Abstract—Many distributed applications, such as collaborative Web mapping, collaborative feedback and ranking, or bug reporting systems, rely on the aggregation of privacy-sensitive information gathered from human users. This information is typically aggregated at servers and later used as the basis for some collaborative service. Expecting that clients trust that the user-centric information will not be used for malevolent purposes is not realistic in a fully distributed setting where nodes are not under the control of a single administrative domain. Moreover, most of the time the origin of the data is of small importance when computing the aggregation onto which these services are based. Trust problems can be evinced by ensuring that the ...
The architectures of deployed anonymity systems such as that of the Tor network suffer from the probl...
The modern internet and phone networks offer very little security, privacy, or accountability to the...
In this thesis I will show that, by leveraging efficient data structures and algorithms for indexing...
Public libraries have served an invaluable function for a long time. Yet in an age of digital media,...
The collection, publication, and mining of personal data have become key drivers of innovation and v...
Freedom of speech is a core value of our society. While it can be exercised anonymously towards unde...
Abstract—In this paper, we consider the collaborative data publishing problem for anonymizing horizo...
In the recent past we introduced two new security applications built on peer-to-peer systems and dis...
The collaborative data publishing issue for anonymizing horizontally partitioned data at various dat...
10 pagesInternational audienceWhile most of the work done in Privacy-Preserving Data Publishing does...
This paper describes a security problem involving an online data repository, which acts as a proxy f...
The request for on-line privacy is rapidly increasing. More and more Internet users realize that inf...
In this paper the collaborative data publishing issue for horizontally Partitioned data at different...
Abstract. While most of the work done in Privacy-Preserving Data Publishing does the assumption of a...
The objective of this thesis is to design a suite of techniques to facilitate the storage and manipu...
The architectures of deployed anonymity systems such as that of the Tor network suffer from the probl...
The modern internet and phone networks offer very little security, privacy, or accountability to the...
In this thesis I will show that, by leveraging efficient data structures and algorithms for indexing...
Public libraries have served an invaluable function for a long time. Yet in an age of digital media,...
The collection, publication, and mining of personal data have become key drivers of innovation and v...
Freedom of speech is a core value of our society. While it can be exercised anonymously towards unde...
Abstract—In this paper, we consider the collaborative data publishing problem for anonymizing horizo...
In the recent past we introduced two new security applications built on peer-to-peer systems and dis...
The collaborative data publishing issue for anonymizing horizontally partitioned data at various dat...
10 pagesInternational audienceWhile most of the work done in Privacy-Preserving Data Publishing does...
This paper describes a security problem involving an online data repository, which acts as a proxy f...
The request for on-line privacy is rapidly increasing. More and more Internet users realize that inf...
In this paper the collaborative data publishing issue for horizontally Partitioned data at different...
Abstract. While most of the work done in Privacy-Preserving Data Publishing does the assumption of a...
The objective of this thesis is to design a suite of techniques to facilitate the storage and manipu...
The architectures of deployed anonymity systems such as that of the Tor network suffer from the probl...
The modern internet and phone networks offer very little security, privacy, or accountability to the...
In this thesis I will show that, by leveraging efficient data structures and algorithms for indexing...