CS 858 Reading List
- This reading list contains more papers than what we will be able to read and discuss in class. The actual list of presented papers will be chosen based on people's interests. Feel free to read the remaining papers on your own, like to choose a course project.
- The order in which we will discuss the papers in class will likely not correspond to the order below.
- The PDFs and their abstracts are also available in the bidding system.
- If you try to download a local copy below from a non-uWaterloo host, you will have to authenticate using your WatIAM credentials. You can also download a file with all the papers.
Detecting Privacy Leaks
Managing Privacy Leaks I
Managing Privacy Leaks II
Studying Users and Permissions
Crowdsourcing Permission Expectations
Side-channel and Covert-channel Attacks
New Architectures I
New Architectures II
Privacy-preserving Data Processing
SSL / Cryptography
Last updated: 2013-11-09 13:53:18 -0500