Metaverse security and privacy: An overview

Z Chen, J Wu, W Gan, Z Qi - … Conference on Big Data (Big Data …, 2022 - ieeexplore.ieee.org
Metaverse is a living space and cyberspace that realizes the process of virtualizing and
digitizing the real world. It integrates a plethora of existing technologies with the goal of …

A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city

MHP Rizi, SAH Seno - Internet of Things, 2022 - Elsevier
The development of smart cities through digital communications has improved citizens'
quality of life and well-being. In these cities, IoT technology generates vast amounts of data …

PIR with compressed queries and amortized query processing

S Angel, H Chen, K Laine… - 2018 IEEE symposium on …, 2018 - ieeexplore.ieee.org
Private information retrieval (PIR) is a key building block in many privacy-preserving
systems. Unfortunately, existing constructions remain very expensive. This paper introduces …

The pursuit of citizens' privacy: a privacy-aware smart city is possible

A Martínez-Ballesté, PA Pérez-Martínez… - IEEE …, 2013 - ieeexplore.ieee.org
Cities are growing steadily, and the process of urbanization is a common trend in the world.
Although cities are getting bigger, they are not necessarily getting better. With the aim to …

Tensorfhe: Achieving practical computation on encrypted data using gpgpu

S Fan, Z Wang, W Xu, R Hou, D Meng… - … Symposium on High …, 2023 - ieeexplore.ieee.org
In the cloud computing era, privacy protection is becoming pervasive in a broad range of
applications (eg, machine learning, data mining, etc). Fully Homomorphic Encryption (FHE) …

{Communication–Computation} trade-offs in {PIR}

A Ali, T Lepoint, S Patel, M Raykova… - 30th USENIX security …, 2021 - usenix.org
Communication–Computation Trade-offs in PIR Page 1 This paper is included in the Proceedings
of the 30th USENIX Security Symposium. August 11–13, 2021 978-1-939133-24-3 Open access to …

SHIELD: scalable homomorphic implementation of encrypted data-classifiers

A Khedr, G Gulak… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Homomorphic encryption (HE) systems enable computations on encrypted data, without
decrypting and without knowledge of the secret key. In this work, we describe an optimized …

Privacy-preserving detection of sensitive data exposure

X Shu, D Yao, E Bertino - IEEE transactions on information …, 2015 - ieeexplore.ieee.org
Statistics from security firms, research institutions and government organizations show that
the number of data-leak instances have grown rapidly in recent years. Among various data …

Scalable and private media consumption with Popcorn

T Gupta, N Crooks, W Mulhern, S Setty, L Alvisi… - … USENIX symposium on …, 2016 - usenix.org
We describe the design, implementation, and evaluation of Popcorn, a media delivery
system that hides clients' consumption (even from the content distributor). Popcorn relies on …

Exploring design and governance challenges in the development of privacy-preserving computation

N Agrawal, R Binns, M Van Kleek, K Laine… - Proceedings of the …, 2021 - dl.acm.org
Homomorphic encryption, secure multi-party computation, and differential privacy are part of
an emerging class of Privacy Enhancing Technologies which share a common promise: to …