The role of the adversary model in applied security research

Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …

Comprehensive survey on big data privacy protection

M Binjubeir, AA Ahmed, MAB Ismail, AS Sadiq… - IEEE …, 2019 - ieeexplore.ieee.org
In recent years, the ever-mounting problem of Internet phishing has been threatening the
secure propagation of sensitive data over the web, thereby resulting in either outright …

Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts

R Cheng, F Zhang, J Kos, W He… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Smart contracts are applications that execute on blockchains. Today they manage billions of
dollars in value and motivate visionary plans for pervasive blockchain deployment. While …

Sok: General purpose compilers for secure multi-party computation

M Hastings, B Hemenway, D Noble… - … IEEE symposium on …, 2019 - ieeexplore.ieee.org
Secure multi-party computation (MPC) allows a group of mutually distrustful parties to
compute a joint function on their inputs without revealing any information beyond the result …

Explicability? legibility? predictability? transparency? privacy? security? the emerging landscape of interpretable agent behavior

T Chakraborti, A Kulkarni, S Sreedharan… - Proceedings of the …, 2019 - ojs.aaai.org
There has been significant interest of late in generating behavior of agents that is
interpretable to the human (observer) in the loop. However, the work in this area has …

Towards an infrastructure enabling the internet of production

J Pennekamp, R Glebke, M Henze… - … on industrial cyber …, 2019 - ieeexplore.ieee.org
New levels of cross-domain collaboration between manufacturing companies throughout the
supply chain are anticipated to bring benefits to both suppliers and consumers of products …

Conclave: secure multi-party computation on big data

N Volgushev, M Schwarzkopf, B Getchell… - Proceedings of the …, 2019 - dl.acm.org
Secure Multi-Party Computation (MPC) allows mutually distrusting parties to run joint
computations without revealing private data. Current MPC algorithms scale poorly with data …

Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network

C Gao, Q Cheng, X Li, S Xia - Cluster Computing, 2019 - Springer
Making new friends by measuring the proximity of people's profile is a crucial service in
mobile social networks. With the rapid development of cloud computing, outsourcing …

Dataflow challenges in an internet of production: a security & privacy perspective

J Pennekamp, M Henze, S Schmidt… - Proceedings of the …, 2019 - dl.acm.org
The Internet of Production (IoP) envisions the interconnection of previously isolated CPS in
the area of manufacturing across institutional boundaries to realize benefits such as …

A market-based framework for multi-resource allocation in fog computing

DT Nguyen, LB Le, VK Bhargava - IEEE/ACM Transactions on …, 2019 - ieeexplore.ieee.org
Fog computing is transforming the network edge into an intelligent platform by bringing
storage, computing, control, and networking functions closer to end users, things, and …