Article

Systematic Evaluation of Geolocation Privacy Mechanisms
Securing Cloud File Systems using Shielded Execution
EIPSIM: Modeling Secure IP Address Allocation at Cloud Scale
Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices