Identifying harmful media in {End-to-End} encrypted communication: Efficient private membership computation
End-to-end encryption (E2EE) poses a challenge for automated detection of harmful media,
such as child sexual abuse material and extremist content. The predominant approach at …
such as child sexual abuse material and extremist content. The predominant approach at …
Protecting Cryptography Against Compelled {Self-Incrimination}
The information security community has devoted substantial effort to the design,
development, and universal deployment of strong encryption schemes that withstand search …
development, and universal deployment of strong encryption schemes that withstand search …
Foundations for Robust Data Protection: Co-designing Law and Computer Science
We argue that the co-design of law and computer science should be a fundamental
component of efforts towards ensuring sociotechnical systems provide adequate protection …
component of efforts towards ensuring sociotechnical systems provide adequate protection …
On metadata privacy in instant messaging
Users metadata collection is a concerning issue related to Instant Messaging (IM) due to the
potential of privacy violation. Even with messages' content encryption, metadata such as …
potential of privacy violation. Even with messages' content encryption, metadata such as …
Decrypting legal dilemmas
SA Scheffler - 2021 - search.proquest.com
It has become a truism that the speed of technological progress leaves law and policy
scrambling to keep up. But in addition to creating new challenges, technological advances …
scrambling to keep up. But in addition to creating new challenges, technological advances …