Privacy-preserving reputation systems based on blockchain and other cryptographic building blocks: A survey

O Hasan, L Brunie, E Bertino - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
The purpose of a reputation system is to hold the users of a distributed application
accountable for their behavior. The reputation of a user is computed as an aggregate of the …

Carpooling in connected and autonomous vehicles: current solutions and future directions

F Zafar, HA Khattak, M Aloqaily, R Hussain - ACM Computing Surveys …, 2022 - dl.acm.org
Owing to the advancements in communication and computation technologies, the dream of
commercialized connected and autonomous cars is becoming a reality. However, among …

TrustCloud: A framework for accountability and trust in cloud computing

RKL Ko, P Jagadpramana, M Mowbray… - 2011 IEEE World …, 2011 - ieeexplore.ieee.org
The key barrier to widespread uptake of cloud computing is the lack of trust in clouds by
potential customers. While preventive controls for security and privacy are actively …

Ironclad apps:{End-to-End} security via automated {Full-System} verification

C Hawblitzel, J Howell, JR Lorch, A Narayan… - … USENIX Symposium on …, 2014 - usenix.org
An Ironclad App lets a user securely transmit her data to a remote machine with the
guarantee that every instruction executed on that machine adheres to a formal abstract …

Predicting secret keys via branch prediction

O Acıiçmez, ÇK Koç, JP Seifert - Topics in Cryptology–CT-RSA 2007: The …, 2006 - Springer
This paper announces a new software side-channel attack—enabled by the branch
prediction capability common to all modern high-performance CPUs. The penalty paid (extra …

Seeing-is-believing: Using camera phones for human-verifiable authentication

JM McCune, A Perrig, MK Reiter - 2005 IEEE Symposium on …, 2005 - ieeexplore.ieee.org
Current mechanisms for authenticating communication between devices that share no prior
context are inconvenient for ordinary users, without the assistance of a trusted authority. We …

Principles of remote attestation

G Coker, J Guttman, P Loscocco, A Herzog… - International Journal of …, 2011 - Springer
Remote attestation is the activity of making a claim about properties of a target by supplying
evidence to an appraiser over a network. We identify five central principles to guide …

On the power of simple branch prediction analysis

O Aciiçmez, ÇK Koç, JP Seifert - … of the 2nd ACM symposium on …, 2007 - dl.acm.org
Very recently, a new software side-channel attack, called Branch Prediction Analysis (BPA)
attack, has been discovered and also demonstrated to be practically feasible on popular …

Privacy management of personal data

MC Mont, KA Harrison, M Sadler… - US Patent 7,398,393, 2008 - Google Patents
As used herein, the term “personal data'is intended to include data such as identity data and
profile data (for example, preference data and financial data) of a party to which the data …

A privacy manager for cloud computing

S Pearson, Y Shen, M Mowbray - … 2009, Beijing, China, December 1-4 …, 2009 - Springer
We describe a privacy manager for cloud computing, which reduces the risk to the cloud
computing user of their private data being stolen or misused, and also assists the cloud …