Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities
JI Choi, KRB Butler - Security and Communication Networks, 2019 - Wiley Online Library
When two or more parties need to compute a common result while safeguarding their
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …
Preserving privacy in WiFi localization with plausible dummy locations
Benefiting from the development of wireless communication, WiFi localization plays a vital
role in various mobile applications. However, users' locations are breached by untrusted …
role in various mobile applications. However, users' locations are breached by untrusted …
Privacy-Preserving Localization using Enclaves
Localization is one form of cooperative spectrum sensing that lets multiple sensors work
together to estimate the location of a target transmitter. However, the requisite exchange of …
together to estimate the location of a target transmitter. However, the requisite exchange of …
Preserving Privacy in Wi-Fi Localization with Plausible Dummy Locations
G Zhang, P Zhao, A Zhang - Privacy Preservation in Distributed Systems …, 2024 - Springer
Benefiting from the development of wireless communication, Wi-Fi localization plays a vital
role in various mobile applications. However, users' locations are breached by untrusted …
role in various mobile applications. However, users' locations are breached by untrusted …
Enclave-based privacy-preserving localization: poster
In cooperative spectrum sensing, multiple sensors work together to perform tasks such as
localizing a target transmitter. However, the exchange of spectrum measurements leads to …
localizing a target transmitter. However, the exchange of spectrum measurements leads to …