Architectural threats to security and privacy: a challenge for internet of things (IoT) applications

Y Khan, MBM Su'ud, MM Alam, SF Ahmad, NA Salim… - Electronics, 2022 - mdpi.com
The internet of things (IoT) is one of the growing platforms of the current era that has
encircled a large population into its domain, and life appears to be useless without adopting …

A blockchain-based nonrepudiation network computing service scheme for industrial IoT

Y Xu, J Ren, G Wang, C Zhang, J Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Emerging network computing technologies extend the functionalities of industrial IoT (IIoT)
terminals. However, this promising service-provisioning scheme encounters problems in …

Cascaded hand pose regression

X Sun, Y Wei, S Liang, X Tang… - Proceedings of the IEEE …, 2015 - openaccess.thecvf.com
We extends the previous 2D cascaded object pose regression work [9] in two aspects so that
it works better for 3D articulated objects. Our first contribution is 3D pose-indexed features …

How to use bitcoin to design fair protocols

I Bentov, R Kumaresan - Annual Cryptology Conference, 2014 - Springer
We study a model of fairness in secure computation in which an adversarial party that aborts
on receiving output is forced to pay a mutually predefined monetary penalty. We then show …

The effect of electronic payments security on e-commerce consumer perception: An extended model of technology acceptance

M Ardiansah, A Chariri, S Rahardja… - Management Science …, 2020 - m.growingscience.com
This study investigates the aspects of e-payment security concerning e-commerce
consumers' purchase intentions. This study further involves college students in Semarang …

Practical verifiable encryption and decryption of discrete logarithms

J Camenisch, V Shoup - Annual International Cryptology Conference, 2003 - Springer
This paper addresses the problem of designing practical protocols for proving properties
about encrypted data. To this end, it presents a variant of the new public key encryption of …

Fairness in an unfair world: Fair multiparty computation from public bulletin boards

AR Choudhuri, M Green, A Jain, G Kaptchuk… - Proceedings of the 2017 …, 2017 - dl.acm.org
Secure multiparty computation allows mutually distrusting parties to compute a function on
their private inputs such that nothing but the function output is revealed. Achieving fairness …

Fair and robust multi-party computation using a global transaction ledger

A Kiayias, HS Zhou, V Zikas - … 35th Annual International Conference on the …, 2016 - Springer
Classical results on secure multi-party computation (MPC) imply that fully secure
computation, including fairness (either all parties get output or none) and robustness (output …

Optimistic fair exchange of digital signatures

N Asokan, V Shoup, M Waidner - … on the Theory and Applications of …, 1998 - Springer
We present a new protocol that allows two players to exchange digital signatures over the
Internet in a fair way, so that either each player gets the other's signature, or neither player …

Optimistic fair exchange of digital signatures

N Asokan, V Shoup, M Waidner - IEEE Journal on Selected …, 2000 - ieeexplore.ieee.org
We present a new protocol that allows two players to exchange digital signatures over the
Internet in a fair way, so that either each player gets the other's signature, or neither player …