Results 11 to 20 of about 126,001 (163)
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption
We define ZOCB and ZOTR for nonce-based authenticated encryption with associated data, and analyze their provable security. These schemes use a tweakable blockcipher (TBC) as the underlying primitive, and fully utilize its input to process a plaintext ...
Zhenzhen Bao +2 more
doaj +1 more source
Privacy-Preserving Facial Recognition Using Biometric-Capsules [PDF]
Indiana University-Purdue University Indianapolis (IUPUI)In recent years, developers have used the proliferation of biometric sensors in smart devices, along with recent advances in deep learning, to implement an array of biometrics-based recognition ...
Phillips, Tyler S.
core +1 more source
Boomerang Connectivity Table Revisited. Application to SKINNY and AES
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as the composition of two sub-ciphers, i.e., E = E1 o E0, and which constructs distinguishers for E with probability p2q2 by combining differential trails for ...
Ling Song, Xianrui Qin, Lei Hu
doaj +1 more source
The Novel Location Privacy-Preserving CKD for Mobile Crowdsourcing Systems
With the development of mobile devices, mobile crowdsourcing has become the research hotspot in mobile crowd sensing networks (MCSS). How to protect the location privacy of mobile user in location-based services is a key problem in MCSS.
Zhongyang Chi +3 more
doaj +1 more source
Privacy-Preserving Blockchain Technologies
The main characteristics of blockchains, such as security and traceability, have enabled their use in many distinct scenarios, such as the rise of new cryptocurrencies and decentralized applications (dApps).
Dalton Cézane Gomes Valadares +4 more
doaj +1 more source
Development and Analysis of Deterministic Privacy-Preserving Policies Using Non-Stochastic Information Theory [PDF]
A deterministic privacy metric using non-stochastic information theory is developed. Particularly, minimax information is used to construct a measure of information leakage, which is inversely proportional to the measure of privacy.
Farokhi, Farhad
core +2 more sources
Privacy-Preserving Passive DNS
The Domain Name System (DNS) was created to resolve the IP addresses of web servers to easily remembered names. When it was initially created, security was not a major concern; nowadays, this lack of inherent security and trust has exposed the global DNS
Pavlos Papadopoulos +4 more
doaj +1 more source
Privacy-Preserving Monotonicity of Differential Privacy Mechanisms
Differential privacy mechanisms can offer a trade-off between privacy and utility by using privacy metrics and utility metrics. The trade-off of differential privacy shows that one thing increases and another decreases in terms of privacy metrics and ...
Hai Liu +5 more
doaj +1 more source
My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud [PDF]
Based on the assumption that cloud providers can be trusted (to a certain extent) we define a trust, security and privacy preserving infrastructure that relies on trusted cloud providers to operate properly.
Alhadeff, Joseph +4 more
core +3 more sources
Privacy-preserving machine learning based on secure three-party computations
The paper is devoted to the analysis of privacy-preserving machine learning systems based on the concept of secure three-party computations. After general information about the purposes of secure multi-party computations and privacy-preserving machine ...
Sergey V. Zapechnikov
doaj +1 more source

