Digital Privacy Research Papers

Terminology

Link Boussada, R., Elhdhili, M. E., & Saidane, L. A. (2016, November). A survey on privacy: Terminology, mechanisms and attacks. In 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA) (pp. 1-7). IEEE.

Link A. Cooper, H. Tschofenig, B. Aboba, Privacy Considerations for Internet Protocols, Internet Architecture Board (IAB) (July 2013)

Formal Methods

Link Hirschi, L., Baelde, D., & Delaune, S. (2016, May). A method for verifying privacy-type properties: the unbounded case. In 2016 IEEE Symposium on Security and Privacy (SP) (pp. 564-581). IEEE.

Link Baelde, D., Delaune, S., & Moreau, S. (2020, June). A method for proving unlinkability of stateful protocols. In 2020 IEEE 33rd Computer Security Foundations Symposium (CSF) (pp. 169-183). IEEE.

Survey/SOK Paper

Link Alqassem, I., & Svetinovic, D. (2014, December). A taxonomy of security and privacy requirements for the Internet of Things (IoT). In 2014 IEEE International Conference on Industrial Engineering and Engineering Management (pp. 1244-1248). IEEE.

Link Ernstberger, J., Lauinger, J., Elsheimy, F., Zhou, L., Steinhorst, S., Canetti, R., ... & Song, D. (2023). SoK: Data Sovereignty. Cryptology ePrint Archive.

Link Squillace, J., & Bantan, M. (2022, June). A Taxonomy of Privacy, Trust, and Security Breach Incidents of Internet-of-Things Linked to F (M). AANG Corporations. In 2022 IEEE World AI IoT Congress (AIIoT) (pp. 591-596). IEEE.

Link Shaikh, R. A., Lee, H., & Lee, S. (2010). Privacy and trust management schemes of wireless sensor networks: A survey. In Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice (pp. 290-309). IGI Global.

Link Alsamani, B., & Lahza, H. (2018, March). A taxonomy of IoT: Security and privacy threats. In 2018 International Conference on Information and Computer Technologies (ICICT) (pp. 72-77). IEEE.