About 78 results
Open links in new tab
  1. Privately Connecting Mobility to Infectious Diseases via Applied ...

    Clearly, naively linking mobile phone data with health records would violate privacy by either allowing to track mobility patterns of infected individuals, leak information on who is infected, or both.

  2. re running the protocol. In the updated protocol, the health authority now uses sk to encrypt the input vector x and sends the re-sulting ciphertext vector c ← Encsk(x) to the MNO.

  3. PoPETs Proceedings — Volume 2022 - petsymposium.org

    Dmitrii Usynin (Department of Computing, Imperial College London; Department of Diagnostic and Interventional Radiology, Technical University of Munich), Daniel Rueckert (Institute for Artificial …

  4. ions and patterns of data from different perspectives and to obtain a bet-ter understanding of the characteristics of user groups. For instance, a digital healthcare application may uti-lize users’ …

  5. Proof-of-Vax: Studying User Preferences and Perception of Covid ...

    We hope that our work will educate the currently ongoing design of vaccination certificates, give us deeper insights into the privacy of health-related data and apps, and prepare us for future potential …

  6. PoPETs Proceedings — Personal information inference from voice ...

    Abstract: Through voice characteristics and manner of expression, even seemingly benign voice recordings can reveal sensitive attributes about a recorded speaker (e. g., geographical origin, health …

  7. PoPETs Proceedings — Privacy-Preserving and Efficient Verification of ...

    Authors: Anisa Halimi (IBM Research Europe - Dublin), Leonard Dervishi (Case Western Reserve University), Erman Ayday (Case Western Reserve University), Apostolos Pyrgelis (EPFL), Juan …

  8. Protection Regulation (GDPR) [10], California Con-sumer Privacy Act (CCPA) [2], and Health Insurance Portability and Accountability Act (HIPAA) attack (MIA) [5, 15, 23, 24, 30, 31, 34–36, 43, 44], where …

  9. Investigating GDPR Fines in the Light of Data Flows

    Moreover, data protection authorities more often react to data subjects’ complaints when data breaches become public and when health-related data is involved. We further show that the root causes for …

  10. Zen and the art of model adaptation: Low-utility-cost attack ...

    Authors: Dmitrii Usynin (Department of Computing, Imperial College London; Department of Diagnostic and Interventional Radiology, Technical University of Munich), Daniel Rueckert (Institute for Artificial …