Follow
Nataliia Bielova
Nataliia Bielova
Permanent Researcher (CRCN) at Inria Sophia Antipolis
Verified email at inria.fr - Homepage
Title
Cited by
Cited by
Year
Do cookie banners respect my choice?: Measuring legal compliance of banners from iab europe’s transparency and consent framework
C Matte, N Bielova, C Santos
2020 IEEE Symposium on Security and Privacy (SP), 791-809, 2020
2562020
Browser fingerprinting: A survey
P Laperdrix, N Bielova, B Baudry, G Avoine
ACM Transactions on the Web (TWEB) 14 (2), 1-33, 2020
2062020
Dark patterns and the legal requirements of consent banners: An interaction criticism perspective
CM Gray, C Santos, N Bielova, M Toth, D Clifford
Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems …, 2021
1712021
Are cookie banners indeed compliant with the law? Deciphering EU legal requirements on consent and technical means to verify compliance of cookie banners
C Santos, N Bielova, C Matte
Technology and Regulation (TechReg), 91–135, 2020
922020
Crying wolf? on the price discrimination of online airline tickets
T Vissers, N Nikiforakis, N Bielova, W Joosen
7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2014), 2014
922014
Survey on JavaScript security policies and their enforcement mechanisms in a web browser
N Bielova
The Journal of Logic and Algebraic Programming 82 (8), 243-262, 2013
782013
Missed by filter lists: Detecting unknown third-party trackers with invisible pixels
I Fouad, N Bielova, A Legout, N Sarafijanovic-Djukic
Proceedings of Privacy Enhancing Technologies Symposium (PETs) 2, 499–518, 2020
76*2020
Reactive non-interference for a browser model
N Bielova, D Devriese, F Massacci, F Piessens
2011 5th International Conference on Network and System Security, 97-104, 2011
74*2011
Do you really mean what you actually enforced? Edited automata revisited
N Bielova, F Massacci
International Journal of Information Security 10, 239-254, 2011
542011
A taxonomy of information flow monitors
N Bielova, T Rezk
Principles of Security and Trust: 5th International Conference, POST 2016 …, 2016
522016
Predictability of enforcement
N Bielova, F Massacci
International Symposium on Engineering Secure Software and Systems, 73-86, 2011
522011
Hybrid information flow monitoring against web tracking
F Besson, N Bielova, T Jensen
2013 IEEE 26th Computer Security Foundations Symposium, 240-254, 2013
472013
Security analysis of subject access request procedures: How to authenticate data subjects safely when they request for their data
C Boniface, I Fouad, N Bielova, C Lauradoux, C Santos
Privacy Technologies and Policy: 7th Annual Privacy Forum, APF 2019, Rome …, 2019
452019
DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems
C Castelluccia, N Bielova, A Boutet, M Cunche, C Lauradoux, DL Métayer, ...
arXiv preprint arXiv:2008.01621, 2020
442020
To extend or not to extend: on the uniqueness of browser extensions and web logins
GG Gulyas, DF Some, N Bielova, C Castelluccia
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 14-27, 2018
442018
On compliance of cookie purposes with the purpose specification principle
I Fouad, C Santos, F Al Kassar, N Bielova, S Calzavara
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
432020
ROBERT: ROBust and privacy-presERving proximity Tracing
C Castelluccia, N Bielova, A Boutet, M Cunche, C Lauradoux, ...
432020
Consent Management Platforms under the GDPR: processors and/or controllers?
C Santos, M Nouwens, M Toth, N Bielova, V Roca
Annual Privacy Forum, 47-69, 2021
422021
Purposes in IAB Europe’s TCF: which legal basis and how are they used by advertisers?
C Matte, C Santos, N Bielova
Privacy Technologies and Policy: 8th Annual Privacy Forum, APF 2020, Lisbon …, 2020
372020
On the content security policy violations due to the same-origin policy
DF Some, N Bielova, T Rezk
Proceedings of the 26th International Conference on World Wide Web, 877-886, 2017
362017
The system can't perform the operation now. Try again later.
Articles 1–20