Privacy-preserving data mining: methods, metrics, and applications
The collection and analysis of data are continuously growing due to the pervasiveness of
computing devices. The analysis of such information is fostering businesses and …
computing devices. The analysis of such information is fostering businesses and …
Security vulnerabilities against fingerprint biometric system
The biometric system is an automatic identification and authentication system that uses
unique biological traits, such as fingerprint, face, iris, voice, retina, etc. of an individual. Of all …
unique biological traits, such as fingerprint, face, iris, voice, retina, etc. of an individual. Of all …
Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks
Proximity-based mobile social networks (PMSNs) enable users to easily discover and foster
social interactions with others through user-profile matching. The user profiles in PMSNs …
social interactions with others through user-profile matching. The user profiles in PMSNs …
A novel quantum protocol for secure hamming distance computation
Z Peng, R Shi, R Ding, F Zhang - Quantum Information Processing, 2024 - Springer
Secure hamming distance computation is an important primitive of secure multiparty
computation, enabling two parties to jointly compute the hamming distance without revealing …
computation, enabling two parties to jointly compute the hamming distance without revealing …
[HTML][HTML] PINIALKhan-butt. 移动社交网络中跨域代理重加密朋友发现隐私保护方案研究
罗恩韬, 王国军, 陈淑红 - 通信学报, 2017 - infocomm-journal.com
在移动社交网络中, 为保证交友过程中的用户隐私, 提出跨域环境下的代理重加密交友隐私保护
方案. 利用跨域多授权中心共享密钥, 实现了跨域用户数据的互相访问与共享; …
方案. 利用跨域多授权中心共享密钥, 实现了跨域用户数据的互相访问与共享; …
[PDF][PDF] Privacy preserving unstructured data publishing (PPUDP) approach for big data
RS AN, P Kiran - Int. J. Comput. Appl, 2019 - researchgate.net
The current trend related to Computer Industry is Big Data Analytics (BDA). The key
attributes of Big Data are Volume, Variety, and Velocity. Big Data Analytics mainly focuses …
attributes of Big Data are Volume, Variety, and Velocity. Big Data Analytics mainly focuses …
A Comprehensive Analysis on the Leakage of Fuzzy Matchers
A Durbet, PM Grollemund… - arXiv preprint arXiv …, 2023 - arxiv.org
The present paper presents a comprehensive analysis of potential information leakage in
distance evaluation, with a specific emphasis on threshold-based obfuscated distance (ie …
distance evaluation, with a specific emphasis on threshold-based obfuscated distance (ie …
Shaip: Secure hamming distance for authentication of intrinsic PUFs
In this article, we present SHAIP, a secure Hamming distance–based mutual authentication
protocol. It allows an unlimited number of authentications by employing an intrinsic Physical …
protocol. It allows an unlimited number of authentications by employing an intrinsic Physical …
Two quantum protocols for secure hamming distance computation
Z Peng, R Shi, P Wang, S Zhang - Quantum Information Processing, 2019 - Springer
Secure hamming distance computation occupies a vital position in secure multiparty
computation, which allows two parties to jointly compute the hamming distance without …
computation, which allows two parties to jointly compute the hamming distance without …
Boosting GSHADE capabilities: New applications and security in malicious setting
J Bringer, O El Omri, C Morel, H Chabanne - Proceedings of the 21st …, 2016 - dl.acm.org
The secure two-party computation (S2PC) protocols SHADE and GSHADE have been
introduced by Bringer et al. in the last two years. The protocol GSHADE permits to compute …
introduced by Bringer et al. in the last two years. The protocol GSHADE permits to compute …