Preserving privacy in speaker and speech characterisation

A Nautsch, A Jiménez, A Treiber, J Kolberg… - Computer Speech & …, 2019 - Elsevier
Speech recordings are a rich source of personal, sensitive data that can be used to support
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …

Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

Private web search with Tiptoe

A Henzinger, E Dauterman, H Corrigan-Gibbs… - Proceedings of the 29th …, 2023 - dl.acm.org
Tiptoe is a private web search engine that allows clients to search over hundreds of millions
of documents, while revealing no information about their search query to the search engine's …

Bringing decentralized search to decentralized services

M Li, J Zhu, T Zhang, C Tan, Y Xia, S Angel… - … USENIX} Symposium on …, 2021 - usenix.org
This paper addresses a key missing piece in the current ecosystem of decentralized
services and blockchain apps: the lack of decentralized, verifiable, and private search …

Security, performance and energy trade-offs of hardware-assisted memory protection mechanisms

C Göttel, R Pires, I Rocha, S Vaucher… - 2018 IEEE 37th …, 2018 - ieeexplore.ieee.org
The deployment of large-scale distributed systems, eg, publish-subscribe platforms, that
operate over sensitive data using the infrastructure of public cloud providers, is nowadays …

HiPDS: A Storage Hardware-independent Plausibly Deniable Storage System

N Chen, B Chen - IEEE Transactions on Information Forensics …, 2023 - ieeexplore.ieee.org
A plausibly deniable storage (PDS) system not only conceals the plaintext of sensitive data,
but also hides their very existence. It can essentially mitigate a novel coercive attack, in …

EActors: Fast and flexible trusted computing using SGX

VA Sartakov, S Brenner, S Ben Mokhtar… - Proceedings of the 19th …, 2018 - dl.acm.org
Novel trusted execution support, as offered by Intel's Software Guard eXtensions (SGX),
embeds seamlessly into user space applications by establishing regions of encrypted …

CYCLOSA: Decentralizing private web search through SGX-based browser extensions

R Pires, D Goltzsche, SB Mokhtar… - 2018 IEEE 38th …, 2018 - ieeexplore.ieee.org
By regularly querying Web search engines, users (unconsciously) disclose large amounts of
their personal data as part of their search queries, among which some might reveal sensitive …

EnclaveCache: A secure and scalable key-value cache in multi-tenant clouds using Intel SGX

L Chen, J Li, R Ma, H Guan, HA Jacobsen - Proceedings of the 20th …, 2019 - dl.acm.org
With in-memory key-value caches such as Redis and Memcached being a key component
for many systems to improve throughput and reduce latency, cloud caches have been widely …

QuPiD Attack: Machine Learning‐Based Privacy Quantification Mechanism for PIR Protocols in Health‐Related Web Search

R Khan, A Ahmad, AO Alsayed… - Scientific …, 2020 - Wiley Online Library
With the advancement in ICT, web search engines have become a preferred source to find
health‐related information published over the Internet. Google alone receives more than …