Trustworthy information processing


The trustworthy information processing research area target the development of rigorous algorithmic and system approaches to enable a trustworthy and accountable processing of data. Examples include accurate, privacy-friendly data acquisition; secure computation of privacy-sensitive information; rigorous cryptographic operations to ensure a trustworthy behaviour in malicious environments; and developing technical means for holding people accountable in case of misbehavior.


SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks

A promising semantics for relaxed-memory concurrency

Security Analysis of Cache Replacement Policies

Training Fair Classifiers

Uncovering the Spatiotemporal Patterns of Collective Social Activity

Distilling Information Reliability and Source Trustworthiness from Digital Traces

Fairness Beyond Disparate Treatment & Disparate Impact: Learning Classification without Disparate Mistreatment

A privacy-preserving reputation system with user rewards

State Space Search Nogood Learning: Online Refinement of Critical-Path Dead-End Detectors in Planning

Adversarial Image Perturbation for Privacy Protection -- A Game Theory Perspective

A Domain Based Approach to Social Relation Recognition

Speaking the Same Language: Matching Machine to Human Captions by Adversarial Training

Two Message Oblivious Evaluation of Cryptographic Functionalities

T3: Comprehensive policy compliance in data retrieval systems

RamCrypt: Kernel-based Address Space Encryption for User-mode Processes

How to Make ASLR Win the Clone Wars: Runtime Re-Randomization

Attributbasierte Verschlüsselung für die Justiz

Ersetzendes Scannen - Kernelement im Gesamtkonzept einer elektronischen Aktenführung?

Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys

Estimating Diffusion Networks: Recovery Conditions, Sample Complexity & Soft-thresholding Algorithm

Smart Mobility für das Saarland: Identifikation von Chancen und Handlungsempfehlungen für eine digital vernetzte Mobilität

Confidentiality and Authenticity for Distributed Version Control Systems — A Mercurial Extension

Goal Probability Analysis in Probabilistic Planning: Exploring and Enhancing the State of the Art

Practical Undoability Checking via Contingent Planning

Partial Delete Relaxation, Unchained: On Intractable Red-Black Planning and Its Applications

Loss Functions for Top-k Error: Analysis and Insights

On the Wisdom of Experts vs. Crowds: Discovering Trustworthy Topical News in Microblogs

Distinguishing between Topical and Non-Topical Information Diffusion Mechanisms in Social Media

Message Impartiality in Social Media Discussions

Dissemination Biases of Social Media Channels: On the Topical Coverage of Socially Shared News

Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data

On the Efficiency of the Information Networks in Social Media

Strengthening Weak Identities Through Inter-Domain Trust Transfer

Runtime Verification for HyperLTL

Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

Foundations of Reconfigurable PUFs

PriCL: Creating a Precedent. A Framework for Reasoning about Privacy Case Law

How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data

Fully Secure Inner-Product Proxy Re-Encryption with constant size Ciphertext

Data Lineage in Malicious Environments

Privacy Preserving Payments in Credit Networks

Quantifying Information Flow in Cryptographic Systems