A practical fog-based privacy-preserving online car-hailing service system

J Sun, G Xu, T Zhang, M Alazab… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Aiming for minimizing passengers' waiting time and vehicles' vacancy rate, online car-
hailing service systems with fog computing has been deployed in various scenarios. In this …

A secure data self-destructing scheme in cloud computing

J **ong, X Liu, Z Yao, J Ma, Q Li… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
With the rapid development of versatile cloud services, it becomes increasingly susceptible
to use cloud services to share data in a friend circle in the cloud computing environment …

Knowledge mining in cybersecurity: From attack to defense

KA Akbar, SM Halim, Y Hu, A Singhal, L Khan… - IFIP Annual Conference …, 2022 - Springer
In the fast-evolving world of Cybersecurity, an analyst often has the difficult task of
responding to new threats and attack campaigns within a limited amount of time. If an …

Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

K Lee, SG Choi, DH Lee, JH Park, M Yung - … 1-5, 2013, Proceedings, Part I …, 2013 - Springer
Revocation and key evolving paradigms are central issues in cryptography, and in PKI in
particular. A novel concern related to these areas was raised in the recent work of Sahai …

Decentralized privacy-preserving timed execution in blockchain-based smart contract platforms

C Li, B Palanisamy - 2018 IEEE 25th International Conference …, 2018 - ieeexplore.ieee.org
Timed transaction execution is critical for various decentralized privacy-preserving
applications powered by blockchain-based smart contract platforms. Such privacy …

Decentralized release of self-emerging data using smart contracts

C Li, B Palanisamy - 2018 IEEE 37th Symposium on Reliable …, 2018 - ieeexplore.ieee.org
In the age of Big Data, releasing protected sensitive data at a future point in time is critical for
various applications. Such self-emerging data release requires the data to be protected until …

Scalable and forward secure network attestation with privacy-preserving in cloud-assisted internet of things

H **ong, Q Mei, Y Zhao, L Peng… - IEEE Sensors …, 2019 - ieeexplore.ieee.org
To ensure the normal work of the whole system in the context of the Internet of Things (IoT),
remote attestation for each smart device should be guaranteed. However, considering the …

Attribute-based encryption for range attributes

N Attrapadung, G Hanaoka, K Ogawa… - … on Fundamentals of …, 2018 - search.ieice.org
Attribute-Based Encryption (ABE) is an advanced form of public-key encryption where
access control mechanisms based on attributes and policies are possible. In conventional …

Socioty: Practical cryptography in smart home contexts

TM Jois, G Beck, S Belikovetsky… - Proceedings on …, 2024 - petsymposium.org
Smartphones form an important source of trust in modern computing. But, while their mobility
is convenient, smartphones can be stolen or seized, allowing an adversary to impersonate …

Securing blockchain-based timed data release against adversarial attacks

J Wang, B Palanisamy - Journal of Computer Security, 2023 - journals.sagepub.com
Timed data release refers to protecting sensitive data that can be accessed only after a pre-
determined amount of time has passed. While blockchain-based solutions for timed data …