[PDF][PDF] The tangled web of password reuse.

A Das, J Bonneau, M Caesar, N Borisov, XF Wang - NDSS, 2014 - cs.umd.edu
Today's Internet services rely heavily on text-based passwords for user authentication. The
pervasiveness of these services coupled with the difficulty of remembering large numbers of …

Privacy-preserving Scanpath Comparison for Pervasive Eye Tracking

S Özdel, E Bozkir, E Kasneci - Proceedings of the ACM on Human …, 2024 - dl.acm.org
As eye tracking becomes pervasive with screen-based devices and head-mounted displays,
privacy concerns regarding eye-tracking data have escalated. While state-of-the-art …

Encrypted integer division and secure comparison

T Veugen - International Journal of Applied Cryptography, 2014 - inderscienceonline.com
When processing data in the encrypted domain, homomorphic encryption can be used to
enable linear operations on encrypted data. Integer division of encrypted data however …

Privacy preserving probabilistic inference with hidden Markov models

M Pathak, S Rane, W Sun, B Raj - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Alice possesses a sample of private data from which she wishes to obtain some probabilistic
inference. Bob possesses Hidden Markov Models (HMMs) for this purpose, but he wants the …

Privacy-preserving text mining as a service

G Costantino, A La Marra, F Martinelli… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Text mining is the process to automatically infer relevant information from semantically
related text documents. This technique, which has applications from business intelligence to …

Privacy-preserving edit distance computation using secret-sharing two-party computation

H Vanegas, D Cabarcas, DF Aranha - International Conference on …, 2023 - Springer
The edit distance is a metric widely used in genomics to measure the similarity of two DNA
chains. Motivated by privacy concerns, we propose a 2PC protocol to compute the edit …

Secure similarity verification between homomorphically encrypted signals

S Rane, W Sun, A Vetro - US Patent 8,249,250, 2012 - Google Patents
A method for verifying a similarity between a first signal and a second signal is described.
The first and the second signals are encrypted homomorphically using a key. First, we …

Confidential machine learning on untrusted platforms: a survey

S Sagar, C Keke - Cybersecurity, 2021 - Springer
With the ever-growing data and the need for developing powerful machine learning models,
data owners increasingly depend on various untrusted platforms (eg, public clouds, edges …

Fingerprinting web browser for tracing anonymous web attackers

X Liu, Q Liu, X Wang, Z Jia - 2016 IEEE First International …, 2016 - ieeexplore.ieee.org
As web attackers hide themselves by using multi-step springboard (eg, VPN, encrypted
proxy) or anonymous network (ie Tor network), it raises a big obstacle for traceability and …

Micro-honeypot: using browser fingerprinting to track attackers

Z Jia, X Cui, Q Liu, X Wang, C Liu - 2018 IEEE Third …, 2018 - ieeexplore.ieee.org
Web attacks have proliferated across the whole Internet in recent years. To protect websites,
security vendors and researchers collect attack information using web honeypots. However …