[PDF][PDF] The tangled web of password reuse.
Today's Internet services rely heavily on text-based passwords for user authentication. The
pervasiveness of these services coupled with the difficulty of remembering large numbers of …
pervasiveness of these services coupled with the difficulty of remembering large numbers of …
Privacy-preserving Scanpath Comparison for Pervasive Eye Tracking
As eye tracking becomes pervasive with screen-based devices and head-mounted displays,
privacy concerns regarding eye-tracking data have escalated. While state-of-the-art …
privacy concerns regarding eye-tracking data have escalated. While state-of-the-art …
Encrypted integer division and secure comparison
T Veugen - International Journal of Applied Cryptography, 2014 - inderscienceonline.com
When processing data in the encrypted domain, homomorphic encryption can be used to
enable linear operations on encrypted data. Integer division of encrypted data however …
enable linear operations on encrypted data. Integer division of encrypted data however …
Privacy preserving probabilistic inference with hidden Markov models
Alice possesses a sample of private data from which she wishes to obtain some probabilistic
inference. Bob possesses Hidden Markov Models (HMMs) for this purpose, but he wants the …
inference. Bob possesses Hidden Markov Models (HMMs) for this purpose, but he wants the …
Privacy-preserving text mining as a service
Text mining is the process to automatically infer relevant information from semantically
related text documents. This technique, which has applications from business intelligence to …
related text documents. This technique, which has applications from business intelligence to …
Privacy-preserving edit distance computation using secret-sharing two-party computation
The edit distance is a metric widely used in genomics to measure the similarity of two DNA
chains. Motivated by privacy concerns, we propose a 2PC protocol to compute the edit …
chains. Motivated by privacy concerns, we propose a 2PC protocol to compute the edit …
Secure similarity verification between homomorphically encrypted signals
A method for verifying a similarity between a first signal and a second signal is described.
The first and the second signals are encrypted homomorphically using a key. First, we …
The first and the second signals are encrypted homomorphically using a key. First, we …
Confidential machine learning on untrusted platforms: a survey
With the ever-growing data and the need for developing powerful machine learning models,
data owners increasingly depend on various untrusted platforms (eg, public clouds, edges …
data owners increasingly depend on various untrusted platforms (eg, public clouds, edges …
Fingerprinting web browser for tracing anonymous web attackers
X Liu, Q Liu, X Wang, Z Jia - 2016 IEEE First International …, 2016 - ieeexplore.ieee.org
As web attackers hide themselves by using multi-step springboard (eg, VPN, encrypted
proxy) or anonymous network (ie Tor network), it raises a big obstacle for traceability and …
proxy) or anonymous network (ie Tor network), it raises a big obstacle for traceability and …
Micro-honeypot: using browser fingerprinting to track attackers
Z Jia, X Cui, Q Liu, X Wang, C Liu - 2018 IEEE Third …, 2018 - ieeexplore.ieee.org
Web attacks have proliferated across the whole Internet in recent years. To protect websites,
security vendors and researchers collect attack information using web honeypots. However …
security vendors and researchers collect attack information using web honeypots. However …