Security in cloud computing: Opportunities and challenges

M Ali, SU Khan, AV Vasilakos - Information sciences, 2015 - Elsevier
The cloud computing exhibits, remarkable potential to provide cost effective, easy to
manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing …

Security, privacy, and decentralized trust management in VANETs: a review of current research and future directions

M AlMarshoud, M Sabir Kiraz, A H. Al-Bayatti - ACM Computing Surveys, 2024 - dl.acm.org
Vehicular Ad Hoc Networks (VANETs) are powerful platforms for vehicular data services and
applications. The increasing number of vehicles has made the vehicular network diverse …

Indistinguishability obfuscation from well-founded assumptions

A Jain, H Lin, A Sahai - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …

Bulletproofs: Short proofs for confidential transactions and more

B Bünz, J Bootle, D Boneh, A Poelstra… - … IEEE symposium on …, 2018 - ieeexplore.ieee.org
We propose Bulletproofs, a new non-interactive zero-knowledge proof protocol with very
short proofs and without a trusted setup; the proof size is only logarithmic in the witness size …

Scalable, transparent, and post-quantum secure computational integrity

E Ben-Sasson, I Bentov, Y Horesh… - Cryptology ePrint …, 2018 - eprint.iacr.org
Human dignity demands that personal information, like medical and forensic data, be hidden
from the public. But veils of secrecy designed to preserve privacy may also be abused to …

Security and privacy for cloud-based IoT: Challenges

J Zhou, Z Cao, X Dong… - IEEE Communications …, 2017 - ieeexplore.ieee.org
The Internet of Things is increasingly becoming a ubiquitous computing service, requiring
huge volumes of data storage and processing. Unfortunately, due to the unique …

BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0

C Lin, D He, X Huang, KKR Choo… - Journal of network and …, 2018 - Elsevier
To be prepared for the 'Industry 4.0'-era, we propose a hierarchical framework comprising
four tangible layers, which is designed to vertically integrate inter-organizational value …

Scalable zero knowledge with no trusted setup

E Ben-Sasson, I Bentov, Y Horesh… - Advances in Cryptology …, 2019 - Springer
One of the approaches to constructing zero knowledge (ZK) arguments relies on “PCP
techniques” that date back to influential works from the early 1990's Babai et al., Arora et al …

Redactable blockchain–or–rewriting history in bitcoin and friends

G Ateniese, B Magri, D Venturi… - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
We put forward a new framework that makes it possible to re-write or compress the content
of any number of blocks in decentralized services exploiting the blockchain technology. As …

Accountable algorithms

JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …