A Low-Cost Privacy-Preserving Digital Wallet for Humanitarian Aid Distribution.
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Janus: Safe Biometric Deduplication for Humanitarian Aid Distribution.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Poster: Multiparty Private Set Intersection from Multiparty Homomorphic Encryption.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Private Collection Matching Protocols.
Proc. Priv. Enhancing Technol., July, 2023
Not Yet Another Digital ID: Privacy-Preserving Humanitarian Aid Distribution.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Private Set Matching Protocols.
CoRR, 2022
Deploying decentralized, privacy-preserving proximity tracing.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Commun. ACM, 2022
Epidose: A privacy-preserving epidemic dosimeter based on contact tracing.
Dataset, May, 2021
CrowdNotifier: Decentralized Privacy-Preserving Presence Tracing.
Proc. Priv. Enhancing Technol., 2021
Toward a Common Performance and Effectiveness Terminology for Digital Proximity Tracing Applications.
Frontiers Digit. Health, 2021
Preliminary Analysis of Potential Harms in the Luca Tracing System.
CoRR, 2021
Tandem: Securing Keys by Using a Central Server While Preserving Privacy.
Proc. Priv. Enhancing Technol., 2020
Towards a common performance and effectiveness terminology for digital proximity tracing applications.
CoRR, 2020
Datashare: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists.
CoRR, 2020
VoteAgain: A scalable coercion-resistant voting system.
Proceedings of the 29th USENIX Security Symposium, 2020
DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists.
Proceedings of the 29th USENIX Security Symposium, 2020
19th Workshop on Privacy in the Electronic Society (WPES 2020).
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Reducing Metadata Leakage from Encrypted Files and Communication with PURBs.
Proc. Priv. Enhancing Technol., 2019
zksk: A Library for Composable Zero-Knowledge Proofs.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019
ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018
Fast revocation of attribute-based credentials for both users and verifiers.
Comput. Secur., 2017
Vote to Link: Recovering from Misbehaving Anonymous Users.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016
On Linkability and Malleability in Self-blindable Credentials.
IACR Cryptol. ePrint Arch., 2015
Sublinear Scaling for Multi-Client Private Information Retrieval.
Proceedings of the Financial Cryptography and Data Security, 2015
Revocable Privacy: Principles, Use Cases, and Technologies.
Proceedings of the Privacy Technologies and Policy - Third Annual Privacy Forum, 2015
Forward-Secure Distributed Encryption.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014
Visualizing the quality of dimensionality reduction.
Neurocomputing, 2013
An Attack Against Fixed Value Discrete Logarithm Representations.
IACR Cryptol. ePrint Arch., 2013
Designated Attribute-Based Proofs for RFID Applications.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012
Visualizing the quality of dimensionality reduction.
Proceedings of the 20th European Symposium on Artificial Neural Networks, 2012
Out-of-sample kernel extensions for nonparametric dimensionality reduction.
Proceedings of the 20th European Symposium on Artificial Neural Networks, 2012
How to Evaluate Dimensionality Reduction? - Improving the Co-ranking Matrix
CoRR, 2011
Illustrative Molecular Visualization with Continuous Abstraction.
Comput. Graph. Forum, 2011