A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

A survey on trust management for Internet of Things

Z Yan, P Zhang, AV Vasilakos - Journal of network and computer …, 2014 - Elsevier
Abstract Internet of Things (IoT) is going to create a world where physical objects are
seamlessly integrated into information networks in order to provide advanced and intelligent …

Privacy-preserving content-oriented wireless communication in internet-of-things

K Gai, KKR Choo, M Qiu, L Zhu - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
With mobile devices (eg, Android and iOS devices) and other resource constrained Internet-
connected devices (eg, sensors) becoming the norm in our digitalized society, the capacity …

EPIC: efficient privacy-preserving contact tracing for infection detection

T Altuwaiyan, M Hadian, X Liang - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
The world has experienced many epidemic diseases in the past, SARS, H1N1, and Ebola
are some examples of these diseases. When those diseases outbreak, they spread very …

A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network

D He, N Kumar, H Wang, L Wang… - … on Dependable and …, 2016 - ieeexplore.ieee.org
With rapid developments of sensor, wireless and mobile communication technologies,
Mobile Healthcare Social Networks (MHSNs) have emerged as a popular means of …

Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network

C Gao, Q Cheng, X Li, S Xia - Cluster Computing, 2019 - Springer
Making new friends by measuring the proximity of people's profile is a crucial service in
mobile social networks. With the rapid development of cloud computing, outsourcing …

Privacy-preserving COVID-19 contact tracing app: a zero-knowledge proof approach

JK Liu, MH Au, TH Yuen, C Zuo, J Wang… - Cryptology ePrint …, 2020 - eprint.iacr.org
In this paper, we propose a privacy-preserving contact tracing protocol for smart phones,
and more specifically Android and iOS phones. The protocol allows users to be notified, if …

Privacy leakage via de-anonymization and aggregation in heterogeneous social networks

H Li, Q Chen, H Zhu, D Ma, H Wen… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Though representing a promising approach for personalization, targeting, and
recommendation, aggregation of user profiles from multiple social networks will inevitably …

Private set intersection with authorization over outsourced encrypted datasets

Y Wang, Q Huang, H Li, M Xiao, S Ma… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Thanks to its convenience and cost-savings feature, cloud computing ushers a new era. Yet
its security and privacy issues must not be neglected. Private set intersection (PSI) is useful …

CenLocShare: A centralized privacy-preserving location-sharing system for mobile online social networks

X Xiao, C Chen, AK Sangaiah, G Hu, R Ye… - Future Generation …, 2018 - Elsevier
Friend relationships and location information are the biggest privacy concerns for the users
in mobile Online Social Networks (mOSNs). Existing solutions save these two kinds of …