Nataliia Bielova
Orcid: 0009-0005-0616-8394Affiliations:
- Cóte d'Azur University, France
- INRIA, France
According to our database1,
Nataliia Bielova
authored at least 49 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Feedback to the European Data Protection Board's Guidelines 2/2023 on Technical Scope of Art. 5(3) of ePrivacy Directive.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
An Ontology of Dark Patterns Knowledge: Foundations, Definitions, and a Pathway for Shared Knowledge-Building.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
Mobilizing Research and Regulatory Action on Dark Patterns and Deceptive Design Practices.
Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Google Tag Manager: Hidden Data Leaks and its Potential Violations under EU Data Protection Law.
CoRR, 2023
An Ontology of Dark Patterns Knowledge: Foundations, Definitions, and a Pathway for Shared Knowledge-Building.
CoRR, 2023
Temporal Analysis of Dark Patterns: A Case Study of a User's Odyssey to Conquer Prime Membership Cancellation through the "Iliad Flow".
CoRR, 2023
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
2022
Proc. Priv. Enhancing Technol., 2022
My Cookie is a phoenix: detection, measurement, and lawfulness of cookie respawning with browser fingerprinting.
Proc. Priv. Enhancing Technol., 2022
2021
In-Depth Technical and Legal Analysis of Tracking on Health Related Websites with ERNIE Extension.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021
Dark Patterns and the Legal Requirements of Consent Banners: An Interaction Criticism Perspective.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
Proceedings of the Privacy Technologies and Policy - 9th Annual Privacy Forum, 2021
, 2021
2020
Missed by Filter Lists: Detecting Unknown Third-Party Trackers with Invisible Pixels.
Proc. Priv. Enhancing Technol., 2020
DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems.
CoRR, 2020
Do Cookie Banners Respect my Choice? : Measuring Legal Compliance of Banners from IAB Europe's Transparency and Consent Framework.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Purposes in IAB Europe's TCF: Which Legal Basis and How Are They Used by Advertisers?
Proceedings of the Privacy Technologies and Policy - 8th Annual Privacy Forum, 2020
2019
Are cookie banners indeed compliant with the law? Deciphering EU legal requirements on consent and technical means to verify compliance of cookie banners.
CoRR, 2019
Security Analysis of Subject Access Request Procedures - How to Authenticate Data Subjects Safely When They Request for Their Data.
Proceedings of the Privacy Technologies and Policy - 7th Annual Privacy Forum, 2019
2018
CoRR, 2018
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018
2017
Proceedings of the 26th International Conference on World Wide Web, 2017
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the Principles of Security and Trust - 5th International Conference, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
Short Paper: Dynamic leakage: A Need for a New Quantitative Information Flow Measure.
Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, 2016
2014
Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach.
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014
2013
Survey on JavaScript security policies and their enforcement mechanisms in a web browser.
J. Log. Algebraic Methods Program., 2013
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013
2012
J. Comput. Secur., 2012
2011
PhD thesis, 2011
Int. J. Inf. Sec., 2011
Proceedings of the POLICY 2011, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011
2009
J. Log. Algebraic Methods Program., 2009
Proceedings of the Identity and Privacy in the Internet Age, 2009
2008
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008
Proceedings of the The Third International Conference on Availability, 2008