How to Get Actual Privacy and Utility from Privacy Models: the k-Anonymity and Differential Privacy Families
Josep Domingo-Ferrer, David S\'anchez
https://arxiv.org/abs/2510.11299
The Speaker of the House and his son monitor each other's porn usage (no, I'm not kidding) which poses a very real cyber threat to national security.
Faith-based content filers mean very real diminished digital security for those who use them.
https://stuff.davidaugust.com/securing
DH-EAC: Design of a Dynamic, Hierarchical Entanglement Access Control Protocol
Akihisa Takahashi, Yoshito Tobe
https://arxiv.org/abs/2510.02895 https://arx…
Lattice-Based Dynamic $k$-times Anonymous Authentication
Junjie Song, Jinguang Han, Man Ho Au, Rupeng Yang, Chao Sun
https://arxiv.org/abs/2509.21786 https://
Content Anonymization for Privacy in Long-form Audio
Cristina Aggazzotti, Ashi Garg, Zexin Cai, Nicholas Andrews
https://arxiv.org/abs/2510.12780 https://a…