際際滷shows by User: ikron / http://www.slideshare.net/images/logo.gif 際際滷shows by User: ikron / Wed, 15 Feb 2017 12:59:15 GMT 際際滷Share feed for 際際滷shows by User: ikron APF2015-slides-general /slideshow/apf2015slidesgeneral/72179631 17c517e8-282e-4b9f-b3a6-96279abdbc3b-170215125916
]]>

]]>
Wed, 15 Feb 2017 12:59:15 GMT /slideshow/apf2015slidesgeneral/72179631 ikron@slideshare.net(ikron) APF2015-slides-general ikron <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/17c517e8-282e-4b9f-b3a6-96279abdbc3b-170215125916-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
APF2015-slides-general from Ioannis Krontiris
]]>
250 3 https://cdn.slidesharecdn.com/ss_thumbnails/17c517e8-282e-4b9f-b3a6-96279abdbc3b-170215125916-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing /slideshow/privacyrespecting-auctions-as-incentive-mechanisms-in-mobile-crowd-sensing/51995123 wistp15-auctions-150824092652-lva1-app6891
In many mobile crowdsensing scenarios it is desirable to give micro-payments to contributors as an incentive for their participation. However, to further encourage participants to use the system, one important requirement is protection of user privacy. In this work we present a reverse auction mechanism as an efficient way to offer incentives to users by allowing them to determine their own price for the data they provide, but also as a way to motivate them to submit better quality data. At the same time our auction protocol guarantees bidders anonymity and suggests a new rewarding mechanism that enables winners to claim their reward without being linked to the data they contributed. Our protocol is scalable, can be applied to a large class of auctions and remains both computation- and communication-efficient so that it can be run to the mobile devices of users. Full paper: T. Dimitriou, I. Krontiris, "Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing", the 9th WISTP International Conference on Information Security Theory and Practice (WISTP 2015), 24-25 August 2015, Heraklion, Crete, Greece.]]>

In many mobile crowdsensing scenarios it is desirable to give micro-payments to contributors as an incentive for their participation. However, to further encourage participants to use the system, one important requirement is protection of user privacy. In this work we present a reverse auction mechanism as an efficient way to offer incentives to users by allowing them to determine their own price for the data they provide, but also as a way to motivate them to submit better quality data. At the same time our auction protocol guarantees bidders anonymity and suggests a new rewarding mechanism that enables winners to claim their reward without being linked to the data they contributed. Our protocol is scalable, can be applied to a large class of auctions and remains both computation- and communication-efficient so that it can be run to the mobile devices of users. Full paper: T. Dimitriou, I. Krontiris, "Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing", the 9th WISTP International Conference on Information Security Theory and Practice (WISTP 2015), 24-25 August 2015, Heraklion, Crete, Greece.]]>
Mon, 24 Aug 2015 09:26:52 GMT /slideshow/privacyrespecting-auctions-as-incentive-mechanisms-in-mobile-crowd-sensing/51995123 ikron@slideshare.net(ikron) Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing ikron In many mobile crowdsensing scenarios it is desirable to give micro-payments to contributors as an incentive for their participation. However, to further encourage participants to use the system, one important requirement is protection of user privacy. In this work we present a reverse auction mechanism as an efficient way to offer incentives to users by allowing them to determine their own price for the data they provide, but also as a way to motivate them to submit better quality data. At the same time our auction protocol guarantees bidders anonymity and suggests a new rewarding mechanism that enables winners to claim their reward without being linked to the data they contributed. Our protocol is scalable, can be applied to a large class of auctions and remains both computation- and communication-efficient so that it can be run to the mobile devices of users. Full paper: T. Dimitriou, I. Krontiris, "Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing", the 9th WISTP International Conference on Information Security Theory and Practice (WISTP 2015), 24-25 August 2015, Heraklion, Crete, Greece. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/wistp15-auctions-150824092652-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In many mobile crowdsensing scenarios it is desirable to give micro-payments to contributors as an incentive for their participation. However, to further encourage participants to use the system, one important requirement is protection of user privacy. In this work we present a reverse auction mechanism as an efficient way to offer incentives to users by allowing them to determine their own price for the data they provide, but also as a way to motivate them to submit better quality data. At the same time our auction protocol guarantees bidders anonymity and suggests a new rewarding mechanism that enables winners to claim their reward without being linked to the data they contributed. Our protocol is scalable, can be applied to a large class of auctions and remains both computation- and communication-efficient so that it can be run to the mobile devices of users. Full paper: T. Dimitriou, I. Krontiris, &quot;Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing&quot;, the 9th WISTP International Conference on Information Security Theory and Practice (WISTP 2015), 24-25 August 2015, Heraklion, Crete, Greece.
Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing from Ioannis Krontiris
]]>
708 12 https://cdn.slidesharecdn.com/ss_thumbnails/wistp15-auctions-150824092652-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Trustworthy Infrastructure for Personal Data Management /slideshow/def2013-krontiris/43320455 def2013krontiris-150108083430-conversion-gate01
Invited presentation given at Digital Enlightenment Forum 2013, Brussels, 18-20 Sept. 2013 Programme Comittee: Jacques Bus (SG DEF), Chair Harry Halpin (W3C, INRIA) Kaliya Hamlin (PDE Consortium) Carolyn Nguyen (Microsoft) Kai Rannenberg (Goethe Univ, Frankfurt)]]>

Invited presentation given at Digital Enlightenment Forum 2013, Brussels, 18-20 Sept. 2013 Programme Comittee: Jacques Bus (SG DEF), Chair Harry Halpin (W3C, INRIA) Kaliya Hamlin (PDE Consortium) Carolyn Nguyen (Microsoft) Kai Rannenberg (Goethe Univ, Frankfurt)]]>
Thu, 08 Jan 2015 08:34:30 GMT /slideshow/def2013-krontiris/43320455 ikron@slideshare.net(ikron) Trustworthy Infrastructure for Personal Data Management ikron Invited presentation given at Digital Enlightenment Forum 2013, Brussels, 18-20 Sept. 2013 Programme Comittee: Jacques Bus (SG DEF), Chair Harry Halpin (W3C, INRIA) Kaliya Hamlin (PDE Consortium) Carolyn Nguyen (Microsoft) Kai Rannenberg (Goethe Univ, Frankfurt) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/def2013krontiris-150108083430-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Invited presentation given at Digital Enlightenment Forum 2013, Brussels, 18-20 Sept. 2013 Programme Comittee: Jacques Bus (SG DEF), Chair Harry Halpin (W3C, INRIA) Kaliya Hamlin (PDE Consortium) Carolyn Nguyen (Microsoft) Kai Rannenberg (Goethe Univ, Frankfurt)
Trustworthy Infrastructure for Personal Data Management from Ioannis Krontiris
]]>
590 4 https://cdn.slidesharecdn.com/ss_thumbnails/def2013krontiris-150108083430-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ABC4Trust Architecture and the Benefits for eID Schemes /slideshow/abc4trust-architecture-and-the-benefits-for-eid-schemes/43320385 cspkrontiris-150108083235-conversion-gate02
Invited presentation given at Cyber Security & Privacy EU Forum 2013]]>

Invited presentation given at Cyber Security & Privacy EU Forum 2013]]>
Thu, 08 Jan 2015 08:32:35 GMT /slideshow/abc4trust-architecture-and-the-benefits-for-eid-schemes/43320385 ikron@slideshare.net(ikron) ABC4Trust Architecture and the Benefits for eID Schemes ikron Invited presentation given at Cyber Security & Privacy EU Forum 2013 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cspkrontiris-150108083235-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Invited presentation given at Cyber Security &amp; Privacy EU Forum 2013
ABC4Trust Architecture and the Benefits for eID Schemes from Ioannis Krontiris
]]>
891 2 https://cdn.slidesharecdn.com/ss_thumbnails/cspkrontiris-150108083235-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Integrating Anonymous Credentials with eIDs 鐃for Privacy-respecting Online Authentication /ikron/apf-krontiris apfkrontiris-150108082704-conversion-gate01
Download paper: http://www.ioanniskrontiris.de/publications/DEF-FORUM2012-eIDs.pdf Electronic Identity (eID) cards are rapidly emerging in Europe and are gaining user acceptance. As an authentication token, an eID card is a gateway to personal information and as such it is subject to privacy risks. Several European countries have taken extra care to protect their citizens against these risks. A notable example is the German eID card, which we take as a case study in this paper. We first discuss important privacy and security threats that remain in the German eID system and elaborate on the advantages of using privacy attribute-based credentials (Privacy-ABCs) to address these threats. Then we study two approaches for integrating Privacy-ABCs with eID systems. In the first approach, we show that by introducing a new entity in the current German eID system, the citizen can get a lot of the Privacy-ABCs advantages, without further modifications. Then we concentrate on putting Privacy-ABCs directly on smart cards, and we present new results on performance, which demonstrate that it is now feasible for smart cards to support the required computations these mechanisms require.]]>

Download paper: http://www.ioanniskrontiris.de/publications/DEF-FORUM2012-eIDs.pdf Electronic Identity (eID) cards are rapidly emerging in Europe and are gaining user acceptance. As an authentication token, an eID card is a gateway to personal information and as such it is subject to privacy risks. Several European countries have taken extra care to protect their citizens against these risks. A notable example is the German eID card, which we take as a case study in this paper. We first discuss important privacy and security threats that remain in the German eID system and elaborate on the advantages of using privacy attribute-based credentials (Privacy-ABCs) to address these threats. Then we study two approaches for integrating Privacy-ABCs with eID systems. In the first approach, we show that by introducing a new entity in the current German eID system, the citizen can get a lot of the Privacy-ABCs advantages, without further modifications. Then we concentrate on putting Privacy-ABCs directly on smart cards, and we present new results on performance, which demonstrate that it is now feasible for smart cards to support the required computations these mechanisms require.]]>
Thu, 08 Jan 2015 08:27:04 GMT /ikron/apf-krontiris ikron@slideshare.net(ikron) Integrating Anonymous Credentials with eIDs 鐃for Privacy-respecting Online Authentication ikron Download paper: http://www.ioanniskrontiris.de/publications/DEF-FORUM2012-eIDs.pdf Electronic Identity (eID) cards are rapidly emerging in Europe and are gaining user acceptance. As an authentication token, an eID card is a gateway to personal information and as such it is subject to privacy risks. Several European countries have taken extra care to protect their citizens against these risks. A notable example is the German eID card, which we take as a case study in this paper. We first discuss important privacy and security threats that remain in the German eID system and elaborate on the advantages of using privacy attribute-based credentials (Privacy-ABCs) to address these threats. Then we study two approaches for integrating Privacy-ABCs with eID systems. In the first approach, we show that by introducing a new entity in the current German eID system, the citizen can get a lot of the Privacy-ABCs advantages, without further modifications. Then we concentrate on putting Privacy-ABCs directly on smart cards, and we present new results on performance, which demonstrate that it is now feasible for smart cards to support the required computations these mechanisms require. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/apfkrontiris-150108082704-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Download paper: http://www.ioanniskrontiris.de/publications/DEF-FORUM2012-eIDs.pdf Electronic Identity (eID) cards are rapidly emerging in Europe and are gaining user acceptance. As an authentication token, an eID card is a gateway to personal information and as such it is subject to privacy risks. Several European countries have taken extra care to protect their citizens against these risks. A notable example is the German eID card, which we take as a case study in this paper. We first discuss important privacy and security threats that remain in the German eID system and elaborate on the advantages of using privacy attribute-based credentials (Privacy-ABCs) to address these threats. Then we study two approaches for integrating Privacy-ABCs with eID systems. In the first approach, we show that by introducing a new entity in the current German eID system, the citizen can get a lot of the Privacy-ABCs advantages, without further modifications. Then we concentrate on putting Privacy-ABCs directly on smart cards, and we present new results on performance, which demonstrate that it is now feasible for smart cards to support the required computations these mechanisms require.
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Authentication from Ioannis Krontiris
]]>
552 1 https://cdn.slidesharecdn.com/ss_thumbnails/apfkrontiris-150108082704-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Participatory Sensing through Social Networks: The Tension between Participation and Privacy /slideshow/itwdc-2010/5139983 itwdc2010-100906125321-phpapp01
This paper corresponds to publication: I. Krontiris, F.C. Freiling, "Urban Sensing through Social Networks: The Tension between Participation and Privacy", International Tyrrhenian Workshop on Digital Communications (ITWDC), Island of Ponza, Italy, September 2010. https://pi1.informatik.uni-mannheim.de/filepool/publications/ITWDC_2010.pdf ]]>

This paper corresponds to publication: I. Krontiris, F.C. Freiling, "Urban Sensing through Social Networks: The Tension between Participation and Privacy", International Tyrrhenian Workshop on Digital Communications (ITWDC), Island of Ponza, Italy, September 2010. https://pi1.informatik.uni-mannheim.de/filepool/publications/ITWDC_2010.pdf ]]>
Mon, 06 Sep 2010 12:53:14 GMT /slideshow/itwdc-2010/5139983 ikron@slideshare.net(ikron) Participatory Sensing through Social Networks: The Tension between Participation and Privacy ikron This paper corresponds to publication: I. Krontiris, F.C. Freiling, "Urban Sensing through Social Networks: The Tension between Participation and Privacy", International Tyrrhenian Workshop on Digital Communications (ITWDC), Island of Ponza, Italy, September 2010. https://pi1.informatik.uni-mannheim.de/filepool/publications/ITWDC_2010.pdf <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/itwdc2010-100906125321-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This paper corresponds to publication: I. Krontiris, F.C. Freiling, &quot;Urban Sensing through Social Networks: The Tension between Participation and Privacy&quot;, International Tyrrhenian Workshop on Digital Communications (ITWDC), Island of Ponza, Italy, September 2010. https://pi1.informatik.uni-mannheim.de/filepool/publications/ITWDC_2010.pdf
Participatory Sensing through Social Networks: The Tension between Participation and Privacy from Ioannis Krontiris
]]>
1158 3 https://cdn.slidesharecdn.com/ss_thumbnails/itwdc2010-100906125321-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Participatory Sensing through Social Networks /slideshow/integrating-peoplecentric-sensing-with-social-networks-a-privacy-research-agenda/4675834 talk-100704063609-phpapp02
Paper "Integrating PeopleCentric Sensing with Social Networks A privacy research agenda" presented at IEEE International Workshop on SECurity and SOCial Networking (SESOC) held with PerCom 2010 in Mannheim, Germany, March 29th, 2010 https://pi1.informatik.uni-mannheim.de/filepool/publications/2010_SeSoc_UrbanSensingPrivacy.pdf]]>

Paper "Integrating PeopleCentric Sensing with Social Networks A privacy research agenda" presented at IEEE International Workshop on SECurity and SOCial Networking (SESOC) held with PerCom 2010 in Mannheim, Germany, March 29th, 2010 https://pi1.informatik.uni-mannheim.de/filepool/publications/2010_SeSoc_UrbanSensingPrivacy.pdf]]>
Sun, 04 Jul 2010 06:35:59 GMT /slideshow/integrating-peoplecentric-sensing-with-social-networks-a-privacy-research-agenda/4675834 ikron@slideshare.net(ikron) Participatory Sensing through Social Networks ikron Paper "Integrating PeopleCentric Sensing with Social Networks A privacy research agenda" presented at IEEE International Workshop on SECurity and SOCial Networking (SESOC) held with PerCom 2010 in Mannheim, Germany, March 29th, 2010 https://pi1.informatik.uni-mannheim.de/filepool/publications/2010_SeSoc_UrbanSensingPrivacy.pdf <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/talk-100704063609-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Paper &quot;Integrating PeopleCentric Sensing with Social Networks A privacy research agenda&quot; presented at IEEE International Workshop on SECurity and SOCial Networking (SESOC) held with PerCom 2010 in Mannheim, Germany, March 29th, 2010 https://pi1.informatik.uni-mannheim.de/filepool/publications/2010_SeSoc_UrbanSensingPrivacy.pdf
Participatory Sensing through Social Networks from Ioannis Krontiris
]]>
778 4 https://cdn.slidesharecdn.com/ss_thumbnails/talk-100704063609-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-ikron-48x48.jpg?cb=1621667360 http://ioanniskrontiris.de Specialties: Online Privacy, Privacy in Internet of Things, Identity Management, Privacy-Enhancing Technologies (PETs), Privacy in Electronic Identification and eIDs, Privacy in Cyber-Physical Systems, Location Privacy, Big Data, and Human Aspects of Information Privacy. What's new? The ABC4Trust book is now published. You can get a copy at the ABC4Trust Summit Event in Brussels, January 20, 2015. I will be serving as a Technical Program Committee member of the IEEE Globecom 2015, which is is one of two flagship conferences of the IEEE Communications Society (ComSoc). I recently gave a presentation at the IAPP Europe Data Protection Congress 2014 in Bru www.ioanniskrontiris.de https://cdn.slidesharecdn.com/ss_thumbnails/17c517e8-282e-4b9f-b3a6-96279abdbc3b-170215125916-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/apf2015slidesgeneral/72179631 APF2015-slides-general https://cdn.slidesharecdn.com/ss_thumbnails/wistp15-auctions-150824092652-lva1-app6891-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/privacyrespecting-auctions-as-incentive-mechanisms-in-mobile-crowd-sensing/51995123 Privacy-respecting Auc... https://cdn.slidesharecdn.com/ss_thumbnails/def2013krontiris-150108083430-conversion-gate01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/def2013-krontiris/43320455 Trustworthy Infrastruc...