No abstract available.
Proceeding Downloads
Quantifying and Measuring Anonymity
The design of anonymous communication systems is a relatively new field, but the desire to quantify the security these systems offer has been an important topic of research since its beginning. In recent years, anonymous communication systems have ...
Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-Cards and Smart-Phones
The paper deals with the implementation and benchmarking of cryptographic primitives on contemporary smart-cards and smart-phones. The goal of the paper is to analyze the demands of today's common theoretical cryptographic constructions used in privacy-...
Practical Packing Method in Somewhat Homomorphic Encryption
Somewhat homomorphic encryption is public key encryption supporting a limited number of both additions and multiplications on encrypted data, which is useful for performing fundamental computations with protecting the data confidentiality. In this paper,...
Collaborative and Privacy-Aware Sensing for Observing Urban Movement Patterns
The information infrastructure that pervades urban environments represents a major opportunity for collecting information about Human mobility. However, this huge potential has been undermined by the overwhelming privacy risks that are associated with ...
Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest Setting
Parallel computing offers the chance of improving the efficiency of Garbled Circuit technique in multi-party computation protocols. We propose two different types of parallelization: fine-grained, based on the parallel evaluation of gates, and coarse ...
Privacy Analysis of a Hidden Friendship Protocol
Friendship relations are a defining property of online social networks. On the one hand, and beyond their cultural interpretation, they sustain access control mechanisms and are privacy-enhancing by limiting the proliferation of personal information. On ...
Anonymous and Transferable Electronic Ticketing Scheme
- Arnau Vives-Guasch,
- M. Magdalena Payeras-Capell,
- Maci Mut-Puigserver,
- Jordi Castell -Roca,
- Josep-Lluís Ferrer-Gomila
Electronic tickets demonstrate, without the use of paper, the possession of an authorization or access to a determined service. In this scenario, some security requirements must be accomplished. Moreover, some determined services should guarantee the ...
Privacy-Preserving Publish/Subscribe: Efficient Protocols in a Distributed Model
We consider the problem of modeling and designing efficient and privacy-preserving publish/subscribe protocols in a distributed model where parties can act as publishers or subscribers or both, and there are no brokers or other types of parties. The ...
Privacy-Preserving Processing of Raw Genomic Data
Geneticists prefer to store patients' aligned, raw genomic data, in addition to their variant calls (compact and summarized form of the raw data), mainly because of the immaturity of bioinformatic algorithms and sequencing platforms. Thus, we propose a ...
Using Search Results to Microaggregate Query Logs Semantically
Query log anonymization has become an important challenge nowadays. A query log contains the search history of the users, as well as the selected results and their position in the ranking. These data are used to provide a personalized re-ranking of ...
Legal Issues About Metadata Data Privacy vs Information Security
For the purposes of our work we use the concept of metadata to implement enterprise digital right management mechanisms in an intelligent document environment. Such metadata allows us to firstly define contextual security rules and secondly to ensure ...
Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model
The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-...
Differentially Private Smart Metering with Battery Recharging
The energy industry has recently begun using smart meters to take fine-grained readings of energy usage. These smart meters enable flexible time-of-use billing, forecasting, and demand response, but they also raise serious user privacy concerns. We ...
AppGuard — Fine-Grained Policy Enforcement for Untrusted Android Applications
Android's success makes it a prominent target for malicious software. However, the user has very limited control over security-relevant operations. This work presents AppGuard, a powerful and flexible security system that overcomes these deficiencies. ...
Reference Monitors for Security and Interoperability in OAuth 2.0
- Ronan-Alexandre Cherrueau,
- Rémi Douence,
- Jean-Claude Royer,
- Mario Südholt,
- Anderson Santana Oliveira,
- Yves Roudier,
- Matteo Dell'Amico
OAuth 2.0 is a recent IETF standard devoted to providing authorization to clients requiring access to specific resources over HTTP. It has been pointed out that this framework is potentially subject to security issues, as well as difficulties concerning ...
Remote Biometrics for Robust Persistent Authentication
This paper examines the problem of providing a robust non-invasive authentication service for mobile users in a smart environment. We base our work on the persistent authentication model (PAISE), which relies on available sensors to track principals ...
Classifying Android Malware through Subgraph Mining
Current smartphones are based upon the concept of apps, which are lightweight applications that are distributed through on-line marketplaces, such as Google Play (for Android devices). Unfortunately, this market-centric model is affected by several ...
Introducing Probabilities in Contract-Based Approaches for Mobile Application Security
Security for mobile devices is a problem of capital importance, especially due to new threats coming from malicious applications. This has been proved by the increasing interest of the research community on the topic of security on mobile devices. ...
Advanced Detection Tool for PDF Threats
In this paper we introduce an efficient application for malicious PDF detection: ADEPT. With targeted attacks rising over the recent past, exploring a new detection and mitigation paradigm becomes mandatory. The use of malicious PDF files that exploit ...
Enforcing Input Validation through Aspect Oriented Programming
Injection vulnerabilities are still prevalent today, ranking first on OWASP top ten threats to software security. Developers often have trouble to adopt secure coding practices during the software development life cycle, failing to prevent these ...
Lightweight Cryptography for Embedded Systems — A Comparative Analysis
As computing becomes pervasive, embedded systems are deployed in a wide range of domains, including industrial systems, critical infrastructures, private and public spaces as well as portable and wearable applications. An integral part of the ...
A Simulation of Document Detection Methods and Reducing False Positives for Private Stream Searching
Private stream searching is a system of cryptographic methods that provide a search facility while preserving the confidentiality of the search criteria and matching documents. This research analyzes the original documentation detection method of the ...
Dynamic Anonymous Index for Confidential Data
In this paper we introduce a <InlineEquation ID="IEq1"> <EquationSource Format="TEX">$$k$$</EquationSource> <EquationSource Format="MATHML"> <math xmlns:xlink="http://www.w3.org/1999/xlink"> <mi>k</mi> </math> </EquationSource> </InlineEquation>-...
Are On-Line Personae Really Unlinkable?
More and more personal information is available digitally, both collected by organisations and published by individuals. People may attempt to protect their privacy by avoiding to provide uniquely identifying information and by providing different ...
On the Privacy of Private Browsing — A Forensic Approach
Private browsing has been a popular privacy feature built into all mainstream browsers since 2005. However, despite its prevalent use, the security of this feature has received little attention from the research community. In this paper, we present an ...
Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes
Cryptographic primitives are essential for constructing privacy-preserving communication mechanisms. There are situations when two parties that do not know each other need to exchange sensitive information over the Internet. Trust management mechanisms ...
Index Terms
- Revised Selected Papers of the 8th International Workshop on Data Privacy Management and Autonomous Spontaneous Security - Volume 8247