7 Hits in 6.1 sec

Non-interactive Zero-knowledge for Blockchain: A Survey

Juha Partala, Tri Hong Nguyen, Susanna Pirttikangas
2020 IEEE Access  
There exists a large body of work concentrating on cryptocurrencies and on the blockchain itself [9] - [12] , as well as on the security threats and challenges related to blockchain technology [13]  ...  It is itself implemented as a smart contract that can keep account balances hidden and to deposit, transfer and withdraw funds.  ...  He has published in a wide range of topics related to information security such as theoretical and applied cryptography, steganography, security of biomedical systems and blockchain.  ... 
doi:10.1109/access.2020.3046025 fatcat:crl77kezmbfydhtvvv6i3lrzdi

Subliminal Channels in High-Speed Signatures

Alexander Hartl, Robert Annessi, Tanja Zseby
2018 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
Therefore, the overall potential subliminal bandwidth and their usability as carrier for hidden messages or information leakage is limited.  ...  Subliminal channels already exist in older signatures, such as ElGamal and ECDSA.  ...  The signer can retain a certain level of security, however, by using only part of the removed equations as subliminal channel and keeping the remaining ones secret.  ... 
doi:10.22667/jowua.2018.03.31.030 dblp:journals/jowua/HartlAZ18 fatcat:5sfxajfr3vcctndei2fhw7fe6q

Privacy-Preserving Cloud Computing: Ecosystem, Life Cycle, Layered Architecture and Future Roadmap [article]

Saeed Ahmadi
2022 arXiv   pre-print
Cloud computing is important because it allows for scalability, adaptability, and improved security.  ...  trends in research on this area.  ...  In [86] the authors have demonstrated how the secret key, used in encryption and decryption, has affected the efficiency and security of bandwidth and storage space.  ... 
arXiv:2204.11120v1 fatcat:tx75pckegjgqxg6tiibptiazbi

On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques

Arezou Soltani Panah, Ron Van Schyndel, Timos Sellis, Elisa Bertino
2016 IEEE Access  
In this paper, we classify the data in terms of data mining rules on complex types of data such as time-series, symbolic sequences, data streams, and so forth.  ...  We emphasize the challenges involved in non-media watermarking in terms of common watermarking properties, including invisibility, capacity, robustness, and security.  ...  Moreover, in steganography, the host data can be a mere 'decoy' and may have no relationship to the secret message.  ... 
doi:10.1109/access.2016.2570812 fatcat:2xxteahvprepzekaqqbbyey7hi

Security and Privacy in Cloud Computing: Technical Review

Yunusa Simpa Abdulsalam, Mustapha Hedabou
2021 Future Internet  
The literature has further focused on only highlighting security and privacy issues without providing adequate technical approaches to mitigate such security and privacy threats.  ...  Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of the pay-as-you-go price model.  ...  Scalable and efficient provable data possession.  ... 
doi:10.3390/fi14010011 fatcat:rzfmwfbxujcu7ohcecbqsb6p2a

Enhancing user privacy in web services

Jean-Sébastien Légaré
The full abstract for this thesis is available in the body of the thesis, and will be available when the embargo expires.  ...  We distribute keys on Twitter and GitHub, which act as our key directory.  ...  The symmetric encryption we chose is efficient and provides semantic security, but its non-malleability makes it hard to disprove that a certain plaintext produced the ciphertext on public record, once  ... 
doi:10.14288/1.0358013 fatcat:egmn42i4lrgghnjjvy5yya7egu

Tailored Traceability and Provenance Determination in Manufacturing

Adam Dachowicz
There is a growing need to provide solutions to traceability that i) are particularized to specific industrial contexts with heterogeneous security and robustness requirements, and ii) reliably transmit  ...  In increasingly globalized manufacturing contexts, one-size-fits-all traceability solutions are not always appropriate.  ...  Sequential Embedding with One Information Channel The user embedding the secret message must supply both the message m and a secret key K, where in this analysis both are assumed to be strings of ASCII  ... 
doi:10.25394/pgs.12735854 fatcat:ppywv44rybad7fpnemini3wfya