Reading List
Disclaimers:
- This list should be used only for choosing the papers to present (or a
course project). We are not going to read and discuss all listed
papers in class.
- You can download the local copies only from a UW host. You can
also download a file with all the papers.
- The topics are ordered randomly; we will likely discuss them in a
different order in class.
Location Sharing
Location Privacy
Location Proofs
Attacks
Privacy-preserving Computation
Differential Privacy
Privacy
Cloud Computing
Security for Smartphones
Voting Technologies
Security Economics
Security and Privacy Policies
Online Social Networking