Results 21 to 30 of about 8,550 (197)

Privacy-Aware Processing of Biometric Templates by Means of Secure Two-Party Computation [PDF]

open access: yes, 2013
The use of biometric data for person identification and access control is gaining more and more popularity. Handling biometric data, however, requires particular care, since biometric data is indissolubly tied to the identity of the owner hence raising ...
Barni, M.   +2 more
core   +1 more source

Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications [PDF]

open access: yes, 2017
We present Chameleon, a novel hybrid (mixed-protocol) framework for secure function evaluation (SFE) which enables two parties to jointly compute a function without disclosing their private inputs.
Koushanfar, Farinaz   +5 more
core   +2 more sources

Entangled cloud storage [PDF]

open access: yes, 2016
Entangled cloud storage (Aspnes et al., ESORICS 2004) enables a set of clients to “entangle” their files into a single clew to be stored by a (potentially malicious) cloud provider.
Ateniese, Giuseppe   +3 more
core   +1 more source

Fully leakage-resilient signatures revisited: Graceful degradation, noisy leakage, and construction in the bounded-retrieval model [PDF]

open access: yes, 2016
We construct new leakage-resilient signature schemes. Our schemes remain unforgeable against an adversary leaking arbitrary (yet bounded) information on the entire state of the signer (sometimes known as fully leakage resilience), including the random ...
Buus Nielsen, Jesper   +2 more
core   +2 more sources

REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]

open access: yes, 2020
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall   +2 more
core   +2 more sources

PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension

open access: yesBMC Medical Genomics, 2017
Background Advances in DNA sequencing technologies have prompted a wide range of genomic applications to improve healthcare and facilitate biomedical research.
Feng Chen   +9 more
doaj   +1 more source

Oblivious network intrusion detection systems

open access: yesScientific Reports, 2023
A main function of network intrusion detection systems (NIDSs) is to monitor network traffic and match it against rules. Oblivious NIDSs (O-NIDS) perform the same tasks of NIDSs but they use encrypted rules and produce encrypted results without being ...
Mahmoud AbdelHafeez Sayed, Mostafa Taha
doaj   +1 more source

Cloud-based Quadratic Optimization with Partially Homomorphic Encryption [PDF]

open access: yes, 2019
The development of large-scale distributed control systems has led to the outsourcing of costly computations to cloud-computing platforms, as well as to concerns about privacy of the collected sensitive data.
Alexandru, Andreea B.   +5 more
core   +2 more sources

Lattice-Based proof of a shuffle [PDF]

open access: yes, 2019
In this paper we present the first fully post-quantum proof of a shuffle for RLWE encryption schemes. Shuffles are commonly used to construct mixing networks (mix-nets), a key element to ensure anonymity in many applications such as electronic voting ...
Costa, Nuria   +2 more
core   +1 more source

Security and Efficiency Analysis of the Hamming Distance Computation Protocol Based on Oblivious Transfer [PDF]

open access: yes, 2015
open access articleBringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme uses Oblivious Transfer and provides security in the semi-honest model.
Asharov   +32 more
core   +3 more sources

Home - About - Disclaimer - Privacy