Shedding Light on Blind Spot of Backward Privacy in Dynamic Searchable Symmetric Encryption
Dynamic searchable symmetric encryption (DSSE) enables users to outsource their data while retaining the capability to search and update on the encrypted database. Although various DSSE schemes have been proposed to achieve higher efficiency and stronger
Hyundo Yoon +5 more
doaj +2 more sources
Dynamic searchable symmetric encryption (DSSE) enables searches over encrypted data as well as data dynamics such as flexible data addition and deletion operations.
Hyundo Yoon +4 more
doaj +2 more sources
Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT [PDF]
In the cloud-assisted industrial Internet of Things (IIoT), since the cloud server is not always trusted, the leakage of data privacy becomes a critical problem. Dynamic symmetric searchable encryption (DSSE) allows for the secure retrieval of outsourced
Tianqi Peng +7 more
doaj +2 more sources
A secure group-based authentication protocol for IoVT in 5G-enabled smart transportation and road safety systems [PDF]
The Internet of Vehicular Things (IoVT) is evolving rapidly, connecting vehicles, infrastructure, and other smart systems via the Internet. This connectivity enhances safety, efficiency, and data-driven services but also introduces significant security ...
Garima Singh +3 more
doaj +2 more sources
Predictors of fairness assessment for social media screening in employee selection [PDF]
PURPOSE: The purpose of this paper is to analyze the factors that determine the response of potential candidates to the screening of private (represented by Facebook) and professional (LinkedIn) social networking sites (SNS) for personnel selection ...
Alicja Balcerak +2 more
doaj +1 more source
Verifiable Conjunctive Dynamic Searchable Symmetric Encryption With Forward and Backward Privacy
Abstract Dynamic searchable symmetric encryption (DSSE) with forward and backward privacy makes it possible to perform search on the outsourced encrypted database efficiently while still allowing updates under acceptable leakage. Current forward and backward private DSSE (FB-DSSE) scheme proposed by Zuo et al.
Haitang Lu +3 more
openaire +1 more source
An Improved and Secure RFID Group Tag Ownership Transfer Protocol [PDF]
Aiming at the security issues such as backward privacy leakage and violent cracking in the existing Radio Frequency Identification(RFID) group label ownership transfer protocol,an improved ownership transfer protocol is proposed.The word randomization ...
YIN Shoujun
doaj +1 more source
Privacy Analysis of Forward and Backward Untraceable RFID Authentication Schemes [PDF]
In this paper, we analyze the first known provably secure Radio Frequency Identification (RFID) authentication schemes that are designed to provide forward untraceability and backward untraceability: the L-K and S-M schemes. We show how to trace tags in the L-K scheme without needing to corrupt tags.
Raphael C.-W. Phan +3 more
openaire +1 more source
A Fast Method for Protecting Users’ Privacy in Image Hash Retrieval System
Effective search engines based on deep neural networks (DNNs) can be used to search for many images, as is the case with the Google Images search engine. However, the illegal use of search engines can lead to serious compromises of privacy.
Liang Huang +3 more
doaj +1 more source
A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs
Vehicular ad hoc networks (VANETs) face two important and conflicting challenges with regards to security: preserve the privacy of vehicles in order to prevent malicious entities from tracking users and detect and remove bad actors that attempt to game ...
L. Ellen Funderburg, Im-Yeong Lee
doaj +1 more source

