73,089 Hits in 3.6 sec

Efficient protocols for secure adaptive filtering

Juan Ramon Troncoso-Pastoriza, Fernando Perez-Gonzalez
2011 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)  
The field of Signal Processing in the Encrypted Domain (SPED) has emerged in order to provide efficient and secure solutions for preserving privacy of signals that are processed by untrusted agents.  ...  Due to the impossibility of using a strategy based solely on current homomorphic encryption systems, we propose novel secure protocols for a privacy-preserving execution of the BLMS (Block Least Mean Squares  ...  In this work, we present secure solutions for privacy-preserving adaptive filtering that involve homomorphic processing with packing strategies, garbled circuits and interactive protocols, for overcoming  ... 
doi:10.1109/icassp.2011.5947694 dblp:conf/icassp/Troncoso-PastorizaP11 fatcat:j5j44emt4nc2lnggesm4yp4zma

Secure Adaptive Filtering

Juan Ramón Troncoso-Pastoriza, Fernando Perez-Gonzalez
2011 IEEE Transactions on Information Forensics and Security  
In this work, we present several secure solutions for privacy-preserving adaptive filtering that involve homomorphic processing, garbled circuits and interactive protocols, in order to overcome the limitations  ...  The field of Signal Processing in the Encrypted Domain has emerged in order to provide efficient and secure solutions for preserving privacy of signals that are processed by untrusted agents.  ...  circuits are still far from providing an efficient solution to adaptive filtering, and interactive approximate protocols with statistical security can yield much more practical solutions.  ... 
doi:10.1109/tifs.2011.2109385 fatcat:leoc4tkqfnbvvp4voozr5w7vzu

An Adaptive Secure Fuzzy Multicast communication in Large Scale Mobile Ad Hoc Networks

B. G. Obula Reddy
2012 IOSR Journal of Computer Engineering  
Multicast protocols in MANETs must consider control overhead for maintenance, energy efficiency of nodes and routing trees managements to frequent changes of network topology.  ...  In this paper, we evaluate mainly security level based in AFMR, named SAFMR and compare it with Cluster-based On Demand Multicast Routing Protocol (CODMRP) and Cluster-based routing protocol (CBRP).  ...  Secure routing protocols for MANETs Designing efficient routing protocols on MANETS is a primary challenge, but useful for conventional routing protocols.  ... 
doi:10.9790/0661-0712232 fatcat:fen64ljprvbx5fgeyydpxiaufu

CryptoDSPs for Cloud Privacy [chapter]

Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González
2011 Lecture Notes in Computer Science  
This fact, together with the advent of Cloud computing and the growing tendency to outsource not only the storage but also the processing of data has created a fundamental need for privacy preserving techniques  ...  discipline of Signal Processing in the Encrypted Domain (SPED), and we show their application to solve Cloud Computing privacy issues, introducing the concept of virtualized CryptoDSPs, as an architecture for  ...  There is, though, a long way to go in other more complex algorithms, like nonlinear or adaptive ones, that are being progressively covered by new efficient specific protocols, like the ones presented in  ... 
doi:10.1007/978-3-642-24396-7_34 fatcat:j3oo4fergzeqrnejmwfutfexva

Hide-n-Sense: Preserving Privacy Efficiently in Wireless mHealth

Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, David Kotz
2013 Journal on spesial topics in mobile networks and applications  
The protocol uses three novel techniques: adaptive security, to dynamically modify transmission overhead; MAC striping, to make forgery difficult even for small-sized Message Authentication Codes; and  ...  First, we propose an mHealth sensing protocol that provides strong security and privacy properties at the link layer, with low energy overhead, suitable for low-power sensors.  ...  We use three novel techniques to improve energy efficiency: (1) adaptive protocol overhead to balance security and efficiency, (2) MAC striping to make the protocol strongly resistant against selective  ... 
doi:10.1007/s11036-013-0447-x fatcat:ybhcyqjzpvec3e2dnj6unq67ki

A Survey of Alerting Websites: Risks and Solutions [chapter]

Amrit Kumar, Cédric Lauradoux
2015 IFIP Advances in Information and Communication Technology  
In particular, we study three solutions: private set intersection, private set intersection cardinality and private information retrieval adapted to membership testing.  ...  The scenario of public database (Section 5) requires us to adapt private information retrieval protocol for membership testing. This is achieved by combining it with Bloom filters (Section 5.1).  ...  The general conclusion being that for security of 80 bits, protocol by De Cristofaro et al. performs better than the one by Huang et al., while for higher security level, the latter protocol supersedes  ... 
doi:10.1007/978-3-319-18467-8_9 fatcat:afkv7d7fljgy3ewnntil5ekzpe

5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks

Pablo Salva-Garcia, Jose M. Alcaraz-Calero, Qi Wang, Jorge Bernal Bernabe, Antonio Skarmeta
2018 Security and Communication Networks  
control loop featured with efficient 5G-aware traffic filtering.  ...  However, insufficient research has been conducted in this crucial area, in particular, few if any solutions are capable of dealing with the multiple encapsulated 5G traffic for IoT security management.  ...  Therefore, the network filter(s) will need to efficiently manage the packet filtering process for numerous devices.  ... 
doi:10.1155/2018/9291506 fatcat:een4z3mofvhhbk2drs6zrxgu2q

Waku: A Family of Modular P2P Protocols For Secure Censorship-Resistant Communication [article]

Oskar Thorén, Sanaz Taheri-Boshrooyeh, Hanno Cornelius
2022 arXiv   pre-print
Waku is a family of modular protocols that enable secure, censorship-resistant, and anonymous peer-to-peer communication.  ...  Waku's modular design and resource-efficient protocols make it superior to its predecessor i.e., Whisper.  ...  Modularity: Waku protocols are modular hence nodes can adaptively choose protocols to support. We call this concept adaptive nodes explained in 30/ADAPTIVE-NODES RFC [3] .  ... 
arXiv:2207.00038v1 fatcat:lheo4eeftzbuxcu5k7kihojpia

Towards Monitoring Programmability in Future Internet: Challenges and Solutions [chapter]

Luca Deri, Francesco Fusco, Joseph Gasparakis
2011 Trustworthy Internet  
In the Internet of Services (IoS) era, monitoring infrastructures must provide to network operators fine-grained service-specific information which can be derived by dissecting application level protocols  ...  In this paper we identify desirable features for reducing the work required to develop complex probes, and we present a home-grown comprehensive software framework that significantly simplifies the creation  ...  Although most Internet protocols are managed by many security systems already available on the market, it is often necessary to implement fine-grained tools for controlling selected protocol requests and  ... 
doi:10.1007/978-88-470-1818-1_19 fatcat:lmwrb3tjkvfmjmyhis4pylg37y

Practical Searchable Symmetric Encryption Supporting Conjunctive Queries without Keyword Pair Result Pattern Leakage

Changshe Ma, Yiping Gu, Hongfei Li
2020 IEEE Access  
INDEX TERMS Conjunctive query, encrypted bloom filter, holistic security, keyword pair result pattern, searchable symmetric encryption, subset membership check.  ...  The holistic security of SMC requires that nothing is revealed other than the membership of a subset after each execution of the protocol.  ...  Such an efficient simulator S T can be guaranteed because TSet is (non-adaptively) L T secure.  ... 
doi:10.1109/access.2020.3001014 fatcat:nx7b6s7kmffuraws7ofi5gyp4e

Secret Key Rates and Optimization of BB84 and Decoy State Protocols Over Time-Varying Free-Space Optical Channels

Xiaole Sun, Ivan B. Djordjevic, Mark A. Neifeld
2016 IEEE Photonics Journal  
We first optimize BB84 and decoy statebased QKD protocols for different channel transmittances.  ...  We then present our adaptation method, to overcome scintillation effects, of changing the source intensity based on channel state predictions from a linear autoregressive model while ensuring the security  ...  Similarly, for decoy state protocol, we showed the improvement of adaptation method.  ... 
doi:10.1109/jphot.2016.2570000 fatcat:clsyuao5s5bxdaameqtt77rk4m

Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes [article]

Shangqi Lai and Xingliang Yuan and Shi-Feng Sun and Joseph K. Liu and Ron Steinfeld and Amin Sakzad and Dongxi Liu
2020 arXiv   pre-print
To overcome the above bottleneck, in this paper, we propose the first bandwidth-efficient encrypted pattern matching protocols for secure middleboxes.  ...  We formalise the security of our proposed protocols, and implement a prototype and conduct comprehensive evaluations over real-world rulesets and traffic dumps.  ...  To improve the efficiency of the above process, MB exploits a secure filtering protocol.  ... 
arXiv:2001.01848v1 fatcat:oqos4xi6qfcqhhobrg6t2r3dfu

Design and Implementation of RFID Middleware System for Ubiquitous Learning Environment using Large Scale Data

Seonghun Ahn, Byoung Seob Park
2009 International Journal of Advancements in Computing Technology  
The RFID middleware system consists of reader interface, event manager, application interface, and an adapter for heterogenous readers.  ...  speedy and efficient performance.  ...  The currently supported adapters for a reader device are Alien adapter, Matrics adapter, Imtermec PDA adapter, and PDA adapter made by B company in Korea.  ... 
doi:10.4156/ijact.vol1.issue2.9 fatcat:yyfgjd4oe5g2tcz5whbwylo7xa

Honeynet based distributed adaptive network forensics and active real time investigation

Wei Ren, Hai Jin
2005 Proceedings of the 2005 ACM symposium on Applied computing - SAC '05  
The features of our system are distributed adaptive network forensics and active real time network investigation.  ...  This module can adaptively change the filter rules. Active and Real Time Investigation To analysis the attack behavior by replay the attacking procedure.  ...  But to keep the efficiency of capture network traffic, we select the data to save: such as a record of the source/origin, destination, service port, duration, bytes transferred for every TCP connection  ... 
doi:10.1145/1066677.1066749 dblp:conf/sac/RenJ05 fatcat:3xkaedhlgzajbkzyjrkad2wtd4

Private Set Intersection for Unequal Set Sizes with Mobile Applications

Ágnes Kiss, Jian Liu, Thomas Schneider, N. Asokan, Benny Pinkas
2017 Proceedings on Privacy Enhancing Technologies  
For decades, researchers have been focusing on improving its efficiency in both communication and computation.  ...  In this paper, we analyze and optimize the efficiency of existing PSI protocols to support precomputation so that they can efficiently deal with such input sets.  ...  Acknowledgements We thank the anonymous reviewers for their valuable feedback on the paper. This work has been co-  ... 
doi:10.1515/popets-2017-0044 dblp:journals/popets/KissL0AP17 fatcat:6dat4gueh5hh5liecejqrhniu4
« Previous Showing results 1 — 15 out of 73,089 results