SoK Papers in Privacy Enhancing Technologies Symposium
SoK Authors · Frequently Asked Questions ·
Other Conferences with SoK
2024 | |
SoK: Can Trajectory Generation Combine Privacy and Utility? | Erik Buchholz, Sharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere |
SoK: Data Privacy in Virtual Reality | Gonzalo Munilla Garrido, Vivek Nair, Dawn Song |
SoK: Metadata-Protecting Communication Systems | Sajin Sasy, Ian Goldberg |
SoK: Provably Secure Onion Routing against a Global Adversary | Philip Scherer, Christiane Weis, Thorsten Strufe |
SoK: Secure Human-centered Wireless Sensing | Wei Sun, Tingjun Chen, Neil Gong |
SoK: Trusting Self-Sovereign Identity | Evan Krul, Hye-young Paik, Sushmita Ruj, Salil S. Kanhere |
SoK: Wildest Dreams: Reproducible Research in Privacy-preserving Neural Network Training | Tanveer Khan, Mindaugas Budzys, Khoa Nguyen, Antonis Michalas |
2023 | |
SoK: Content Moderation for End-to-End Encryption | Sarah Scheffler, Jonathan Mayer |
SoK: Differentially Private Publication of Trajectory Data | Àlex Miranda-Pascual, Patricia Guerra-Balboa, Javier Parra-Arnau, Jordi Forné, Thorsten Strufe |
SoK: Managing risks of linkage attacks on data privacy | Jovan Powar, Alastair R. Beresford |
SoK: Secure Aggregation based on cryptographic schemes for Federated Learning | Mohamad Mansouri, Melek Önen, Wafa Ben Jaballah, Mauro Conti |
SoK: Secure E-Voting with Everlasting Privacy | Thomas Haines, Rafieh Mosaheb, Johannes Mueller, Ivan Pryvalov |
2022 | |
SoK: Assumptions underlying Cryptocurrency Deanonymizations - A Taxonomy for Scientific Experts and Legal Practitioners | Dominic Deuber, Viktoria Ronge, Christian Rückert |
SoK: Cryptographic Confidentiality of Data on Mobile Devices | Maximilian Zinkus, Tushar M. Jois, Matthew Green |
SoK: Plausibly Deniable Storage | Chen Chen, Xiao Liang, Bogdan Carbunar, Radu Sion |
SoK: Privacy-enhancing Smart Home Hubs | Igor Zavalyshyn, Axel Legay, Annanda Rath, Etienne Riviere |
SoK: SCT Auditing in Certificate Transparency | Sarah Meiklejohn, Joe DeBlasio, Devon O'Brien, Chris Thompson, Kevin Yeo, Emily Stark |
SoK: TEE-assisted Confidential Smart Contract | Rujia Li, Qin Wang, Qi Wang, David Galindo, Mark Ryan |
2021 | |
SoK: Efficient Privacy-preserving Clustering | Aditya Hegde, Helen Möllering, Thomas Schneider, Hossein Yalame |
SoK: Managing Longitudinal Privacy of Publicly Shared Personal Online Data | Theodor Schnitzler, Shujaat Mirza, Markus Dürmuth, Christina Pöpper |
SoK: Privacy-Preserving Collaborative Tree-based Model Learning | Sylvain Chatel, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux |
SoK: Privacy-Preserving Computation Techniques for Deep Learning | José Cabrero-Holgueras, Sergio Pastrana |
SoK: Privacy-Preserving Reputation Systems | Stan Gurtler, Ian Goldberg |
2020 | |
SoK: Anatomy of Data Breaches | Hamza Saleem, Muhammad Naveed |
SoK: Differential privacies | Damien Desfontaines, Balázs Pejó |
2019 | |
SoK: Modular and Efficient Private Decision Tree Evaluation | Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, Thomas Schneider |