[PDF][PDF] Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions

E Politou, E Alepis, C Patsakis - Journal of cybersecurity, 2018 - academic.oup.com
Abstract Upon the General Data Protection Regulation's (GDPR) application on 25 May
2018 across the European Union, new legal requirements for the protection of personal data …

Countering gattaca: efficient and secure testing of fully-sequenced human genomes

P Baldi, R Baronio, E De Cristofaro, P Gasti… - Proceedings of the 18th …, 2011 - dl.acm.org
Recent advances in DNA sequencing technologies have put ubiquitous availability of fully
sequenced human genomes within reach. It is no longer hard to imagine the day when …

Fast and private computation of cardinality of set intersection and union

E De Cristofaro, P Gasti, G Tsudik - International Conference on …, 2012 - Springer
In many everyday scenarios, sensitive information must be shared between parties without
complete mutual trust. Private set operations are particularly useful to enable sharing …

Efficient genome-wide, privacy-preserving similar patient query based on private edit distance

XS Wang, Y Huang, Y Zhao, H Tang… - Proceedings of the 22nd …, 2015 - dl.acm.org
Edit distance has been proven to be an important and frequently-used metric in many
human genomic research, with Similar Patient Query (SPQ) being a particularly promising …

SetRkNN: Efficient and privacy-preserving set reverse kNN query in cloud

Y Zheng, R Lu, H Zhu, S Zhang, Y Guan… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The advance of cloud computing has driven a new paradigm of outsourcing large-scale data
and data-driven services to public clouds. Due to the increased awareness of privacy …

Privacy protection in biometric-based recognition systems: A marriage between cryptography and signal processing

M Barni, G Droandi, R Lazzeretti - IEEE Signal Processing …, 2015 - ieeexplore.ieee.org
Systems employing biometric traits for people authentication and identification are
witnessing growing popularity due to the unique and indissoluble link between any …

Lightweight, Secure, Similar-Document Retrieval over Encrypted Data

MA Al Sibahee, AI Abdulsada, ZA Abduljabbar, J Ma… - Applied Sciences, 2021 - mdpi.com
Applications for document similarity detection are widespread in diverse communities,
including institutions and corporations. However, currently available detection systems fail to …

Achieving efficient and privacy-preserving exact set similarity search over encrypted data

Y Zheng, R Lu, Y Guan, J Shao… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Set similarity search, aiming to search the similar sets to a query set, has wide application in
today's recommendation services. Meanwhile, the rapid advance in cloud technique has …

Profile matching for IoMT: A verifiable private set intersection scheme

Y Qian, J Shen, P Vijayakumar… - IEEE journal of …, 2021 - ieeexplore.ieee.org
The rapid development of the Internet of Things (IoTs), 5 G and artificial intelligence (AI)
technology have been dramatically incentivizing the advancement of Internet of Medical …

Private set intersection with authorization over outsourced encrypted datasets

Y Wang, Q Huang, H Li, M Xiao, S Ma… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Thanks to its convenience and cost-savings feature, cloud computing ushers a new era. Yet
its security and privacy issues must not be neglected. Private set intersection (PSI) is useful …