Limit search to available items
Book Cover
Author European Symposium on Research in Computer Security (24th : 2019 : Luxembourg, Luxembourg)

Title Data privacy management, cryptocurrencies and blockchain technology : ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26-27, 2019, Proceedings / Cristina Pérez-Solà, Guillermo Navarro-Arribas, Alex Biryukov, Joaquin Garcia-Alfaro (eds.)
Published Cham, Switzerland : Springer, 2019
Online access available from:
Springer eBooks    View Resource Record  


Description 1 online resource (xv, 400 pages) : illustrations (some color)
Series LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 11737
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 11737
Contents Intro; Foreword from the DPM 2019 Program Chairs; Organization; Foreword from the CBT 2019 Program Chairs; Organization; Contents; DPM Workshop: Privacy Preserving Data Analysis; PINFER: Privacy-Preserving Inference; 1 Introduction; 2 Preliminaries; 2.1 Linear Models and Beyond; 2.2 Cryptographic Tools; 3 Basic Protocols of Privacy-Preserving Inference; 3.1 Private Linear/Logistic Regression; 3.2 Private SVM Classification; 4 Application to Neural Networks; 4.1 Sign Activation; 4.2 ReLU Activation; 5 Conclusion; A A More Private Protocols; A.1 Linear Regression; A.2 SVM Classification
4.4 Assessing the SAR Process5 Results and Evaluation; 5.1 Evaluation of Privacy Policies; 5.2 Subject Access Requests; 6 Limitations and Ethical Considerations; 7 Conclusion; A Provided Data; B Privacy Policy Overview; References; On Privacy Risks of Public WiFi Captive Portals; 1 Introduction; 2 Related Work; 3 CPInspector on Windows: Design and Data Collection; 4 Analysis and Results for Windows; 4.1 Personal Information Collection, Sharing, and Leaking; 4.2 Presence of Third-Party Tracking Domains and HTTP Cookies; 4.3 Device and Browser Fingerprinting; 5 CPInspector for Android
4.4 Privacy Attacks5 Conclusion; References; Skiplist Timing Attack Vulnerability; 1 Introduction; 2 Skiplist Timing Vulnerability; 2.1 Skiplist Mapping Algorithm; 2.2 Runtime Attack; 2.3 Hidden Channel Attack; 3 Defense from Timing Attacks: Splay Skiplist; 3.1 Splay Skiplist Algorithm; 4 Conclusions; References; DPM Workshop: Field/Lab Studies; A Study on Subject Data Access in Online Advertising After the GDPR; 1 Introduction; 2 Background; 2.1 Data Protection Law; 2.2 Advertising Economy; 3 Related Work; 4 Study Design; 4.1 Approach; 4.2 Analysis Corpus; 4.3 Transparency Requirements
6 Privacy Policy and Anti-Tracking7 Conclusion and Future Work; References; User Perceptions of Security and Usability of Mobile-Based Single Password Authentication and Two-Factor Authentication; 1 Introduction; 2 Related Work; 3 Methodology; 3.1 Study Design; 3.2 Measures; 4 Results; 4.1 Further Discussion; 5 Conclusion, Recommendations, and Future Work; A Mobile-Based Single Password Authentication Scheme of Acar et al. acar2013single; References; DPM Workshop: Privacy by Design and Data Anonymization; Graph Perturbation as Noise Graph Addition: A New Perspective for Graph Anonymization
Summary This book constitutes the refereed conference proceedings of the 14th International Workshop on Data Privacy Management, DPM 2019, and the Third International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2019, held in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019, held in Luxembourg in September 2019. For the CBT Workshop 10 full and 8 short papers were accepted out of 39 submissions. The selected papers are organized in the following topical headings: lightning networks and level 2; smart contracts and applications; and payment systems, privacy and mining. The DPM Workshop received 26 submissions from which 8 full and 2 short papers were selected for presentation. The papers focus on privacy preserving data analysis; field/lab studies; and privacy by design and data anonymization. -- Provided by publisher
Notes Includes author index
International conference proceedings
Online resource; title from PDF title page (SpringerLink, viewed September 27, 2019)
Subject Computer networks -- Security measures -- Congresses.
Computer security -- Congresses.
Data encryption (Computer science) -- Congresses.
Data protection -- Congresses.
Computer networks -- Security measures.
Computer security.
Data encryption (Computer science)
Data protection.
Genre/Form Conference papers and proceedings.
Form Electronic book
Author Biryukov, Alex, editor.
Garcia-Alfaro, Joaquin, editor.
Navarro-Arribas, Guillermo, editor.
Pérez-Solà, Cristina, editor.
CBT (Workshop) (3rd : 2019 : Luxembourg, Luxembourg), jointly held conference.
DPM (Workshop) (14th : 2019 : Luxembourg, Luxembourg), jointly held conference.
ISBN 3030315002
Other Titles CBT 2019
DPM 2019