Securing fog computing for internet of things applications: Challenges and solutions

J Ni, K Zhang, X Lin, X Shen - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …

Preserving privacy in speaker and speech characterisation

A Nautsch, A Jiménez, A Treiber, J Kolberg… - Computer Speech & …, 2019 - Elsevier
Speech recordings are a rich source of personal, sensitive data that can be used to support
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …

A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

Splinecnn: Fast geometric deep learning with continuous b-spline kernels

M Fey, JE Lenssen, F Weichert… - Proceedings of the …, 2018 - openaccess.thecvf.com
Abstract We present Spline-based Convolutional Neural Networks (SplineCNNs), a variant
of deep neural networks for irregular structured and geometric input, eg, graphs or meshes …

Enabling personalized search over encrypted outsourced data with efficiency improvement

Z Fu, K Ren, J Shu, X Sun… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
In cloud computing, searchable encryption scheme over outsourced data is a hot research
field. However, most existing works on encrypted search over outsourced cloud data follow …

∑ oφoς: Forward secure searchable encryption

R Bost - Proceedings of the 2016 ACM SIGSAC Conference on …, 2016 - dl.acm.org
Searchable Symmetric Encryption aims at making possible searching over an encrypted
database stored on an untrusted server while keeping privacy of both the queries and the …

Leakage-abuse attacks against searchable encryption

D Cash, P Grubbs, J Perry, T Ristenpart - Proceedings of the 22nd ACM …, 2015 - dl.acm.org
Schemes for secure outsourcing of client data with search capability are being increasingly
marketed and deployed. In the literature, schemes for accomplishing this efficiently are …

All your queries are belong to us: the power of {File-Injection} attacks on searchable encryption

Y Zhang, J Katz, C Papamanthou - 25th USENIX Security Symposium …, 2016 - usenix.org
The goal of searchable encryption (SE) is to enable a client to execute searches over
encrypted files stored on an untrusted server while ensuring some measure of privacy for …

Inference attacks on property-preserving encrypted databases

M Naveed, S Kamara, CV Wright - Proceedings of the 22nd ACM …, 2015 - dl.acm.org
Many encrypted database (EDB) systems have been proposed in the last few years as cloud
computing has grown in popularity and data breaches have increased. The state-of-the-art …

Towards public verifiable and forward-privacy encrypted search by using blockchain

Y Guo, C Zhang, C Wang, X Jia - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Dynamic Searchable Symmetric Encryption (DSSE) is a practical cryptographic primitive that
assists servers to provide search and update functionalities in the ciphertext domain. Recent …