
PoPETs Proceedings
Volume 2025 Volume 2024 Volume 2023 Volume 2022 Volume 2021 Volume 2020 Volume 2019 Volume 2018 Volume 2017 Volume 2016 Volume 2015 Privacy Enhancing Technologies Symposium …
Awareness, Adoption, and Misconceptions of Web Privacy Tools
Volume: 2021 Issue: 3 Pages: 308–333 DOI: Download PDF Abstract: Privacy and security tools can help users protect themselves online. Unfortunately, people are often unaware of such tools, and …
Proceedings on Privacy Enhancing Technologies ; 2021 (3):122–141 Sébastien Gambs, Frédéric Ladouceur, Antoine Laurent, and Alexandre Roy-Gaumond*
Revisiting Membership Inference Under Realistic Assumptions
Volume: 2021 Issue: 2 Pages: 348–368 DOI: https://doi.org/10.2478/popets-2021-0031 Download PDF Abstract: We study membership inference in settings where assumptions commonly used in previous …
Growing synthetic data through differentially-private vine copulas
Volume: 2021 Issue: 3 Pages: 122–141 DOI: https://doi.org/10.2478/popets-2021-0040 Download PDF Abstract: In this work, we propose a novel approach for the synthetization of data based on copulas, …
Keywords: decision-tree induction, collaborative learn-ing, privacy-preserving protocols, leakage analysis DOI 10.2478/popets-2021-0043 Received 2020-11-30; revised 2021-03-15; accepted 2021 …
PoPETs Proceedings — Falcon: Honest-Majority Maliciously Secure ...
Volume: 2021 Issue: 1 Pages: 188–208 DOI: Download PDF Abstract: We propose Falcon, an end-to-end 3-party protocol for efficient private training and inference of large machine learning models.
Efficient homomorphic evaluation of k-NN classifiers
Authors: Martin Zuber (CEA, LIST), Renaud Sirdey (CEA, LIST) Volume: 2021 Issue: 2 Pages: 111–129 DOI: https://doi.org/10.2478/popets-2021-0020 Download PDF Abstract: We design and implement …
Proceedings on Privacy Enhancing Technologies ; 2021 (1):167–187 Mark Abspoel, Daniel Escudero, and Nikolaj Volgushev
Controlled Functional Encryption Revisited: Multi-Authority Extensions ...
Volume: 2021 Issue: 1 Pages: 21–42 DOI: https://doi.org/10.2478/popets-2021-0003 Download PDF Abstract: In a Functional Encryption scheme (FE), a trusted authority enables designated parties to …