The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The problem of secure software licensing is to enforce meaningful restrictions on how software is run on machines outside the control of the software author/vendor. The problem has been addressed through a variety of approaches from software obfuscation to hardware-based solutions, but existent solutions offer only heuristic guarantees which are often invalidated by attacks. This paper establishes...
The Internet of Things (IoT) integrates a large number of physical objects that are uniquely identified, ubiquitously interconnected and accessible through the Internet. IoT aims to transform any object in the real-world into a computing device that has sensing, communication and control capabilities. There is a growing number of IoT devices and applications and this leads to an increase in the number...
As cloud service providers improve their infrastructure, it is becoming increasingly attractive for users to move their programs and data to the cloud. This carries security risks, however, as users trust the provider to handle their private data correctly, without disclosing it our using it for their own benefit. A solution to this problem is for all data to be encrypted at all times, including when...
Online databases currently store large quantities of sensitive information. This information includes sequences, for example trajectories or network packet flows. While interesting conclusions might be drawn from analyzing it, the process is not trivial, as the results risk compromising the privacy of participating users. Differential privacy proposes a solution for the safe analysis of such data,...
Current concerns about data privacy have lead to increased focus on data anonymization methods. Differential privacy is a new mechanism that offers formal guarantees about anonymization strength. The main challenge when using differential privacy consists in the difficulty in designing correct algorithms when operating on complex data types. One such data type is sequential data, which is used to...
Privacy is an increasing concern as the number of databases containing personal information grows. Differential privacy algorithms can be used to provide safe database queries through the insertion of noise. Attackers cannot recover pieces of the initial data with certainty, but this comes at the cost of data utility. Noise insertion leads to errors, and signal to noise ratio can become an issue....
Cloud based services have seen a steady increase in popularity in recent time due to high availability, low cost and ease of use. The performance of such services is determined by the resource allocation algorithms. Generic allocation algorithms like best fit or first fit are an adequate solution for generic services. When additional information is available about the applications that are deployed...
The increase in popularity of online services has generated interest in developing new algorithms to better protect user privacy. Some services defend individual user records by only releasing statistics like the number of users that match certain criteria. If an attacker has access to side information, releasing such summaries can lead to privacy breaches where the records of a certain user are revealed...
As security is an important concern, the usage of encrypted communication is increasing. As a result, techniques that allow complex operations on such data streams are of importance. Searchable encryption allows entities to evaluate predicates on encrypted data without disclosing any other information except the outcome of the operation. We focus on Hidden Vector Encryption, which allows the usage...
Private Information Retrieval (PIR) schemes offer privacy to Internet users by protecting the contents of their queries from the servers that they use. As the problem of user data collected by various services is becoming an issue of increasing concern, the functionality offered by such schemes is gaining a lot of attention. There are various PIR methods that ensure privacy, ranging from information-theoretic...
Virtualization technologies have grown steadily in the testing and educational environments, owing to their low costs for deploying a wide variety of scenarios. Many applications that provide network node virtualization face scalability problems when larger topologies are created because of their high memory and processing requirements. Although such applications offer methods for load distribution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.