Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT [PDF]
In the cloud-assisted industrial Internet of Things (IIoT), since the cloud server is not always trusted, the leakage of data privacy becomes a critical problem. Dynamic symmetric searchable encryption (DSSE) allows for the secure retrieval of outsourced
Tianqi Peng +7 more
doaj +2 more sources
A secure group-based authentication protocol for IoVT in 5G-enabled smart transportation and road safety systems [PDF]
The Internet of Vehicular Things (IoVT) is evolving rapidly, connecting vehicles, infrastructure, and other smart systems via the Internet. This connectivity enhances safety, efficiency, and data-driven services but also introduces significant security ...
Garima Singh +3 more
doaj +2 more sources
Shedding Light on Blind Spot of Backward Privacy in Dynamic Searchable Symmetric Encryption
Dynamic searchable symmetric encryption (DSSE) enables users to outsource their data while retaining the capability to search and update on the encrypted database. Although various DSSE schemes have been proposed to achieve higher efficiency and stronger
Hyundo Yoon +5 more
doaj +1 more source
Predictors of fairness assessment for social media screening in employee selection [PDF]
PURPOSE: The purpose of this paper is to analyze the factors that determine the response of potential candidates to the screening of private (represented by Facebook) and professional (LinkedIn) social networking sites (SNS) for personnel selection ...
Alicja Balcerak +2 more
doaj +1 more source
An Improved and Secure RFID Group Tag Ownership Transfer Protocol [PDF]
Aiming at the security issues such as backward privacy leakage and violent cracking in the existing Radio Frequency Identification(RFID) group label ownership transfer protocol,an improved ownership transfer protocol is proposed.The word randomization ...
YIN Shoujun
doaj +1 more source
A Fast Method for Protecting Users’ Privacy in Image Hash Retrieval System
Effective search engines based on deep neural networks (DNNs) can be used to search for many images, as is the case with the Google Images search engine. However, the illegal use of search engines can lead to serious compromises of privacy.
Liang Huang +3 more
doaj +1 more source
A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs
Vehicular ad hoc networks (VANETs) face two important and conflicting challenges with regards to security: preserve the privacy of vehicles in order to prevent malicious entities from tracking users and detect and remove bad actors that attempt to game ...
L. Ellen Funderburg, Im-Yeong Lee
doaj +1 more source
Online Privacy Fatigue: A Scoping Review and Research Agenda
Online users are responsible for protecting their online privacy themselves: the mantra is custodiat te (protect yourself). Even so, there is a great deal of evidence pointing to the fact that online users generally do not act to preserve the privacy of ...
Karl van der Schyff +3 more
doaj +1 more source
Efficient dynamic searchable encryption scheme for conjunctive queries based on bidirectional index
To solve the problems of complicated operation, information leakage, and inflexible query method in the update process of existing dynamic searchable encryption scheme, an efficient dynamic searchable encryption scheme (named BPC-DSSE) for conjunctive ...
Ruizhong DU, Yuqing ZHANG, Mingyue LI
doaj +2 more sources
The Latticed-Based Path Privacy Protection Aggregation Scheme for Internet of Vehicles
With the occurrence of information leakage events of online ride-hailing, the information security of Internet of Vehicles has been highly valued by the society.
Cheng Wei +3 more
doaj +1 more source

