Results 11 to 20 of about 126,001 (163)

ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption

open access: yesIACR Transactions on Symmetric Cryptology, 2019
We define ZOCB and ZOTR for nonce-based authenticated encryption with associated data, and analyze their provable security. These schemes use a tweakable blockcipher (TBC) as the underlying primitive, and fully utilize its input to process a plaintext ...
Zhenzhen Bao   +2 more
doaj   +1 more source

Privacy-Preserving Facial Recognition Using Biometric-Capsules [PDF]

open access: yes, 2020
Indiana University-Purdue University Indianapolis (IUPUI)In recent years, developers have used the proliferation of biometric sensors in smart devices, along with recent advances in deep learning, to implement an array of biometrics-based recognition ...
Phillips, Tyler S.
core   +1 more source

Boomerang Connectivity Table Revisited. Application to SKINNY and AES

open access: yesIACR Transactions on Symmetric Cryptology, 2019
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as the composition of two sub-ciphers, i.e., E = E1 o E0, and which constructs distinguishers for E with probability p2q2 by combining differential trails for ...
Ling Song, Xianrui Qin, Lei Hu
doaj   +1 more source

The Novel Location Privacy-Preserving CKD for Mobile Crowdsourcing Systems

open access: yesIEEE Access, 2018
With the development of mobile devices, mobile crowdsourcing has become the research hotspot in mobile crowd sensing networks (MCSS). How to protect the location privacy of mobile user in location-based services is a key problem in MCSS.
Zhongyang Chi   +3 more
doaj   +1 more source

Privacy-Preserving Blockchain Technologies

open access: yesSensors, 2023
The main characteristics of blockchains, such as security and traceability, have enabled their use in many distinct scenarios, such as the rise of new cryptocurrencies and decentralized applications (dApps).
Dalton Cézane Gomes Valadares   +4 more
doaj   +1 more source

Development and Analysis of Deterministic Privacy-Preserving Policies Using Non-Stochastic Information Theory [PDF]

open access: yes, 2019
A deterministic privacy metric using non-stochastic information theory is developed. Particularly, minimax information is used to construct a measure of information leakage, which is inversely proportional to the measure of privacy.
Farokhi, Farhad
core   +2 more sources

Privacy-Preserving Passive DNS

open access: yesComputers, 2020
The Domain Name System (DNS) was created to resolve the IP addresses of web servers to easily remembered names. When it was initially created, security was not a major concern; nowadays, this lack of inherent security and trust has exposed the global DNS
Pavlos Papadopoulos   +4 more
doaj   +1 more source

Privacy-Preserving Monotonicity of Differential Privacy Mechanisms

open access: yesApplied Sciences, 2018
Differential privacy mechanisms can offer a trade-off between privacy and utility by using privacy metrics and utility metrics. The trade-off of differential privacy shows that one thing increases and another decreases in terms of privacy metrics and ...
Hai Liu   +5 more
doaj   +1 more source

My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud [PDF]

open access: yes, 2011
Based on the assumption that cloud providers can be trusted (to a certain extent) we define a trust, security and privacy preserving infrastructure that relies on trusted cloud providers to operate properly.
Alhadeff, Joseph   +4 more
core   +3 more sources

Privacy-preserving machine learning based on secure three-party computations

open access: yesБезопасность информационных технологий, 2022
The paper is devoted to the analysis of privacy-preserving machine learning systems based on the concept of secure three-party computations. After general information about the purposes of secure multi-party computations and privacy-preserving machine ...
Sergey V. Zapechnikov
doaj   +1 more source

Home - About - Disclaimer - Privacy