[PDF][PDF] Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions
Abstract Upon the General Data Protection Regulation's (GDPR) application on 25 May
2018 across the European Union, new legal requirements for the protection of personal data …
2018 across the European Union, new legal requirements for the protection of personal data …
Countering gattaca: efficient and secure testing of fully-sequenced human genomes
Recent advances in DNA sequencing technologies have put ubiquitous availability of fully
sequenced human genomes within reach. It is no longer hard to imagine the day when …
sequenced human genomes within reach. It is no longer hard to imagine the day when …
Fast and private computation of cardinality of set intersection and union
In many everyday scenarios, sensitive information must be shared between parties without
complete mutual trust. Private set operations are particularly useful to enable sharing …
complete mutual trust. Private set operations are particularly useful to enable sharing …
Efficient genome-wide, privacy-preserving similar patient query based on private edit distance
Edit distance has been proven to be an important and frequently-used metric in many
human genomic research, with Similar Patient Query (SPQ) being a particularly promising …
human genomic research, with Similar Patient Query (SPQ) being a particularly promising …
SetRkNN: Efficient and privacy-preserving set reverse kNN query in cloud
The advance of cloud computing has driven a new paradigm of outsourcing large-scale data
and data-driven services to public clouds. Due to the increased awareness of privacy …
and data-driven services to public clouds. Due to the increased awareness of privacy …
Privacy protection in biometric-based recognition systems: A marriage between cryptography and signal processing
Systems employing biometric traits for people authentication and identification are
witnessing growing popularity due to the unique and indissoluble link between any …
witnessing growing popularity due to the unique and indissoluble link between any …
Lightweight, Secure, Similar-Document Retrieval over Encrypted Data
Applications for document similarity detection are widespread in diverse communities,
including institutions and corporations. However, currently available detection systems fail to …
including institutions and corporations. However, currently available detection systems fail to …
Achieving efficient and privacy-preserving exact set similarity search over encrypted data
Set similarity search, aiming to search the similar sets to a query set, has wide application in
today's recommendation services. Meanwhile, the rapid advance in cloud technique has …
today's recommendation services. Meanwhile, the rapid advance in cloud technique has …
Profile matching for IoMT: A verifiable private set intersection scheme
Y Qian, J Shen, P Vijayakumar… - IEEE journal of …, 2021 - ieeexplore.ieee.org
The rapid development of the Internet of Things (IoTs), 5 G and artificial intelligence (AI)
technology have been dramatically incentivizing the advancement of Internet of Medical …
technology have been dramatically incentivizing the advancement of Internet of Medical …
Private set intersection with authorization over outsourced encrypted datasets
Thanks to its convenience and cost-savings feature, cloud computing ushers a new era. Yet
its security and privacy issues must not be neglected. Private set intersection (PSI) is useful …
its security and privacy issues must not be neglected. Private set intersection (PSI) is useful …