37 Hits in 5.2 sec

Ensuring Security and Privacy Preservation for Cloud Data Services

Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, Rajkumar Buyya
2016 ACM Computing Surveys  
However, under open networks and not fully trusted cloud environments, they face enormous security and privacy risks (e.g., data leakage or disclosure, data corruption or loss, and user privacy breach)  ...  Recently, several studies were conducted to address these risks, and a series of solutions were proposed to enable data and privacy protection in untrusted cloud environments.  ...  breach Privacy preservability Privacy preservation data access Access Pattern Protection Table III .  ... 
doi:10.1145/2906153 fatcat:c57iz6lswvfxbmhireksha35vm

Public Key Encryption with Keyword Search in Cloud: A Survey

Yunhong Zhou, Na Li, Yanmei Tian, Dezhi An, Licheng Wang
2020 Entropy  
However, how to search over encrypted data becomes a concern for users.  ...  Moreover, we propose some potential applications and valuable future research directions in PEKS.  ...  We write PP for predicate privacy, SP for statistics privacy and CPA for choose plaintext attack.  ... 
doi:10.3390/e22040421 pmid:33286195 pmcid:PMC7516898 fatcat:qovvzpdonnbd5bswb7j7q5igiq

Specification Of Security Enablers For Data Management

Marko Vukolic
2016 Zenodo  
Finally, the third part describes advanced data security components, focusing, in particular on data privacy techniques.  ...  Namely, Chapter 3 discusses how to treat non-determinism when replicating arbitrary applications when replicas can fail in an arbitrary (i.e., Byzantine) way.  ...  Based on (hash) ElGamal, Blaze et al.  ... 
doi:10.5281/zenodo.263831 fatcat:ksk4ze2tuncfbexjzsorjnoabe

Revocable identity-based proxy re-signature against signing key exposure

Xiaodong Yang, Chunlin Chen, Tingchun Ma, Jinli Wang, Caifen Wang, Muhammad Khurram Khan
2018 PLoS ONE  
Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems.  ...  As a result, IDPRS eliminates the requirement for certificates and simplifies key management, but challenges still remain to be addressed in practical applications.  ...  Acknowledgments The authors would like to thank anonymous reviewers for their constructive suggestions. Author Contributions Data curation: Chunlin Chen, Jinli Wang. Formal analysis: Caifen Wang.  ... 
doi:10.1371/journal.pone.0194783 pmid:29579125 pmcid:PMC5868864 fatcat:xj7twrns3fd5fd4oboac24v36q

On Lattice-Based Signatures with Advanced Functionalities

Nabil Alkeilani Alkadri
While ordinary signature schemes based on lattices are ready to be deployed in practice, this statement cannot be made for lattice-based signature schemes with advanced functionalities.  ...  With focus on privacy-preserving applications in future computing environments, we particularly facilitate the protection of secret keys in cryptocurrencies such [...]  ...  BLAZE: Practical lattice-based blind signatures for privacy-preserving applications.  ... 
doi:10.26083/tuprints-00020793 fatcat:qpxpmsn32jdh3astw66cf63uzm

Information-flow types for homomorphic encryptions

Cédric Fournet, Jérémy Planul, Tamara Rezk
2011 Proceedings of the 18th ACM conference on Computer and communications security - CCS '11  
Our rules enable encryption, blinding, homomorphic computation, and decryption, with selective key re-use for different types of payloads.  ...  We provide a prototype typechecker for our system.  ...  Acknowledgments We thank Martín Abadi, Anupam Datta, Markulf Kohlweiss, Nikhil Swamy, and the anonymous reviewers for their comments.  ... 
doi:10.1145/2046707.2046747 dblp:conf/ccs/FournetPR11 fatcat:zxpcuvctdncbhc5tfmwisr23fq

A Survey of Provably Secure Searchable Encryption

Christoph Bösch, Pieter Hartel, Willem Jonker, Andreas Peter
2014 ACM Computing Surveys  
We observe that in multirecipient SE schemes, regardless of their efficiency drawbacks, there is a noticeable lack of query expressiveness that hinders deployment in practice.  ...  Meanwhile, PEKS is also used as a name for the class of M/S schemes. The need for key distribution. Some SE schemes extend the * /S setting to allow multiuser reading ( * /M).  ...  ACKNOWLEDGMENTS The authors would like to thank Luan Ibraimi, Arjan Jeckmans, Eleftheria Makri, and the anonymous reviewers for their insightful comments.  ... 
doi:10.1145/2636328 fatcat:3ho3qfcufjhopgigvlvh7qwkem

Security policies [chapter]

Ross Anderson, Frank Stajano, Jong-Hyeon Lee
2002 Advances in Computers  
It is a means for designers, domain experts and implementers to communicate with each other, and a blueprint that drives a project from design through implementation and validation.  ...  Portions of this chapter will appear in Ross Anderson's book Security Engineering [8] , to which the reader should refer for more detail.  ...  Acknowledgements The authors are grateful to Jeremy Epstein, Virgil Gligor, Paul Karger, Ira Moskowitz, Marv Schaefer, Rick Smith, Karen Spärck Jones and Simon Wiseman for helpful discussions.  ... 
doi:10.1016/s0065-2458(01)80030-9 fatcat:a6mybpml3zcxxm4diujbp3epre

Light-emitting metasurfaces

Aleksandr Vaskin, Radoslaw Kolkowski, A. Femius Koenderink, Isabelle Staude
2019 Nanophotonics  
Because of their low absorption losses, additional possibilities for emitter integration, and compatibility with semiconductor-based light-emitting devices, all-dielectric systems are promising for highly  ...  Furthermore, a flurry of new emission phenomena are expected based on their multipolar resonant response.  ...  The work of RK and AFK is part of the research programme "Hybrid Nanophotonic Architectures for Ultrafast Quantum Optics" with project number 680.47.621, and the research programme "Nanophotonics for Solid-state  ... 
doi:10.1515/nanoph-2019-0110 fatcat:eez4efqmlvclfn6p6p2rpxiaau

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+70 others)
2015 International Journal of Network Security   unpublished
In most reasonable applications of OT, the transferred messages must be recognizable for the receiver or the sender is willing to disclose some messages to the receiver.  ...  The authors gratefully acknowledge the anonymous reviewers for their valuable comments. Acknowledgement We would like to thank the anonymous reviewers for their valuable comments and suggestions.  ...  Acknowledgments Acknowledgments The authors thank the editors and the anonymous referees for their valuable comments and suggestions. This  ... 

JSE 34:2 Summer 2020 Whole Issue PDF

Kathleen E Erickson
2020 Journal of Scientific Exploration  
We also thank Jim Kennedy for his pre-registration supervision, and the English revision by Cinzia Evangelista in Melbourne, Australia.  ...  a practical application of this phenomenon.  ...  loss of mental privacy.  ... 
doi:10.31275/20201867 fatcat:4cps7pc5dzgf3j2hnxiibi7gim

Efficient and Secure Data Sharing Using Attribute-based Cryptography [article]

The second part of this thesis presents a new lightweight secure data sharing scheme based on attribute-based cryptography for a specific IoTbased healthcare application.  ...  The proposed E-IPPRE scheme requires constant pairing operations for its algorithms and ensures a short size of the public key, private key, and ciphertext, making it the most efficient and practical compared  ...  practical applications.  ... 
doi:10.13130/sepehri-masoomeh_phd2018-02-28 fatcat:5jone24k5redxk5lm26ifqunnm

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+91 others)
2017 International Journal of Network Security   unpublished
Accordingly, we propose an enhanced scheme to remedy these security weaknesses, and prove that our scheme is more secure and efficient for network application with several positive properties.  ...  s scheme, such as forward secrecy and the wrong password login problem, and proposed an enhanced user password authentication scheme based on smart card. However, we found weaknesses in their scheme.  ...  The authors gratefully acknowledge the reviewers for their valuable suggestions.  ... 

A stitch in time: the needlework of aging women in antebellum America

2015 ChoiceReviews  
Davidson, Plimoth Colony Samplers (Marion, MA: The Channings, 1975); Edmonds, Samplers and Samplermakers, 12; Olive Blair Graffam, "Youth Is the Time for Progress": The Importance of American Schoolgirl  ...  The Key family called the pattern "Five Blazing Stars."  ...  wooden base.  ... 
doi:10.5860/choice.186352 fatcat:j7wnc5l6d5eyrlt6zhthxewlam

Proceedings of the Seminar "Research Trends in Media Informatics"

(:Unkn)Unknown, Universität Ulm, Florian Schaub, Stefan Dietzel, Boto Zsolt Bako, Bastian Könings, Elmar Schoch, Björn Wiedersheim, Michael Weber
The Internet, Web 2.0, Social Networks, Ubiquitous Computing, Computer Graphics, Usability, Social Interactions, HCI, and Privacy are just a few examples.  ...  "Trust" is defined by Blaze et al.  ...  OneSwam Isdal et al. provide a working prototype of a privacy preserving P2P data sharing application called OneSwarm [6] .  ... 
doi:10.18725/oparu-3892 fatcat:jflgj7nspfd3pfwdkagkrbwij4
« Previous Showing results 1 — 15 out of 37 results