The transparency challenge of blockchain in organizations
This position paper discusses the challenges of blockchain applications in businesses and
the public sector related to an excessive degree of transparency. We first point out the types …
the public sector related to an excessive degree of transparency. We first point out the types …
Privacy issues and data protection in big data: a case study analysis under GDPR
Big data has become a great asset for many organizations, promising improved operations
and new business opportunities. However, big data has increased access to sensitive …
and new business opportunities. However, big data has increased access to sensitive …
The cookie hunter: Automated black-box auditing for web authentication and authorization flaws
In this paper, we focus on authentication and authorization flaws in web apps that enable
partial or full access to user accounts. Specifically, we develop a novel fully automated black …
partial or full access to user accounts. Specifically, we develop a novel fully automated black …
Exploring the use of self-sovereign identity for event ticketing systems
Ticket fraud and ticket scalping activities often cause high costs as well as trust concerns for
fans buying event tickets, especially in the secondary ticketing market. To address these …
fans buying event tickets, especially in the secondary ticketing market. To address these …
Using blockchain in cloud computing to enhance relational database security
R Awadallah, A Samsudin - IEEE Access, 2021 - ieeexplore.ieee.org
Cloud computing has now become a very standardised concept in our society. However,
many modern applications need a better level of security that includes saving data from …
many modern applications need a better level of security that includes saving data from …
All the numbers are US: large-scale abuse of contact discovery in mobile messengers
Contact discovery allows users of mobile messengers to conveniently connect with people
in their address book. In this work, we demonstrate that severe privacy issues exist in …
in their address book. In this work, we demonstrate that severe privacy issues exist in …
{PrivateDrop}: Practical {Privacy-Preserving} Authentication for Apple {AirDrop}
Apple's offline file-sharing service AirDrop is integrated into more than 1.5 billion end-user
devices worldwide. We discovered two design flaws in the underlying protocol that allow …
devices worldwide. We discovered two design flaws in the underlying protocol that allow …
Information privacy in decentralized applications
M Platt, RJ Bandara, AE Drăgnoiu… - Trust models for next …, 2021 - Springer
Numerous reviews of decentralized applications using Blockchain have been published in
recent years. However, these have predominantly focused on how applications map to the …
recent years. However, these have predominantly focused on how applications map to the …
Discontinued privacy: Personal data leaks in apple bluetooth-low-energy continuity protocols
G Celosia, M Cunche - Proceedings on Privacy Enhancing …, 2020 - inria.hal.science
Apple Continuity protocols are the underlying network component of Apple Continuity
services which allow seamless nearby applications such as activity and file transfer, device …
services which allow seamless nearby applications such as activity and file transfer, device …
Privacy-preserving crowd-monitoring using bloom filters and homomorphic encryption
This paper introduces an architecture for crowd-monitoring which allows statistical counting
for pedestrian dynamics while considering privacy-preservation for the individuals being …
for pedestrian dynamics while considering privacy-preservation for the individuals being …