The role of the adversary model in applied security research
Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …
schemes or protocols. However, their use in other computer science research disciplines is …
Comprehensive survey on big data privacy protection
In recent years, the ever-mounting problem of Internet phishing has been threatening the
secure propagation of sensitive data over the web, thereby resulting in either outright …
secure propagation of sensitive data over the web, thereby resulting in either outright …
Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts
Smart contracts are applications that execute on blockchains. Today they manage billions of
dollars in value and motivate visionary plans for pervasive blockchain deployment. While …
dollars in value and motivate visionary plans for pervasive blockchain deployment. While …
Sok: General purpose compilers for secure multi-party computation
Secure multi-party computation (MPC) allows a group of mutually distrustful parties to
compute a joint function on their inputs without revealing any information beyond the result …
compute a joint function on their inputs without revealing any information beyond the result …
Explicability? legibility? predictability? transparency? privacy? security? the emerging landscape of interpretable agent behavior
There has been significant interest of late in generating behavior of agents that is
interpretable to the human (observer) in the loop. However, the work in this area has …
interpretable to the human (observer) in the loop. However, the work in this area has …
Towards an infrastructure enabling the internet of production
New levels of cross-domain collaboration between manufacturing companies throughout the
supply chain are anticipated to bring benefits to both suppliers and consumers of products …
supply chain are anticipated to bring benefits to both suppliers and consumers of products …
Conclave: secure multi-party computation on big data
N Volgushev, M Schwarzkopf, B Getchell… - Proceedings of the …, 2019 - dl.acm.org
Secure Multi-Party Computation (MPC) allows mutually distrusting parties to run joint
computations without revealing private data. Current MPC algorithms scale poorly with data …
computations without revealing private data. Current MPC algorithms scale poorly with data …
Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network
C Gao, Q Cheng, X Li, S Xia - Cluster Computing, 2019 - Springer
Making new friends by measuring the proximity of people's profile is a crucial service in
mobile social networks. With the rapid development of cloud computing, outsourcing …
mobile social networks. With the rapid development of cloud computing, outsourcing …
Dataflow challenges in an internet of production: a security & privacy perspective
J Pennekamp, M Henze, S Schmidt… - Proceedings of the …, 2019 - dl.acm.org
The Internet of Production (IoP) envisions the interconnection of previously isolated CPS in
the area of manufacturing across institutional boundaries to realize benefits such as …
the area of manufacturing across institutional boundaries to realize benefits such as …
A market-based framework for multi-resource allocation in fog computing
Fog computing is transforming the network edge into an intelligent platform by bringing
storage, computing, control, and networking functions closer to end users, things, and …
storage, computing, control, and networking functions closer to end users, things, and …