DPM 2013 Program
Thursday September 12, Morning
08:00 - 09:00 Registration
09:00 - 09:30 General Welcome
Windsor Building, Main Auditorium09:30 - 10:30 Invited Lecture 1
Windsor Building, Main Auditorium-
Quantifying Privacy and Anonymity (slides)
By Steven J. Murdoch (University of Cambridge)
10:30 - 11:00 Tea/Coffee Break
11:00 - 13:00 Session 1: Privacy-enhancing Technologies
Room: 0-04, Chair: Joaquin Garcia-Alfaro-
11:00-11:25 Collaborative and privacy-aware sensing for observing urban movement patterns. (slides)
By Nelson Goncalves, Rui Jose and Carlos Baquero. -
11:25-11:50 AppGuard - Fine-grained Policy Enforcement for Untrusted Android Applications
By Michael Backes, Sebastian Gerling, Christian Hammer, Matteo Maffei and Philipp von Styp-Rekowsky. -
11:50-12:15 Privacy-Preserving Processing of Raw Genomic Data (slides)
By Erman Ayday, Jean Louis Raisaro, Urs Hengartner, Adam Molyneaux and Jean-Pierre Hubaux. -
12:15-12:40 Using search results to microaggregate query logs semantically (slides)
By Arnau Erola and Jordi Castella-Roca. -
12:40-13:00 Dynamic anonymous index for confidential data (Short Paper) (slides)
By Guillermo Navarro-Arribas, Daniel Abril and Vicenc Torra.
13:00 - 14:00 Lunch
Thursday September 12, Afternoon
14:00 - 15:40 Session 2: Cryptographic solutions for privacy)
Room: 0-04, Chair: Guillermo Navarro-Arribas-
14:00-14:25 Privacy-Preserving Multi-Party Reconciliation Secure in the
Malicious Model (slides)
By Georg Neugebauer, Lucas Brutschy, Ulrike Meyer and Susanne Wetzel. -
14:25-14:50 Parallel Implementation of GC-Based MPC Protocols in the
Semi-Honest Setting (slides)
By Mauro Barni, Massimo Bernaschi, Riccardo Lazzeretti, Tommaso Pignata and Alessandro Sabellico. -
14:50-15:15 Privacy-preserving trust management mechanisms from private
matching schemes (Short Paper) (slides)
By Oriol Farras, Josep Domingo-Ferrer and Alberto Blanco-Justicia. -
15:15-15:40 Practical Packing Method in Somewhat Homomorphic Encryption (slides)
By Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba.
15:40 - 16:15 Tea/Coffee Break
16:15 - 17:15 Invited Lecture 2 (Room 1-03)
Room: 1-03, Windsor Building-
Title: Pervasive Autonomous Systems: Challenges in Policy-based Adaptation and Security
By Emil Lupu (Imperial College London)
19:00 - 20:00 Pre-dinner Drinks
20:00 - 23:00 Workshop Dinner
Friday September 13, Morning
09:00 - 10:30 Invited Lecture 3
Room: 0-04, Windsor Building-
Privacy by Design, Haute Couture or Ready to Wear? (slides)
By John Borking (Boking Consultancy)
10:30 - 11:00 Tea/Coffee Break
11:00 - 12:55 Session 3: Emerging Challenges
Room: 0-04, Chair: Georgios Lioudakis-
11:00-11:25 Legal Issues about Metadata: Data Privacy vs Information Security (slides)
By Manuel Munier, Vincent Lalanne, Pierre-Yves Ardoy and Magali Ricarde. -
11:25-11:50 Differentially Private Smart Metering with Battery Recharging
By Sebastian Meiser and Michael Backes. -
11:50-12:15 Privacy Analysis of a Hidden Friendship Protocol (slides)
By Florian Kammueller and Soeren Preibusch. -
12:15-12:35 Are On-Line Personae Really Unlinkable?
(Short Paper) (slides)
By Meilof Veeningen, Antonio Piepoli and Nicola Zannone. -
12:35-12:55 On the Privacy of Private Browsing - A
Forensic Approach (Short Paper) (slides)
By Kiavash Satvat, Matthew Forshaw, Feng Hao and Ehsan Toreini.
12:55 - 14:00 Lunch
Friday September 13, Afternoon
14:00 - 15:35 Session 4: Protocols and Applications
Room: 0-04, Chair: Maryline Laurent-
14:00-14:25 Privacy-Preserving Publish/Subscribe: Efficient Protocols in a
Distributed Model. (slides)
By Giovanni Di Crescenzo, Brian Coan, John Schultz, Simon Tsang and Rebecca N. Wright. -
14:25-14:50 Anonymous and Transferable Electronic Ticketing Scheme (slides)
By Arnau Vives-Guasch, M. Magdalena Payeras-Capella, Macia Mut-Puigserver, Jordi Castella-Roca and Josep-Lluis Ferrer-Gomila. -
14:50-15:15 Performance Evaluation of Primitives for Privacy-Enhancing
Cryptography on Current Smart-cards and Smart-phones (slides)
By Jan Hajny, Lukas Malina and Ondrej Tethal. -
15:15-15:35 A Simulation of Document Detection Methods and Reducing False Positives for Private Stream Searching. (Short Paper) (slides)
By Michael Oehler and Dhananjay Phatak.