Filters








17 Hits in 8.4 sec

Precision Health Data: Requirements, Challenges and Existing Techniques for Data Security and Privacy [article]

Chandra Thapa, Seyit Camtepe
2020 arXiv   pre-print
Secondly, this paper investigates secure and privacy-preserving machine learning methods suitable for the computation of precision health data along with their usage in relevant health projects.  ...  Finally, it illustrates the best available techniques for precision health data security and privacy with a conceptual system model that enables compliance, ethics clearance, consent management, medical  ...  Other works towards the realization of general-purpose MPC includes efficient secure computations in rings, scaling up MPC to many parties (introduce short keys for secure computation), communication-efficient  ... 
arXiv:2008.10733v1 fatcat:oj2neoftf5hcbpatnfn7ntyhzy

Blockchain for Transparent Data Management Toward 6G

Xuemin Sherman Shen, Dongxiao Liu, Cheng Huang, Liang Xue, Han Yin, Weihua Zhuang, Rob Sun, Bidi Ying
2021 Engineering  
However, the increasing data volume and stringent data privacy-preservation requirements in 6G bring significantly technical challenge to balance transparency, efficiency, and privacy requirements in decentralized  ...  Subsequently, we present research issues and potential solutions for blockchain-based DM toward 6G from these three perspectives.  ...  Compliance with ethics guidelines Xuemin (Sherman) Shen, Dongxiao Liu, Cheng Huang, Liang Xue, Han Yin,Weihua Zhuang, Rob Sun, and Bidi Ying declare that they have no conflict of interest or financial  ... 
doi:10.1016/j.eng.2021.10.002 fatcat:azcky5qo3faadokpplre52ovwq

ARPA Whitepaper [article]

Derek Zhang, Alex Su, Felix Xu, Jiang Chen
2018 arXiv   pre-print
With state-of-the-art multiparty computation protocol and a layer2 solution, our privacy-preserving computation guarantees data security on blockchain, cryptographically, while reducing the heavy-lifting  ...  In order to achieve this, we first develop a general MPC network with advanced features, such as: 1) Secure Computation, 2) Off-chain Computation, 3) Verifiable Computation, and 4)Support dApps' needs  ...  Other Candidates of Secure Computation In the past ten years, several technologies towards practical secure computation protocols have been proposed and studied.  ... 
arXiv:1812.05820v1 fatcat:wpu3uxpo6vcftomeeeufovd3ai

Security and privacy for 6G: A survey on prospective technologies and challenges [article]

Van-Linh Nguyen, Po-Ching Lin, Bo-Chao Cheng, Ren-Hung Hwang, Ying-Dar Lin
2021 arXiv   pre-print
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion.  ...  However, for now, security and privacy issues for 6G remain largely in concept.  ...  ., searchable symmetric encryption, secure multi-keyword semantic search, and even secure range query.  ... 
arXiv:2108.11861v1 fatcat:o7fgtm4tobfk5knltojut6xpyi

Autonomic Response to Distributed Denial of Service Attacks [chapter]

Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley Holliday, Travis Reid
2001 Lecture Notes in Computer Science  
Acknowledgements The authors would like to thank Jack Oden for distilling and Mary Ellen Leishear for editing the original report into this article.  ...  The baseline configuration consisted of the client and server applications with no security mechanisms. In the second configuration we used SSL for both authentication and encryption.  ...  that offer tunable tradeoffs between throughput, security, and energy consumption. · Energy-efficient packet filtering hardware that can be integrated with mobile units. · Energy-efficient access policy  ... 
doi:10.1007/3-540-45474-8_9 fatcat:gzimnj7tqvd5zg2zl7pjxkhtzm

Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy

Shi-Feng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph Liu, ‪Surya Nepal‬, Dawu Gu
2021 Proceedings 2021 Network and Distributed System Security Symposium   unpublished
At last, we implement our scheme and compare it with the most efficient Type-II backward-private scheme to date (Demertzis et al., NDSS 2020).  ...  In Dynamic Symmetric Searchable Encryption (DSSE), forward privacy ensures that previous search queries cannot be associated with future updates, while backward privacy guarantees that subsequent search  ...  In addition, most of existing backward and forward-private SSE schemes support only restricted types of queries, so constructing practical SSE schemes with support for strong security as well as rich queries  ... 
doi:10.14722/ndss.2021.24162 fatcat:akb3job5hrc7pffffjx2sfvdu4

Enclave Computing Paradigm: Hardware-assisted Security Architectures & Applications

Franz Ferdinand Peter Brasser
2020
Preventing side-channel leakage from enclaves in a universal and efficient way is a non-trivial problem. Nevertheless, these deployed TEE solutions enable various novel applications.  ...  The TEE solutions developed by industry and deployed in today's systems follow distinct design approaches and come with various limitations.  ...  Thus, designing an efficient searchable encryption scheme with minimal leakage on the queried ranges remains an open challenge.  ... 
doi:10.25534/tuprints-00011912 fatcat:2xf7ax7tcvbhrn76cdvcesfj6e

Privacy-Preserving Social Search: Primitives and Realisation

SHANGQI LAI
2020
To further improve the security of the system, this thesis reviews the underlying cryptographic primitives used by the system and propose a new cryptographic primitive to address an attack with a moderate  ...  The system can process queries on the encrypted data, and it can be used to support real-world social network services.  ...  The trend of searchable encryption research is towards the design of dynamic searchable encryption schemes, and new security model (forward and backward security [107] ) is proposed to address the threat  ... 
doi:10.26180/5e9cd4b7483eb fatcat:youemnagozhtpfnwmodissse7i

Raising The Bar: Advancing Mitigations Against Memory-Corruption and Side-Channel Attacks

Tommaso Frassetto
2022
As a result, the number and impact of security vulnerabilities have been rising as well.  ...  Memory-corruption attacks have been one of the most severe security threats for decades, despite the tremendous efforts of the security community: according to data published by Microsoft in 2019, 70%  ...  Ministry of Education and Research within CRISP.  ... 
doi:10.26083/tuprints-00021436 fatcat:udtvwmmqrngkfkburnkgz6mxsa

Full Text PDF of The JBBA: Vol 1, Issue 1, July 2018

Naseem Naqvi
2018 The Journal of British Blockchain Association  
The contents herein are correct at the time of printing and may be subject to change.  ...  While every effort has been made to ensure articles published are free from typing, proof reading and formatting errors at the time of going to press, the publisher will be glad to be notified of any errors  ...  The text of accepted manuscripts can sometimes be edited to enhance communication between author and reader.  ... 
doi:10.31585/jbba-vol.1-issue.1-july-2018 fatcat:xgzorsimdfhetms2z4hw7kdt3y

2020 Foresight

1993 The Cornell Hotel and Restaurant Administration Quarterly  
their guidance and suggestions.  ...  We express our gratitude to all workshop participants and interviewees who kindly agreed to participate in this study and donated their time and insights.  ...  Figure 32 ) are likely to exert a strong push towards the trends identified above.  ... 
doi:10.1016/0010-8804(93)90019-f fatcat:4uu34r2yyrepvp6w2tobdasbsa

Bodies as evidence: security, knowledge, and power

Emily C. Kaufman
2020 Social & Cultural Geography  
The stadium and shopping mall are areas with few crimes as they are saturated with cctvs and have significant private security in place.  ...  The photo depicts a combatant with a rifle in the hand of his outstretched right arm, his head tilted slightly toward his left, as he falls backward on a dry grassy slope near the hamlet of Cerro Muriano  ...  C O N C L U S I O N Discontinuities and Diversity Mark Maguire and Ursula Rao Bodies as Evidence emerged over several years from a series of informal conversations and formal workshops.  ... 
doi:10.1080/14649365.2020.1732523 fatcat:fnk2lbajzrd3plk4cg4ufixpbu

Dagstuhl Reports, Volume 5, Issue 10, October 2015, Complete Issue [article]

2016
A comparison of travel times with simulation tools like MATSim and VISSIM demonstrates the applicability of our approach.  ...  Dynamic Traffic Models in Transportation Science Edited by Independent research proves that in the present, drivers with different quality of traffic information, and different levels of sophistication  ...  Authentication and authorization, setting up mappings, sharing, etc. Security We need enclave-like approaches to encrypt everything but the CPU caches.  ... 
doi:10.4230/dagrep.5.10 fatcat:u44u5pkszbayti24uerfh3wifu

Insecurity Communities: Technologies of Insecurity Governance Under the European Neighbourhood Policy

Can E. Mutlu, Université D'Ottawa / University Of Ottawa, Université D'Ottawa / University Of Ottawa
2013
The projects core contributions rest with the security community theory and the literature on the EU's external governance literatures.  ...  The central argument of the project is that security communities are insecurity communities.  ...  The incentive of becoming an EU member is strong enough to establish and sustain cooperation and compliance structures with candidate states.  ... 
doi:10.20381/ruor-3100 fatcat:u5ibjtcvtbef5d7xcdzp6rzegq

Strategies for Unbridled Data Dissemination: An Emergency Operations Manual

Nikita Mazurov
2015
It is found that there exist potential de-anonymization attacks against all analyzed file-sharing tools, with potentially more secure filesharing options also seeing less user adoption.  ...  Examples of watermarking employed by academic e-book and journal publishers and film distributors are also examined and counter-forensic techniques for removing such watermarks are developed.  ...  File handling practices will here be examined with an eye towards security (e.g. encryption) and longevity (e.g. retention), the former of which protects the file from adversaries whilst the latter assures  ... 
doi:10.25602/gold.00016589 fatcat:3szv2ve46jb3blsoaalxp5rk7m
« Previous Showing results 1 — 15 out of 17 results