Privacy Seminar 2015
In this seminar we will explore the state of the art in privacy enhancing
technologies (PET), and discuss theories (technical, legal and
societal) of privacy.
The course code is I00136.
You will do, in groups of two, a small research project on a particular topic, chosen from a list. The idea is to let you first investigate a particular practical case (what are the privacy issues (from a legal and societal perspective), how are they dealt with), and then let you perform some research using particular PETs to solve the problem. You present the results in class as well as writing a student paper on the same topic.
Presence at all lectures is mandatory! (Not present without a valid reason = fail!). Valid reasons are: illness, accident, other study obligation (like exams, study trip), important family events. Invalid reasons are: holidays, trips etc, even if booked before the course started, and many many others.
The final grade = (2*grade for paper + grade for presentation) / 3. If the grade for the paper or the presentation is below 5.5, the lowest grade is the final grade!
PrerequisitesYou should have successfully completed the Cryptography course.
LecturesThe first few lectures will be spent on outlining the course and the area of privacy enhancing technologies. We also have several invited guest lectures. Slides of the lectures will become available after the lecture.
WikiThe course is supported by a wiki, to which all are invited to contribute. You can go the wiki to request an account to get edit rights.
DeadlinesThe paper skeleton must be submitted on or before May 15. Deadline for the final paper is June 19.
- Jaap-Henk Hoepman and Marc van Lieshout: "Privacy". Chapter of a book.
- G. Danezis et. al., Privacy and Data Protection by Design, ENISA Report, december 2014.
- Slides of the first two lectures (see schedule below).
- The Privacy Wiki
Schedule (spring 2015)Lectures take place from 13:30 to 15:15 in room HG00.108. We start at 13:30 sharp! Slides of presentations that are available are linked from here. The links are released after the lecture.
Please note that this is a seminar. Therefore the classes are not taught as a video lecture!
|February 6||"Course overview", and "Legal perspective", by Merel Koning.|
|February 13||"Privacy: an overview" by Jaap-Henk Hoepman|
|February 20||Basic techniques, by Jaap-Henk Hoepman.|
|February 27||Data protection law and online marketing, Frederik Zuiderveen Borgesius, UvA|
|March 6||Privacy as Opportunity, Marc van Lieshout, TNO|
|March 13||Martijn Terpstra, Marc Tijssen:Anonymous communication|
|March 20||Yazan Badin, Herson Esquivel: Censorship prevention|
|March 27||Guest lecture Ian Goldberg on Ibis: An Overlay Mix Network for Microblogging.|
|April 3||(no lecture)|
|April 10||(no lecture)|
|April 17||Bart Smits, Maikel Zweerink, Bas van der Zandt: Identity management|
|April 24||Manon de Vries, Wouter Bokslag: Electronic voting|
|May 1||(no lecture)|
|May 8||(no lecture)|
|May 15||(no lecture)||Deadline paper skeleton|
|May 22||(no lecture)|
|May 29||Vincent de Jager, Wouter van der Houven: Profiling|
|June 5||Judith van Stegeren, Robert Kleinpenning: Social Networks|
|June 12||Dibi Tamunomiebaka, Sandip Pandey: Cloud computing|
|June 19||Le van Huyrh, Patrick Verleg: search engine privacy||Deadline student paper|
Last Version -
(Note: changeover from CVS to dotless svn version numbers on Jan 19, 2008, and changeover to GIT versioning on May 30, 2013.)
Maintained by Jaap-Henk Hoepman