Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities

JI Choi, KRB Butler - Security and Communication Networks, 2019 - Wiley Online Library
When two or more parties need to compute a common result while safeguarding their
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …

Preserving privacy in WiFi localization with plausible dummy locations

P Zhao, W Liu, G Zhang, Z Li… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Benefiting from the development of wireless communication, WiFi localization plays a vital
role in various mobile applications. However, users' locations are breached by untrusted …

Privacy-Preserving Localization using Enclaves

A Khan, JI Choi, DJ Tian, T Ward… - 2021 IEEE 12th …, 2021 - ieeexplore.ieee.org
Localization is one form of cooperative spectrum sensing that lets multiple sensors work
together to estimate the location of a target transmitter. However, the requisite exchange of …

Preserving Privacy in Wi-Fi Localization with Plausible Dummy Locations

G Zhang, P Zhao, A Zhang - Privacy Preservation in Distributed Systems …, 2024 - Springer
Benefiting from the development of wireless communication, Wi-Fi localization plays a vital
role in various mobile applications. However, users' locations are breached by untrusted …

Enclave-based privacy-preserving localization: poster

JI Choi, D Tian, T Ward, KRB Butler, P Traynor… - Proceedings of the 12th …, 2019 - dl.acm.org
In cooperative spectrum sensing, multiple sensors work together to perform tasks such as
localizing a target transmitter. However, the exchange of spectrum measurements leads to …