Foundations, properties, and security applications of puzzles: A survey

IM Ali, M Caprolu, RD Pietro - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Cryptographic algorithms have been used not only to create robust ciphertexts but also to
generate cryptograms that, contrary to the classic goal of cryptography, are meant to be …

Sok: Managing longitudinal privacy of publicly shared personal online data

T Schnitzler, S Mirza, M Dürmuth… - Proceedings on Privacy …, 2021 - petsymposium.org
Over the past decade, research has explored managing the availability of shared personal
online data, with particular focus on longitudinal aspects of privacy. Yet, there is no …

Commit signatures for centralized version control systems

S Vaidya, S Torres-Arias, R Curtmola… - ICT Systems Security and …, 2019 - Springer
Abstract Version Control Systems (VCS-es) play a major role in the software development
life cycle, yet historically their security has been relatively underdeveloped compared to their …

Digital Forgetting Using Key Decay

MA Darwish, A Zarras - Proceedings of the 38th ACM/SIGAPP …, 2023 - dl.acm.org
During the recent development of information technology and the prevalent breakthroughs
of its services, more digital data tend to be readily stored online. Although the massive …

Rogue people: on adversarial crowdsourcing in the context of cyber security

M Moradi, Q Li - Journal of Information, Communication and Ethics in …, 2021 - emerald.com
Purpose Over the past decade, many research works in various disciplines have benefited
from the endless ocean of people and their potentials (in the form of crowdsourcing) as an …

Towards contractual agreements for revocation of online data

T Schnitzler, M Dürmuth, C Pöpper - … and Privacy Protection: 34th IFIP TC …, 2019 - Springer
Once personal data is published online, it is out of the control of the user and can be a threat
to users' privacy. Retroactively deleting data after it has been published is notoriously …

Non-Interactive VDF Client Puzzle for DoS Mitigation

M Raikwar, D Gligoroski - Proceedings of the 2021 European …, 2021 - dl.acm.org
Denial of Service (DoS) attacks pose a growing threat to network services. Client puzzles
have been proposed to mitigate DoS attacks by requiring a client to prove legitimate …

Review of Research on Privacy Decision Making from a Time Perspective

Z Jiang, S Jarvenpaa - 2021 - aisel.aisnet.org
Managing privacy is a process in which people continuously negotiate the boundaries of
their personal space. Time is embedded in and influences this continuous negotiation …

Towards Responsible AI: Safeguarding Privacy, Integrity, and Fairness

MS Mirza - 2024 - search.proquest.com
The widespread adoption of machine learning models into digital platforms, spanning
general-purpose applications such as chatbots, professional tools like code generation, and …

Contextualize differential privacy in image database: a lightweight image differential privacy approach based on principle component analysis inverse

S Zhang, X Ma, H Cao, T Zhao, Y Yu… - arXiv preprint arXiv …, 2022 - arxiv.org
Differential privacy (DP) has been the de-facto standard to preserve privacy-sensitive
information in database. Nevertheless, there lacks a clear and convincing contextualization …