Zobrazeno 1 - 10
of 36
pro vyhledávání: '"Yerukhimovich, Arkady"'
Fully homomorphic encryption (FHE) enables a simple, attractive framework for secure search. Compared to other secure search systems, no costly setup procedure is necessary; it is sufficient for the client merely to upload the encrypted database to t
Externí odkaz:
http://arxiv.org/abs/2109.07708
Recent years have seen a strong uptick in both the prevalence and real-world consequences of false information spread through online platforms. At the same time, encrypted messaging systems such as WhatsApp, Signal, and Telegram, are rapidly gaining
Externí odkaz:
http://arxiv.org/abs/2109.04559
Autor:
Liu, Chunchi, Xu, Minghui, Guo, Hechuan, Cheng, Xiuzhen, Xiao, Yinhao, Yu, Dongxiao, Gong, Bei, Yerukhimovich, Arkady, Wang, Shengling, Lv, Weifeng
With the prevalence of Internet of Things (IoT) applications, IoT devices interact closely with our surrounding environments, bringing us unparalleled smartness and convenience. However, the development of secure IoT solutions is getting a long way l
Externí odkaz:
http://arxiv.org/abs/2011.04919
Bitcoin's success has led to significant interest in its underlying components, particularly Blockchain technology. Over 10 years after Bitcoin's initial release, the community still suffers from a lack of clarity regarding what properties defines Bl
Externí odkaz:
http://arxiv.org/abs/1909.12454
We evaluate the power of simple networks side-channels to violate user privacy on Android devices. Specifically, we show that, using blackbox network metadata alone (i.e., traffic statistics such as transmission time and size of packets) it is possib
Externí odkaz:
http://arxiv.org/abs/1807.02719
Autor:
Fuller, Benjamin, Varia, Mayank, Yerukhimovich, Arkady, Shen, Emily, Hamlin, Ariel, Gadepally, Vijay, Shay, Richard, Mitchell, John Darby, Cunningham, Robert K.
Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches. Since protect
Externí odkaz:
http://arxiv.org/abs/1703.02014
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Recently there has been much interest in performing search queries over encrypted data to enable functionality while protecting sensitive data. One particularly efficient mechanism for executing such queries is order-preserving encryption/encoding (O
Externí odkaz:
http://arxiv.org/abs/1610.04025
Autor:
Gadepally, Vijay, Hancock, Braden, Kaiser, Benjamin, Kepner, Jeremy, Michaleas, Pete, Varia, Mayank, Yerukhimovich, Arkady
Organizations that make use of large quantities of information require the ability to store and process data from central locations so that the product can be shared or distributed across a heterogeneous group of users. However, recent events undersc
Externí odkaz:
http://arxiv.org/abs/1504.01287
Autor:
Kepner, Jeremy, Gadepally, Vijay, Michaleas, Pete, Schear, Nabil, Varia, Mayank, Yerukhimovich, Arkady, Cunningham, Robert K.
The growing gap between data and users calls for innovative tools that address the challenges faced by big data volume, velocity and variety. Along with these standard three V's of big data, an emerging fourth "V" is veracity, which addresses the con
Externí odkaz:
http://arxiv.org/abs/1406.5751