Identifying harmful media in {End-to-End} encrypted communication: Efficient private membership computation

A Kulshrestha, J Mayer - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
End-to-end encryption (E2EE) poses a challenge for automated detection of harmful media,
such as child sexual abuse material and extremist content. The predominant approach at …

Protecting Cryptography Against Compelled {Self-Incrimination}

S Scheffler, M Varia - … USENIX Security Symposium (USENIX Security 21 …, 2021 - usenix.org
The information security community has devoted substantial effort to the design,
development, and universal deployment of strong encryption schemes that withstand search …

Foundations for Robust Data Protection: Co-designing Law and Computer Science

K Nissim, A Wood - … Conference on Trust, Privacy and Security …, 2021 - ieeexplore.ieee.org
We argue that the co-design of law and computer science should be a fundamental
component of efforts towards ensuring sociotechnical systems provide adequate protection …

On metadata privacy in instant messaging

MC Domenech, ARA Grégio… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Users metadata collection is a concerning issue related to Instant Messaging (IM) due to the
potential of privacy violation. Even with messages' content encryption, metadata such as …

Decrypting legal dilemmas

SA Scheffler - 2021 - search.proquest.com
It has become a truism that the speed of technological progress leaves law and policy
scrambling to keep up. But in addition to creating new challenges, technological advances …