Privacy-preserving data mining: methods, metrics, and applications

R Mendes, JP Vilela - IEEE Access, 2017 - ieeexplore.ieee.org
The collection and analysis of data are continuously growing due to the pervasiveness of
computing devices. The analysis of such information is fostering businesses and …

Security vulnerabilities against fingerprint biometric system

M Joshi, B Mazumdar, S Dey - arXiv preprint arXiv:1805.07116, 2018 - arxiv.org
The biometric system is an automatic identification and authentication system that uses
unique biological traits, such as fingerprint, face, iris, voice, retina, etc. of an individual. Of all …

Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks

E Luo, Q Liu, JH Abawajy, G Wang - Future Generation Computer Systems, 2017 - Elsevier
Proximity-based mobile social networks (PMSNs) enable users to easily discover and foster
social interactions with others through user-profile matching. The user profiles in PMSNs …

A novel quantum protocol for secure hamming distance computation

Z Peng, R Shi, R Ding, F Zhang - Quantum Information Processing, 2024 - Springer
Secure hamming distance computation is an important primitive of secure multiparty
computation, enabling two parties to jointly compute the hamming distance without revealing …

[HTML][HTML] PINIALKhan-butt. 移动社交网络中跨域代理重加密朋友发现隐私保护方案研究

罗恩韬, 王国军, 陈淑红 - 通信学报, 2017 - infocomm-journal.com
在移动社交网络中, 为保证交友过程中的用户隐私, 提出跨域环境下的代理重加密交友隐私保护
方案. 利用跨域多授权中心共享密钥, 实现了跨域用户数据的互相访问与共享; …

[PDF][PDF] Privacy preserving unstructured data publishing (PPUDP) approach for big data

RS AN, P Kiran - Int. J. Comput. Appl, 2019 - researchgate.net
The current trend related to Computer Industry is Big Data Analytics (BDA). The key
attributes of Big Data are Volume, Variety, and Velocity. Big Data Analytics mainly focuses …

A Comprehensive Analysis on the Leakage of Fuzzy Matchers

A Durbet, PM Grollemund… - arXiv preprint arXiv …, 2023 - arxiv.org
The present paper presents a comprehensive analysis of potential information leakage in
distance evaluation, with a specific emphasis on threshold-based obfuscated distance (ie …

Shaip: Secure hamming distance for authentication of intrinsic PUFs

SU Hussain, MS Riazi, F Koushanfar - ACM Transactions on Design …, 2018 - dl.acm.org
In this article, we present SHAIP, a secure Hamming distance–based mutual authentication
protocol. It allows an unlimited number of authentications by employing an intrinsic Physical …

Two quantum protocols for secure hamming distance computation

Z Peng, R Shi, P Wang, S Zhang - Quantum Information Processing, 2019 - Springer
Secure hamming distance computation occupies a vital position in secure multiparty
computation, which allows two parties to jointly compute the hamming distance without …

Boosting GSHADE capabilities: New applications and security in malicious setting

J Bringer, O El Omri, C Morel, H Chabanne - Proceedings of the 21st …, 2016 - dl.acm.org
The secure two-party computation (S2PC) protocols SHADE and GSHADE have been
introduced by Bringer et al. in the last two years. The protocol GSHADE permits to compute …