An efficient verifiable searchable encryption scheme with aggregating authorization for blockchain-enabled IoT

T Wang, J Wang, Q Yang, B Yang, H Li… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Blockchain-enabled Internet of Things (IoT) provides a secure sharing of data and resources
to the various miners of the IoT network, removes centralized control, and can overcome part …

HTF: Homogeneous Tree Framework for Differentially Private Release of Large Geospatial Datasets with Self-tuning Structure Height

S Shaham, G Ghinita, R Ahuja, J Krumm… - ACM transactions on …, 2023 - dl.acm.org
Mobile apps that use location data are pervasive, spanning domains such as transportation,
urban planning, and healthcare. Important use cases for location data rely on statistical …

[HTML][HTML] Supporting secure dynamic alert zones using searchable encryption and graph embedding

S Shaham, G Ghinita, C Shahabi - The VLDB Journal, 2024 - Springer
Location-based alerts have gained increasing popularity in recent years, whether in the
context of healthcare (eg, COVID-19 contact tracing), marketing (eg, location-based …

[HTML][HTML] An efficient and secure location-based alert protocol using searchable encryption and Huffman codes

S Shaham, G Ghinita, C Shahabi - 2021 - europepmc.org
Location data are widely used in mobile apps, ranging from location-based
recommendations, to social media and navigation. A specific type of interaction is that of …