DISS. ETH NO. 28278 MEASUREMENT AND MODELING OF THE ...

The objective of this thesis is to make it easier to understand, use, and deploy strong anonymization practices. We make progress towards this goal in three ...







Privacy-preserving AI using declarative constraints Moitree Basu - HAL
The technology disclosed herein may be protected by one or more patents, copyrights, trademarks and/or trade secrets owned by or licensed to SECURED ...
Entanglement Distribution with Minimal Memory Requirements ...
Method: Intersective analysis of ChIP-seq, ATAC-seq, RNA-seq, and snRNA-seq was performed to find Kla target gene in both HCC cell lines and ...
Attacks and Solutions in the Digital World by Yadi Zhong A ... - CORE
2020 T. R. van de Kamp, the Netherlands. All rights reserved. No parts of this thesis may be reproduced, stored in a retrieval system.
Multi-client Functional Encryption for Controlled Data Sharing
... leaked during the tally can or cannot be exploited by the adversary is ... Alice's choice. Then it may try to replay Alice's ballot using as many ...
Coercion resistance in electronic voting: Design and analysis
Assume Alice owns an item cA and Bob owns an item cB. Informally, strong fairness states that if Alice and Bob run a protocol to ex- change their items, in ...
Security Matters: Privacy in Voting and Fairness in Digital Exchange
This thesis describes how wireless networks can inadvertently leak and broadcast users' personal information despite the correct use of encryption. Users would ...
Your WiFi Is Leaking: Inferring Private User Information Despite ...
Abstract?Multicast DNS Service Discovery (mDNS-SD), made fashionable through Apple's Bonjour, is a prevalent technique allowing service distribution and ...
Search for emerging jets within dark QCD models with the ATLAS ...
The Standard Model (SM) of particle physics is a very successful theory describing the particle contents and interactions governing the ...
SecuWear: Secure Data Sharing Between Wearable Devices
Alice's devices employ SecuWear to share data to provide her with insights into her health. We assume that one wearable device acts as a data ...
Minimizing Trust Leaks for Robust Sybil Detection
Our method is specifically designed to cope with a large number of attacking edges by minimiz- ing ?trust leaks?, that is, minimizing a sampled trust leak by ...
Practical Anamorphic-Resistant Encryption without Random Oracles
Meanwhile, Alice can use dk as a symmetric key to embed a hidden message within the ciphertext, which remains undetectable even if ask is exposed. Thus ...
2025 ????????????????????????
????????????????????. ?????????????????????????????. ?????????????????????? ...