Filters








30 Hits in 6.1 sec

SybMatch: Sybil Detection for Privacy-Preserving Task Matching in Crowdsourcing

Jiangang Shu, Ximeng Liu, Kan Yang, Yinghui Zhang, Xiaohua Jia, Robert H. Deng
2018 2018 IEEE Global Communications Conference (GLOBECOM)  
In this paper, we focus on the privacy leaks and sybil attacks during the task matching, and propose a privacy-preserving task matching scheme, called SybMatch.  ...  and efficient user revocation.  ...  In this paper, we analyze the potential privacy leaks and attacks during the task matching in crowdsourcing, and propose a privacy-preserving task matching scheme with sybil detection, called SybMatch.  ... 
doi:10.1109/glocom.2018.8647346 dblp:conf/globecom/ShuLYZJD18 fatcat:sbueybhnsjdazavry3wjamhqaq

2020 Index IEEE Transactions on Information Forensics and Security Vol. 15

2020 IEEE Transactions on Information Forensics and Security  
He, W., +, TIFS 2020 3859-3871 Crowdsourcing PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing.  ...  ., +, TIFS 2020 2386-2401 PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing.  ...  G Gait analysis Deep Learning-Based Gait Recognition Using Smartphones in the Wild.  ... 
doi:10.1109/tifs.2021.3053735 fatcat:eforexmnczeqzdj3sc2j4yoige

2021 Index IEEE Internet of Things Journal Vol. 8

2021 IEEE Internet of Things Journal  
-that appeared in this periodical during 2021, and items from previous years that were commented upon or corrected in 2021.  ...  Note that the item title is found only under the primary entry in the Author Index.  ...  ., +, JIoT April 15, 2021 6406-6415 Enabling Proxy-Free Privacy-Preserving and Federated Crowdsourcing by Using Blockchain.  ... 
doi:10.1109/jiot.2022.3141840 fatcat:42a2qzt4jnbwxihxp6rzosha3y

Investigating the Adoption of Hybrid Encrypted Cloud Data Deduplication with Game Theory

Xueqin Liang, Zheng Yan, Robert Deng, Qinghua Zheng
2020 IEEE Transactions on Parallel and Distributed Systems  
to eliminate free-riding behavior, which can also preserve data privacy.  ...  Privacy Preservation This subsection introduces our experiments on the individualized discount incentive mechanism with privacy preservation.  ... 
doi:10.1109/tpds.2020.3028685 fatcat:tum3ldilhbagrdgsu4726ihqbm

2020 Index IEEE Transactions on Vehicular Technology Vol. 69

2020 IEEE Transactions on Vehicular Technology  
Data-Sharing Scheme in VANETs; TVT Dec. 2020 15933-15946 Hoseini, S.A., Ding, M., Hassan, M., and Chen, Y., Analyzing the Impact of Molecular Re-Radiation on the MIMO Capacity in High-Frequency Bands;  ...  R., TVT Dec. 2020 16218-16223 Hoon-Kim, T., see Kumar, G., TVT July 2020 7707-7722 Horlin, F., see Monfared, S., TVT Oct. 2020 11369-11382 Horng, S., Lu, C., and Zhou, W., An Identity-Based and Revocable  ...  ., +, TVT Oct. 2020 11383-11393 P2B: Privacy Preserving Identity-Based Broadcast Proxy Re-Encryption. Privacy-Preserving Compressive Sensing for Real-Time Traffic Monitoring in Urban City.  ... 
doi:10.1109/tvt.2021.3055470 fatcat:536l4pgnufhixneoa3a3dibdma

Trust-based recommendation systems in Internet of Things: a systematic literature review

Venus Mohammadi, Amir Masoud Rahmani, Aso Mohammed Darwesh, Amir Sahafi
2019 Human-Centric Computing and Information Sciences  
Along with the tremendous growth in the number of sensing devices connected to the Internet, we were a witness of emerging IoT into healthcare, transportation system, smart cities, agriculture, and other  ...  On the other side, the internet and mobile communication facilitate the spatiotemporal connection between distant people with common experience and values.  ...  threat Privacy destruction (2) Use aggregated behavior-based weights (3) Encryption/decryption promise privacy preservation (4) Free infrastructure of physical layer and performed in session layer  ... 
doi:10.1186/s13673-019-0183-8 fatcat:ckozm3ixungbvpc37agoxc5arm

Blockchain-Based Continued Integrity Service for IoT Big Data Management: A Comprehensive Design

Yustus Eko Oktian, Sang-Gon Lee, Byung-Gook Lee
2020 Electronics  
With many instances allocating data or service arbitrarily, how can we guarantee the correctness of IoT data or processes that other parties offer.  ...  The state-of-the-art centralized Internet of Things (IoT) data flow pipeline has started aging since it cannot cope with the vast number of newly connected IoT devices.  ...  Moreover, to further enhance data privacy, we can also conduct encryption procedures to the IoT data. We are interested in using the proxy re-encryption technique proposed in [43] .  ... 
doi:10.3390/electronics9091434 fatcat:2eouoqfh2jcqxfb5to6xm54mlq

Privacy-Protecting Techniques for Behavioral Data: A Survey [article]

Simon Hanisch, Patricia Arias-Cabarcos, Javier Parra-Arnau, Thorsten Strufe
2021 arXiv   pre-print
It also correlates with sensitive attributes like emotions. Hence, techniques to protect individuals privacy against unwanted inferences are required.  ...  To consolidate knowledge in this area, we systematically reviewed applicable anonymization techniques.  ...  The mix-max filter minimizes the privacy risk while maximizing utility risk with a given utility and private task.  ... 
arXiv:2109.04120v1 fatcat:zsv2bgrynveutlq2akx3vllhbq

Security Considerations for Internet of Things: A Survey

Anca Jurcut, Tiberiu Niculcea, Pasika Ranaweera, Nhien-An Le-Khac
2020 SN Computer Science  
After a review of the relevant, online literature on the topic and after looking at the market trends and developments, one can notice that there are still concerns with regard to security in IoT products  ...  However, the security of these connected Internet of things (IoT) plays a centric role with no margin for error.  ...  These devices undoubtedly will allow humans to become more efficient with their time, energy, and money in ways that are easy to forecast.  ... 
doi:10.1007/s42979-020-00201-3 fatcat:4gkafccu7vgq7olrqdxdpgm2eu

D2.4 Profiling Analytics and Privacy Methodological Foundations Release I

Suite5, Frankfurt University, UBITECH, NTUA
2018 Zenodo  
The results reported in the previous three deliverables of WP2 (D2.1, D2.2 and D2.3) will be aggregated in one deliverable, which will be independently assessed by the Ethics Advisory Board of ChildRescue  ...  The three steps recognised previously, are further analysed and matched to known algorithmic tasks.  ...  In response to this, from the early days of data mining in the late 1990s, a part of the academic community focused their work on privacy issues leading to the notion of Privacy-Preserving Data Mining  ... 
doi:10.5281/zenodo.2542731 fatcat:ecplhyb5hrapffb4amahnfr6ry

D1.3 - Final Specification Of Use Cases And Initial Report On Business Models

Refiz Duro, Gerhard Dünnebeil, Corinna Schmitt, Peter Reichl, Sofia Aivalioti, Mario Drobics, Ivan Gojmerac, Jasmin Pielorz, Kurt Edegger, Stephan Wirsing, Ricardo Vitorino, Margarida Campolargo (+10 others)
2017 Zenodo  
Measure Vital Signs Security_8 The system MUST preserve end-user privacy.  ...  Task 1.1: Use Case specifications Task 1.1 is concerned with the detailed description of the use cases of symbIoTe.  ...  Alternative Scenarios None of the available services of the Port matches the needs on-board. In this case, the Yacht IoT Platform does not take any further action.  ... 
doi:10.5281/zenodo.817479 fatcat:glohjrx74zc2hhds7gmtzn357y

Access controlled: the shaping of power, rights, and rule in cyberspace

2010 ChoiceReviews  
This department is tasked with investigating and prosecuting cyber crime and cyber attacks.  ...  efficiencies in denying access to information when and where it is needed.  ...  in, [143] [144] ISPs in, 140  ... 
doi:10.5860/choice.48-2125 fatcat:pnspoirndfenlhq3urwsqomh2m

Privacy-Friendly Photo Sharing and Relevant Applications Beyond

Lin Yuan
2017
We plan to investigate efficient solutions to enable both privacy and usability, namely, privacy-preserving dietary management.  ...  In addition, with two subjective experiments conducted via online crowdsourcing, the proposed method shows great potentials to provide a good degree of privacy preservation, and much higher usability from  ... 
doi:10.5075/epfl-thesis-7828 fatcat:lbu66lhfbfedxacihegeqas7pu

Coin-Operated Capitalism

Shaanan Cohney, David A. Hoffman, Jeremy Sklaroff, David Wishnick
2018 Social Science Research Network  
Surprisingly, in a community known for espousing a technolibertarian belief in the power of "trustless trust" built with carefully designed code, a significant fraction of issuers retained centralized  ...  We characterize the ICO as an example of financial innovation, placing it in kinship with venture capital contracting, asset securitization, and (obviously) the IPO.  ...  In a few cases, Etherscan did not affirmatively indicate that the uploaded display code matched the bytecode. In those cases, we did not separately verify the match. 138.  ... 
doi:10.2139/ssrn.3215345 fatcat:us7hwzcjybga5jcaa45oj7zgea

On the importance of ecologically valid usable security research for end users and IT workers [article]

Sascha Fahl, University, My
2019
Efficiency Having learned how to interact, how quickly can tasks be performed? Memorability How easy is it to interact with the system after periods of non-use?  ...  Table 3 .3) was dealt with in a separate task with a separate mockup.  ...  Post-Task Please rate the following questions regarding the mechanism you just used. Choose from 1 (strongly disagree) to 5 (strongly agree) for the following:  ... 
doi:10.15488/8668 fatcat:7oh5c5uplrdbdhwnejmhnfo5fi
« Previous Showing results 1 — 15 out of 30 results