Preserving privacy in speaker and speech characterisation
Speech recordings are a rich source of personal, sensitive data that can be used to support
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …
Intel software guard extensions applications: A survey
NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …
sensitive data from users and companies are being increasingly delegated to such systems …
Private web search with Tiptoe
Tiptoe is a private web search engine that allows clients to search over hundreds of millions
of documents, while revealing no information about their search query to the search engine's …
of documents, while revealing no information about their search query to the search engine's …
Bringing decentralized search to decentralized services
This paper addresses a key missing piece in the current ecosystem of decentralized
services and blockchain apps: the lack of decentralized, verifiable, and private search …
services and blockchain apps: the lack of decentralized, verifiable, and private search …
Security, performance and energy trade-offs of hardware-assisted memory protection mechanisms
The deployment of large-scale distributed systems, eg, publish-subscribe platforms, that
operate over sensitive data using the infrastructure of public cloud providers, is nowadays …
operate over sensitive data using the infrastructure of public cloud providers, is nowadays …
HiPDS: A Storage Hardware-independent Plausibly Deniable Storage System
A plausibly deniable storage (PDS) system not only conceals the plaintext of sensitive data,
but also hides their very existence. It can essentially mitigate a novel coercive attack, in …
but also hides their very existence. It can essentially mitigate a novel coercive attack, in …
EActors: Fast and flexible trusted computing using SGX
Novel trusted execution support, as offered by Intel's Software Guard eXtensions (SGX),
embeds seamlessly into user space applications by establishing regions of encrypted …
embeds seamlessly into user space applications by establishing regions of encrypted …
CYCLOSA: Decentralizing private web search through SGX-based browser extensions
By regularly querying Web search engines, users (unconsciously) disclose large amounts of
their personal data as part of their search queries, among which some might reveal sensitive …
their personal data as part of their search queries, among which some might reveal sensitive …
EnclaveCache: A secure and scalable key-value cache in multi-tenant clouds using Intel SGX
With in-memory key-value caches such as Redis and Memcached being a key component
for many systems to improve throughput and reduce latency, cloud caches have been widely …
for many systems to improve throughput and reduce latency, cloud caches have been widely …
QuPiD Attack: Machine Learning‐Based Privacy Quantification Mechanism for PIR Protocols in Health‐Related Web Search
With the advancement in ICT, web search engines have become a preferred source to find
health‐related information published over the Internet. Google alone receives more than …
health‐related information published over the Internet. Google alone receives more than …