A Singh, K Chatterjee - Journal of Network and Computer Applications, 2017 - Elsevier
The cloud computing provides on demand services over the Internet with the help of a large amount of virtual storage. The main features of cloud computing is that the user does not …
The Signal protocol is a cryptographic messaging protocol that provides end-to-end encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …
C Yang, X Chen, Y Xiang - Journal of Network and Computer Applications, 2018 - Elsevier
With the rapid development of cloud storage, more and more data owners store their data on the remote cloud, that can reduce data owners' overhead because the cloud server …
The computer security community has advocated widespread adoption of secure communication tools to counter mass surveillance. Several popular personal communication …
Cloud computing has gained tremendous popularity in recent years. By outsourcing computation and storage requirements to public providers and paying for the services used …
F Roesner, BT Gill, T Kohno - … , FC 2014, Christ Church, Barbados, March 3 …, 2014 - Springer
The privacy-related Snapchat smartphone application allows users to share time-limited photos or videos, which “disappear” after a specified number of seconds once opened. This …
SE McGregor, P Charters, T Holliday… - 24th USENIX Security …, 2015 - usenix.org
Though journalists are often cited as potential users of computer security technologies, their practices and mental models have not been deeply studied by the academic computer …
Encryption ransomware is a malicious software that stealthily encrypts user files and demands a ransom to provide access to these files. Several prior studies have developed …
R Poddar, T Boelter, RA Popa - Cryptology ePrint Archive, 2016 - eprint.iacr.org
In recent years, encrypted databases have emerged as a promising direction that provides data confidentiality without sacrificing functionality: queries are executed on encrypted data …