{ORide}: A {Privacy-Preserving} yet Accountable {Ride-Hailing} Service

A Pham, I Dacosta, G Endignoux… - 26th USENIX Security …, 2017 - usenix.org
In recent years, ride-hailing services (RHSs) have become increasingly popular, serving
millions of users per day. Such systems, however, raise significant privacy concerns …

PGRide: Privacy-preserving group ridesharing matching in online ride hailing services

H Yu, H Zhang, X Yu, X Du… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
An online ride hailing (ORH) service creates a typical supply-and-demand two-sided market,
which enables riders and drivers to establish optimized rides conveniently via mobile …

Unif-NTT: A Unified Hardware Design of Forward and Inverse NTT for PQC Algorithms

AY Hummdi, A Aljaedi, Z Bassfar, SS Jamal… - IEEE …, 2024 - ieeexplore.ieee.org
Polynomial multiplications based on the number theoretic transform (NTT) are critical in
lattice-based post-quantum cryptography algorithms. Therefore, this paper presents a …

Efficient and privacy-preserving ride matching using exact road distance in online ride hailing services

H Yu, X Jia, H Zhang, J Shu - IEEE Transactions on Services …, 2020 - ieeexplore.ieee.org
Online Ride Hailing (ORH) services enable a rider to request a taxi via a smartphone app in
real time. When using ORH services, users (including riders and taxis) have to submit their …

pRide: Privacy-preserving online ride hailing matching system with prediction

J Huang, Y Luo, S Fu, M Xu, B Hu - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Online Ride-Hailing (ORH) service enables riders to enjoy on-demand transportation
service with mobile devices. Despite the convenience of the service, privacy leakage could …

TargetFinder: A privacy preserving system for locating targets through IoT cameras

Y Khazbak, J Qiu, T Tan, G Cao - ACM Transactions on Internet of Things, 2020 - dl.acm.org
With the proliferation of IoT cameras, it is possible to use crowdsourced videos to help find
interested targets (eg, crime suspect, lost child, lost vehicle) on demand. Due to the ubiquity …

Camera attribution forensic analyzer in the encrypted domain

A Pedrouzo-Ulloa, M Masciopinto… - … and Security (WIFS), 2018 - ieeexplore.ieee.org
Digital media forensics must deal with constantly increasing volumes of data. In order to
efficiently scale up, outsourcing computation becomes an appealing solution. However, due …

Privacy-preserving location-based data queries in fog-enhanced sensor networks

H Xie, Y Guo, X Jia - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Fog computing has emerged as a promising framework with the rapid growth of the Internet
of Things (IoT). In fog computing, the new entity, named fog device, can help the cloud …

A graph signal processing approach to Fourier-like number-theoretic transforms

JB Lima, JR de Oliveira Neto - Digital Signal Processing, 2022 - Elsevier
In this paper, we employ a graph signal processing approach to redefine Fourier-like
number-theoretic transforms, which includes the Fourier number transform itself, the Hartley …

Image denoising in the encrypted domain

A Pedrouzo-Ulloa… - … and Security (WIFS), 2016 - ieeexplore.ieee.org
The increasing advance of Cloud-based solutions brings about serious privacy problems
when outsourcing images for their processing in untrusted environments. One of the …