Results 11 to 20 of about 106,465 (133)
Vehicular Ad hoc Networks (VANETs) are a subset of the Internet of Things (IoT) that are used in smart traffic applications. Due to their high speed, mobility, and exposure to the environment, the security requirements for VANETs result in the ...
L. Ellen Funderburg, Im-Yeong Lee
doaj +1 more source
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [PDF]
Using dynamic Searchable Symmetric Encryption, a user with limited storage resources can securely outsource a database to an untrusted server, in such a way that the database can still be searched and updated efficiently.
Bost, Raphael +2 more
core +2 more sources
Quantifying Differential Privacy in Continuous Data Release under Temporal Correlations [PDF]
Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives to continuously release private data for protecting privacy at
Cao, Yang +3 more
core +2 more sources
A resilient key predistribution scheme for multiphase wireless sensor networks [PDF]
In wireless sensor networks, sensor nodes eventually die due to battery depletion. Wireless sensor networks (WSNs) in which new nodes are periodically redeployed with certain intervals, called generations, to replace the dead nodes are called multi-phase
Ergun, Murat +3 more
core +2 more sources
The effectiveness of backward contact tracing in networks
Discovering and isolating infected individuals is a cornerstone of epidemic control. Because many infectious diseases spread through close contacts, contact tracing is a key tool for case discovery and control.
Ahn, Yong-Yeol +4 more
core +1 more source
HORNET: High-speed Onion Routing at the Network Layer [PDF]
We present HORNET, a system that enables high-speed end-to-end anonymous channels by leveraging next generation network architectures. HORNET is designed as a low-latency onion routing system that operates at the network layer thus enabling a wide range ...
Asoni, Daniele Enrico +4 more
core +2 more sources
Consent Verification Under Evolving Privacy Policies [PDF]
Personal data provides important business value, for example, in the personalization of services. In addition, companies are moving toward new business models, in which products and services are offered without charge to users, but in exchange for ...
D. Breaux, Travis +3 more
core +1 more source
An experiment on data sharing options designs for eHealth interventions
Background: With eHealth technology interventions, users' personal health data can be easily shared among different stakeholders. Users should decide with whom they want to share their data.
Valentina Bartali, Lex van Velsen
doaj +1 more source
A secure and efficient DSSE scheme with constant storage costs in smart devices
With the continuous development of the Internet of Things (IOT) and cloud computing, smart devices are playing an increasingly important role in users’ daily life.
Weiwei Yan, Sai Ji
doaj +1 more source
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild [PDF]
In this paper, we seek to better understand Android obfuscation and depict a holistic view of the usage of obfuscation through a large-scale investigation in the wild.
Chen, Kai +9 more
core +2 more sources

