Verification of initial-state opacity in security applications of discrete event systems

A Saboori, CN Hadjicostis - Information Sciences, 2013 - Elsevier
In this paper, we formulate and analyze methodologies for verifying the notion of initial-state
opacity in discrete event systems that are modeled as non-deterministic finite automata with …

An anonymization-based privacy-preserving data collection protocol for digital health data

J Andrew, RJ Eunice, J Karthikeyan - Frontiers in public health, 2023 - frontiersin.org
Digital health data collection is vital for healthcare and medical research. But it contains
sensitive information about patients, which makes it challenging. To collect health data …

An anonymization protocol for continuous and dynamic privacy-preserving data collection

S Kim, YD Chung - Future Generation Computer Systems, 2019 - Elsevier
Collecting personal data without privacy breaches is important to utilize distributed
microdata. Privacy-preserving data collection is anonymizing personal data within the data …

Does -Anonymous Microaggregation Affect Machine-Learned Macrotrends?

A Rodriguez-Hoyos, J Estrada-Jiménez… - IEEE …, 2018 - ieeexplore.ieee.org
In the era of big data, the availability of massive amounts of information makes privacy
protection more necessary than ever. Among a variety of anonymization mechanisms …

An efficient privacy preserving protocol for dynamic continuous data collection

H Sajjad, T Kanwal, A Anjum, A Khan, A Khan… - computers & …, 2019 - Elsevier
Past and ongoing decades have witnessed significant uplift in data generation due to ever
growing sources of data. Collection and aggradation of such huge data have triggered …

[KNJIGA][B] Verification and enforcement of state-based notions of opacity in discrete event systems

A Saboori - 2010 - search.proquest.com
Motivated by security and privacy considerations in applications of discrete event systems,
we describe and analyze the complexity of verifying various state-based notions of opacity in …

A modification of the Lloyd algorithm for k-anonymous quantization

D Rebollo-Monedero, J Forné, E Pallarès… - Information …, 2013 - Elsevier
We address the problem of designing quantizers that cluster data while satisfying a k-
anonymity requirement. A general data compression perspective is adopted, which …

Privacy preserving data publishing of categorical data through k‐anonymity and feature selection

A Aristodimou, A Antoniades… - Healthcare technology …, 2016 - Wiley Online Library
In healthcare, there is a vast amount of patients' data, which can lead to important
discoveries if combined. Due to legal and ethical issues, such data cannot be shared and …

A look into SIMON from a side-channel perspective

S Bhasin, T Graba, JL Danger… - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
SIMON is a lightweight block cipher, specially designed for resource constrained devices
that was recently presented by the National Security Agency (NSA). This paper deals with a …

Privacy-preserving publishing of opinion polls

A Abdalaal, ME Nergiz, Y Saygin - Computers & security, 2013 - Elsevier
Public opinion is the belief or thoughts of the public regarding a particular topic, especially
one regarding politics, religion or social issues. Opinions may be sensitive since they may …