE Transactions on Consumer Electronics , vol. 53, no. 2, pp. 653–660, 2007. [4] U. Greveler, B. Justus, and D. Loehr, “Forensic content detection

Open access
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy

, 2017, pp. 103 – 138. [24] EU Regulation, “European data protection regulation (GDPR),” Off J Eur Union , vol. L119, pp. 1–88, 4th May 2016. [25] D. Sommer, A. Dhar, L. Malitsa, E. Mohammadi, D. Ronzani, and S. Capkun, “Anonymous Communication for Messengers via “Forced” Participation,” Technical report, available under https://eprint.iacr.org/2017/191 , 2017. [26] S. Vadhan, G. N. Rothblum, and C. Dwork, “Boosting and differential privacy,” in 2010 IEEE 51st Annual Symposium on Foundations of Computer Science (FOCS) , 2010, pp. 51–60. [27

Open access
Constructing elastic distinguishability metrics for location privacy

1 This work was partially supported by the European Union 7th FP project MEALS, by the project ANR-12-IS02-001 PACE, and by the INRIA Large Scale Initiative CAPPRIS. References [1] https://github.com/paracetamolo/elastic-mechanism . [2] M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Geo-indistinguishability: differential privacy for location-based systems. In Proc. of CCS , pages 901–914. ACM, 2013. [3] C. A. Ardagna, M. Cremonini, E. Damiani, S. D. C. di Vimercati, and P. Samarati. Location privacy protection

Open access
Cheaper Private Set Intersection via Differentially Private Leakage

, Heidelberg, Mar. 2006. [9] E. Fenske, A. Mani, A. Johnson, and M. Sherr. Distributed measurement with private set-union cardinality. In B. M. Thuraisingham, D. Evans, T. Malkin, and D. Xu, editors, ACM CCS 17 , pages 2295–2312. ACM Press, Oct. / Nov. 2017. [10] M. J. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In C. Cachin and J. Camenisch, editors, EUROCRYPT 2004 , volume 3027 of LNCS , pages 1–19. Springer, Heidelberg, May 2004. [11] O. Goldreich. Towards a theory of software protection and simulation by

Open access