Zobrazeno 1 - 10
of 34 024
pro vyhledávání: '"Cryptography and Security (cs.CR)"'
Autor:
Samarin, Nikita, Kothari, Shayna, Siyed, Zaina, Bjorkman, Oscar, Yuan, Reena, Wijesekera, Primal, Alomar, Noura, Fischer, Jordan, Hoofnagle, Chris, Egelman, Serge
Publikováno v:
Proceedings on Privacy Enhancing Technologies. 2023:103-121
The California Consumer Privacy Act (CCPA) provides California residents with a range of enhanced privacy protections and rights. Our research investigated the extent to which Android app developers comply with the provisions of the CCPA that require
Publikováno v:
Proceedings on Privacy Enhancing Technologies. 2023:446-468
We introduce Private Collection Matching (PCM) problems, in which a client aims to determine whether a collection of sets owned by a server matches their interests. Existing privacy-preserving cryptographic primitives cannot solve PCM problems effici
Publikováno v:
Future Generation Computer Systems. 144:307-326
As an important technology to ensure data security, consistency, traceability, etc., blockchain has been increasingly used in Internet of Things (IoT) applications. The integration of blockchain and edge computing can further improve the resource uti
Publikováno v:
IEEE Internet of Things Journal. 10:9565-9584
Previous work on misbehavior detection and trust management for Vehicle-to-Everything (V2X) communication security is effective in identifying falsified and malicious V2X data. Each vehicle in a given region can be a witness to report on the misbehav
Publikováno v:
IEEE Internet of Things Journal. 10:9823-9835
Empowered by deep neural networks (DNNs), Wi-Fi fingerprinting has recently achieved astonishing localization performance to facilitate many security-critical applications in wireless networks, but it is inevitably exposed to adversarial attacks, whe
Autor:
Csirmaz, László
Publikováno v:
Kybernetika. :179-197
A probabilistic secret sharing scheme is a joint probability distribution of the shares and the secret together with a collection of secret recovery functions. The study of schemes using arbitrary probability spaces and unbounded number of participan
Autor:
McKee, Forrest, Noever, David
Publikováno v:
International Journal on Cybernetics & Informatics. 12:89-107
This study investigates a primary inaudible attack vector on Amazon Alexa voice services using near ultrasound trojans and focuses on characterizing the attack surface and examining the practical implications of issuing inaudible voice commands. The
Publikováno v:
IEEE Transactions on Computers. 72:1420-1430
Microarchitectural timing channels enable unwanted information flow across security boundaries, violating fundamental security assumptions. They leverage timing variations of several state-holding microarchitectural components and have been demonstra
Autor:
Alsheikh, Mohammad Abu
Publikováno v:
IEEE Communications Magazine. 61:151-157
Billions of devices in the Internet of Things (IoT) collect sensitive data about people, creating data privacy risks and breach vulnerabilities. Accordingly, data privacy preservation is vital for sustaining the proliferation of IoT services. In part
Autor:
Jan Butora, Patrick Bas
Publikováno v:
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security, In press, ⟨10.1109/TIFS.2023.3268884⟩
IEEE Transactions on Information Forensics and Security, In press, ⟨10.1109/TIFS.2023.3268884⟩
Side-informed steganography has always been among the most secure approaches in the field. However, a majority of existing methods for JPEG images use the side information, here the rounding error, in a heuristic way. For the first time, we show that