• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 39
Next 10 →

Formal Analysis of a Privacy-Preserving Billing Protocol

by Ro Arm, Roberto Carbone, Alessio Merlo
"... Abstract. We provide a formal model and a security analysis of the Private Billing Protocol. This formal analysis allowed us to spell out precisely the details of the protocol, the security assumptions as well as the expected security goals. For the formal analysis we used SATMC, a model checker for ..."
Abstract - Add to MetaCart
for security protocol analysis that supports the specifica-tion of security assumptions and goals as LTL formulae. Further analysis that we conducted manually revealed that the protocol allows for imple-mentations that fail to meet the expected privacy goal. We describe the implications of our findings

Privacy-Preserving Indexing for eHealth Information Networks

by Yuzhe Tang, Ting Wang, Ling Liu, Shicong Meng, Balaji Palanisamy
"... The past few years have witnessed an increasing demand for the next generation health information networks (e.g., NHIN[1]), which hold the promise of supporting large-scale information sharing across a network formed by autonomous healthcare providers. One fundamental capability of such information ..."
Abstract - Add to MetaCart
privacy-preserving index[2]), our solution highlights with a series of distinct features: (a) it incorporates access control policies in the privacy-preserving index, which improves both search efficiency and attack resilience; (b) it employs a fast index construction protocol via a novel use

Attacks on Privacy-Preserving Biometric Authentication

by Aysajan Abidin, Elena Pagnin, Aikaterini Mitrokotsa
"... Abstract. Biometric authentication based on facial image, fingerprint, palm print, iris, retina, or veins are becoming increasingly popular. How-ever, compromised biometric templates, indeed, may lead to serious threats to identity and their inherent irrevocability makes this risk even more se-rious ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
-rious. Because of such serious privacy implications the need for privacy-preserving biometric authentication protocols is of utmost importance. Recently, Yasuda et al. [1, 2] proposed two efficient privacy-preserving biometric authentication using packed homomorphic encryption based on ideal lattices and on ring

1 Secure and Privacy-Preserving, Timed Vehicular Communication

by Mike Burmester, Emmanouil Magkos, Vassilis Chrissikopoulos
"... Abstract—In this paper we consider the problem of privacy and security in vehicular (V2V) communication, in particular securing routine safety messages. Traditional public key mechanisms are not appropriate for such applications because of the large number of safety messages that have to be transmit ..."
Abstract - Add to MetaCart
Abstract—In this paper we consider the problem of privacy and security in vehicular (V2V) communication, in particular securing routine safety messages. Traditional public key mechanisms are not appropriate for such applications because of the large number of safety messages that have

Brief Announcement: Privacy-Preserving Location-Based Services

by Mahnush Movahedi, Mahdi Zamani
"... Nowadays, mobile users frequently ask Location-Based Services (LBS) to find points of interest near them, to receive information about traffic along their route, or to receive customized advertising. Unfortunately, shared loca-tion data can be used by others (e.g., providers and governments) for pre ..."
Abstract - Add to MetaCart
results due to spatial cloak-ing [2,5,6], and (4) insecurity against malicious behaviors [2,5,6]. In this paper, we propose an efficient protocol for privacy-preserving LBS that is secure against malicious attacks as well as global attacks. Our protocol scales well with the number of clients and is load

Verifiable Privacy-Preserving Sensor Network Storage for Range Query

by Bo Sheng, Qun Li
"... Abstract—We consider a hybrid two-tiered sensor network consisting of regular sensors and special sensors with large storage capacity, called storage nodes. In this structure, regular sensors “push ” their raw data to nearby storage nodes and the sink diffuses queries only to storage nodes and “pull ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
results illustrate that our schemes are efficient for communication and effective for privacy and security protection. Index Terms—Privacy preserving, range query, sensor networks, verifiable reply. Ç 1

A Lightweight Conditional Privacy-Preservation Protocol for Vehicular Traffi c-Monitoring Systems

by Rongxing Lu, Zhiguo Shi
"... device, which enables a vehicle to not only com municate with other vehicles on the road using vehicletovehicle (V2V) communications, but also to roadside unit (RSU) devices—that is, vehicle toRSU (V2R) communications. When RSUs serve as the gateways, vehicles can also access to the remote servers, ..."
Abstract - Add to MetaCart
, such as a traffi cmonitoring server, on the road. Because of its hybrid architecture, Vanet can provide safety and entertainment related applications on the road.1 Vehicular traffi c monitoring (VTM) is an important application of Vanet,2 where vehicles moving on the road can use V2V and V2R communications

1 Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information

by Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik
"... Abstract—The need for controlled (privacy-preserving) sharing of sensitive information occurs in many different and realistic everyday scenarios, ranging from national security to social networking. A typical setting involves two parties: one seeks information from the other without revealing the in ..."
Abstract - Add to MetaCart
Abstract—The need for controlled (privacy-preserving) sharing of sensitive information occurs in many different and realistic everyday scenarios, ranging from national security to social networking. A typical setting involves two parties: one seeks information from the other without revealing

A Dynamic Privacy-Preserving Key Management Scheme for Location Based Services in VANETs

by Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Student Member, Xuemin (sherman Shen
"... Abstract—In this paper, for achieving vehicle user’s privacy preservation while improving key update efficiency of location based services (LBSs) in vehicular ad hoc networks (VANETs), we propose a dynamic privacy-preserving key management scheme, called DIKE. Specifically, in the proposed DIKE sche ..."
Abstract - Cited by 10 (5 self) - Add to MetaCart
Abstract—In this paper, for achieving vehicle user’s privacy preservation while improving key update efficiency of location based services (LBSs) in vehicular ad hoc networks (VANETs), we propose a dynamic privacy-preserving key management scheme, called DIKE. Specifically, in the proposed DIKE

Privacy Preserving Updates for Anonymous and Confidential Databases Using RSA Algorithm

by Ishwarya M. V, Dr. Ramesh Kumar K
"... ABSTRACT: This paper aims to speed up the implementation of the RSA algorithm during data transmission between different communication networks and Internet, which is calculated to generate the keys by a program prepared in a C # language and then save these values of the keys in the databases creat ..."
Abstract - Add to MetaCart
the secure efficient system for protection of data, restricting the access to data even by the administrator thus maintaining the secrecy of individual patients. In RSA algorithm identical database must be used in all networks gateways, the creation of the database controlled by a special protocol programmed
Next 10 →
Results 1 - 10 of 39
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University