Private set intersection for unequal set sizes with mobile applications

Á Kiss, J Liu, T Schneider, N Asokan… - Privacy Enhancing …, 2017 - research.aalto.fi
Private set intersection (PSI) is a cryptographic technique that is applicable to many privacy-
sensitive scenarios. For decades, researchers have been focusing on improving its …

How to end password reuse on the web

KC Wang, MK Reiter - arxiv preprint arxiv:1805.00566, 2018 - arxiv.org
We present a framework by which websites can coordinate to make it difficult for users to set
similar passwords at these websites, in an effort to break the culture of password reuse on …

The circle game: Scalable private membership test using trusted hardware

S Tamrakar, J Liu, A Paverd, JE Ekberg… - Proceedings of the …, 2017 - dl.acm.org
Malware checking is changing from being a local service to a cloud-assisted one where
users' devices query a cloud server, which hosts a dictionary of malware signatures, to …

Detecting stuffing of a {User's} credentials at her own accounts

KC Wang, MK Reiter - 29th usenix security symposium (usenix security …, 2020 - usenix.org
We propose a framework by which websites can coordinate to detect credential stuffing on
individual user accounts. Our detection algorithm teases apart normal login behavior …

PPSB: An open and flexible platform for privacy-preserving safe browsing

H Cui, Y Zhou, C Wang, X Wang, Y Du… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Safe Browsing (SB) is an important security feature in modern web browsers to help detect
new unsafe websites. Although useful, recent studies have pointed out that the widely …

[HTML][HTML] Private membership test protocol with low communication complexity

S Ramezanian, T Meskanen, M Naderpour… - Digital Communications …, 2020 - Elsevier
We introduce a practical method to perform private membership tests. In this method, clients
are able to test whether an item is in a set controlled by the server without revealing their …

Real-time private membership test using homomorphic encryption

E Chielle, H Gamil, M Maniatakos - 2021 Design, Automation & …, 2021 - ieeexplore.ieee.org
With the ever increasing volume of private data residing on the cloud, privacy is becoming a
major concern. Often times, sensitive information is leaked during a querying process …

Parental control with edge computing and 5g networks

S Ramezanian, T Meskanen… - 2021 29th Conference of …, 2021 - ieeexplore.ieee.org
Parental control methods are a popular tool to keep children safe in the digital world.
Usually, digital parental control methods function by disclosing the entire log of child's on …

Privacy preserving shortest path queries on directed graph

S Ramezanian, T Meskanen… - 2018 22nd Conference of …, 2018 - ieeexplore.ieee.org
Trust relation in this work refers to permission that is given to a user at source-host to access
another user at target-host through an authentication key with a unique fingerprint. We form …

Privacy preservation in outsourced mobility traces through compact data structures

L Calderoni, S Bandini, D Maio - Journal of Information Security and …, 2020 - Elsevier
Indoor localization is widely used as enabling technology for location-based services, such
as advertising, indoor routing, and behavioral analysis. To keep these features available …