• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 99
Next 10 →

Multi-Observer Privacy-Preserving Hidden Markov Models

by Hung X. Nguyen, Matthew Roughan
"... Abstract—Detection of malicious traffic and network health problems would be much easier if ISPs shared their data. Unfortunately, they are reluctant to share because doing so would either violate privacy legislation or expose business secrets. However, secure distributed computation allows calculat ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
Abstract—Detection of malicious traffic and network health problems would be much easier if ISPs shared their data. Unfortunately, they are reluctant to share because doing so would either violate privacy legislation or expose business secrets. However, secure distributed computation allows

A New Framework for Privacy-Preserving Aggregation of

by unknown authors , 2015
"... Aggregator-oblivious encryption is a useful notion put forward by Shi et al. in 2011 that allows an untrusted aggregator to periodically compute an aggregate value over encrypted data contributed by a set of users. Such encryption schemes find numerous applications, in particular in the context of p ..."
Abstract - Add to MetaCart
of privacy-preserving smart metering. This paper presents a general framework for constructing privacy-preserving aggregator-oblivious encryp-tion schemes using a variant of Cramer-Shoup’s paradigm of smooth projective hashing. This abstraction leads to new schemes based on a variety of complexity

PPS: Privacy-Preserving Statistics using RFID Tags

by Erik-oliver Blass, Kaoutar Elkhiyaoui, Refik Molva, Eurecom Sophia Antipolis
"... Abstract. As RFID applications are entering our daily life, many new security and privacy challenges arise. However, current research in RFID security focuses mainly on simple authentication and privacy-preserving identification. In this pa-per, we widen the scope of RFID security and privacy by int ..."
Abstract - Add to MetaCart
and updates the global statistics accordingly. Therewith, PPS is provably privacy-preserving. Moreover, tags can be very simple since they are not required to perform any kind of computation, but only to store data. 1

Formal Analysis of a Privacy-Preserving Billing Protocol

by Ro Arm, Roberto Carbone, Alessio Merlo
"... Abstract. We provide a formal model and a security analysis of the Private Billing Protocol. This formal analysis allowed us to spell out precisely the details of the protocol, the security assumptions as well as the expected security goals. For the formal analysis we used SATMC, a model checker for ..."
Abstract - Add to MetaCart
for security protocol analysis that supports the specifica-tion of security assumptions and goals as LTL formulae. Further analysis that we conducted manually revealed that the protocol allows for imple-mentations that fail to meet the expected privacy goal. We describe the implications of our findings

Accelerated Profile HMM Searches

by Sean R. Eddy , 2011
"... Profile hidden Markov models (profile HMMs) and probabilistic inference methods have made important contributions to the theory of sequence database homology search. However, practical use of profile HMM methods has been hindered by the computational expense of existing software implementations. Her ..."
Abstract - Cited by 113 (6 self) - Add to MetaCart
Profile hidden Markov models (profile HMMs) and probabilistic inference methods have made important contributions to the theory of sequence database homology search. However, practical use of profile HMM methods has been hindered by the computational expense of existing software implementations

Abstract Privacy-preserving 1-n-p Negotiation protocol

by Sumit Chakraborty, Sushil Kumar Sharma, Asim Kumar Pal
"... In this paper, we have designed an electronic market where a buyer negotiates with n suppliers to procure p types of items within a given time frame. A privacy preserving 1-n-p negotiation protocol has been developed based on secure group communication and secure multiparty computation. The supplier ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
In this paper, we have designed an electronic market where a buyer negotiates with n suppliers to procure p types of items within a given time frame. A privacy preserving 1-n-p negotiation protocol has been developed based on secure group communication and secure multiparty computation

Hidden Markov models for sequence analysis: extension and analysis of the basic method

by Richard Hughey, Anders Krogh , 1996
"... Hidden Markov models (HMMs) are a highly effective means of modeling a family of unaligned sequences or a common motif within a set of unaligned sequences. The trained HMM can then be used for discrimination or multiple alignment. The basic mathematical description of an HMM and its expectation-maxi ..."
Abstract - Cited by 219 (23 self) - Add to MetaCart
Hidden Markov models (HMMs) are a highly effective means of modeling a family of unaligned sequences or a common motif within a set of unaligned sequences. The trained HMM can then be used for discrimination or multiple alignment. The basic mathematical description of an HMM and its expectation

EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid

by Hongwei Li, Xiaodong Lin, Haomiao Yang, Xiaohui Liang, Rongxing Lu, et al. , 2013
"... Smart grid has recently emerged as the next generation of power grid due to its distinguished features, such as distributed energy control, robust to load fluctuations, and close user-grid interactions. As a vital component of smart grid, demand response can maintain supply-demand balance and reduc ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
and efficient response. In addition, an adaptive key evolution technique is further investigated to ensure the users ’ session keys to be forward secure. Security analysis indicates that EPPDR can achieve privacy-preservation of electricity demand, forward secrecy of users ’ session keys, and evolution

A Privacy-preserving ID-based Group Key Agreement Scheme applied in VPAN

by Yoni De Mulder, Karel Wouters, Bart Preneel
"... Abstract. In 2008, Wan et al. presented an anonymous ID-based group key agreement scheme for wireless networks, for which they claim that it ensures anonymity and unlinkability of the group members, as well as forward and backward secrecy of the group session key. In this paper, we show that forward ..."
Abstract - Add to MetaCart
that forward and backward secrecy do not hold for the protocol. We propose a correction that introduces a shielding factor that protects each member’s input to the group key. we also introduce a new feature that assures the correctness of the key as computed by all group members. This results in an increased

PARK: A Privacy-preserving Aggregation Scheme with Adaptive Key Management for Smart Grid

by Kuan Zhang, Rongxing Lu, Xiaohui Liang, Jian Qiao, Xuemin (sherman Shen
"... Abstract—Smart Grid, as one kind of promising sustainable power systems, can rely on two-way communications and emerg-ing smart meters to intelligently control the residential electricity usage. However, due to the inherent open communication media as well as the limited communication, computation a ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
and storage capabilities of smart meters, security concerns raise and hinder the further flourish of smart grid. In this paper, we propose a privacy-preserving aggregation (PARK) scheme with adaptive key management and revocation, to prevent user’s data from being disclosed to untrusted entities in smart grid
Next 10 →
Results 1 - 10 of 99
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University