Understanding Legal Professionals’ Practices and Expectations in Data Breach Incident ReportingEce GumuselYue Xiaoet al.2024CCS 2024
Password-Protected Key Retrieval with(out) HSM ProtectionSebastian FallerTobias Handirket al.2024CCS 2024
The LaZer Library: Lattice-Based Zero Knowledge and Succinct Proofs for Quantum-Safe PrivacyVadim LyubashevskyGregor Seileret al.2024CCS 2024
A Secure Multiparty Computation Platform for Squeaky-Clean Data RoomsPankaj DayamaVinayaka Panditet al.2024CCS 2024
Enhancing Transparency and Accountability of TPLs with PBOM: A Privacy Bill of MaterialsYue XiaoAdwait Nadkarniet al.2024CCS 2024
Privacy-Preserving Training of Monocular Depth Estimators via Self-Supervised Federated LearningElton Figueiredo de Souza SoaresCarlos Alberto Viera Campos2024VTC Fall 2024
Towards Continual Federated Learning of Monocular Depth for Autonomous VehiclesElton Figueiredo de Souza SoaresCarlos Alberto Viera Campos2024VTC Fall 2024
Disaggregated RDDs: Extending and Analyzing Apache Spark for Memory Disaggregated InfrastructuresAchilleas TzenetopoulosMichele Gazzettiet al.2024IC2E 2024