Security, privacy, and safety aspects of civilian drones: A survey

R Altawy, AM Youssef - ACM Transactions on Cyber-Physical Systems, 2016 - dl.acm.org
The market for civilian unmanned aerial vehicles, also known as drones, is expanding
rapidly as new applications are emerging to incorporate the use of civilian drones in our …

A survey on security and privacy issues of UAVs

Y Mekdad, A Aris, L Babun, A El Fergougui, M Conti… - Computer …, 2023 - Elsevier
In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs),
has witnessed a rapid increase with its large number of airspace users. The tremendous …

Practical secure aggregation for privacy-preserving machine learning

K Bonawitz, V Ivanov, B Kreuter, A Marcedone… - proceedings of the …, 2017 - dl.acm.org
We design a novel, communication-efficient, failure-robust protocol for secure aggregation of
high-dimensional data. Our protocol allows a server to compute the sum of large, user-held …

A survey of lightweight stream ciphers for embedded systems

C Manifavas, G Hatzivasilis, K Fysarakis… - Security and …, 2016 - Wiley Online Library
Pervasive computing constitutes a growing trend, aiming to embed smart devices into
everyday objects. The limited resources of these devices and the ever‐present need for …

[PDF][PDF] Zcash protocol specification

D Hopwood, S Bowe, T Hornby, N Wilcox - GitHub: San Francisco, CA …, 2016 - caladex.io
Zcash is an implementation of the Decentralized Anonymous Payment scheme Zerocash,
with security fixes and improvements to performance and functionality. It bridges the existing …

VC3: Trustworthy data analytics in the cloud using SGX

F Schuster, M Costa, C Fournet… - … IEEE symposium on …, 2015 - ieeexplore.ieee.org
We present VC3, the first system that allows users to run distributed MapReduce
computations in the cloud while kee** their code and data secret, and ensuring the …

{DupLESS}:{Server-Aided} encryption for deduplicated storage

S Keelveedhi, M Bellare, T Ristenpart - 22nd USENIX security …, 2013 - usenix.org
Cloud storage service providers such as Dropbox, Mozy, and others perform deduplication
to save space by only storing one copy of each file uploaded. Should clients conventionally …

Verified models and reference implementations for the TLS 1.3 standard candidate

K Bhargavan, B Blanchet… - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
TLS 1.3 is the next version of the Transport Layer Security (TLS) protocol. Its clean-slate
design is a reaction both to the increasing demand for low-latency HTTPS connections and …

[CARTE][B] Introduction to modern cryptography: principles and protocols

J Katz, Y Lindell - 2007 - taylorfrancis.com
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …