The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose an efficient anonymous data reporting protocol for participatory sensing, which provide strong privacy protection, data accuracy, and generality. The protocol consists of two stages: 1) slot reservation and 2) message submission. In the slot reservation stage, a group of $N$ participants cooperate to assign each member a message slot in a vector which is essentially a message...
We introduce new secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users. Our protocols allow a smartphone to privately perform continuous and unobtrusive authentication using touch behaviors. Through our protocols, the smartphone does not need to disclose touch information to the authentication server. Further, neither the server nor the smartphone have access...
Concerns of privacy, template security and efficiency of biometric authentication systems have received considerable research attention in the recent past. Binary template representations have been shown to provide significant improvements in efficiency without compromising accuracy for a variety of biometric modalities including fingerprints, palmprints and iris. Most of the secure authentication...
An RSA variant algorithmic approach for speeding up SSL's performance is presented on a web server. The RSA variant improves the performance of SSL's handshake protocol by up to a factor of 7.5 for 1024-bit RSA keys. We improve the server's performance by batching the SSL handshake protocol and shifting some decryption work to SSL clients. The theoretical value shows that the performance of the SSL...
We propose an attribute-based cryptosystem in which decryption is conditional on the distance between attributes. Alice constructs a cipher text that consists of an encrypted message and a hidden attribute vector. Bob is able to decrypt Alice's message if and only if his attribute vector is within a specified maximum distance from Alice's attribute vector. We provide constructions for Euclidean and...
Biometric-based authentication systems have been widely used in applications that require high reliable scheme. For instance, iris-based authentication systems had received great attention due to its high reliability for personal identification. However, the growing use of biometric systems in real life applications raises more attention and concern about the privacy issues. Unlike PIN or password...
In a question-driven phone assistance system, if the answer to one question decides the next one, hiding user's answers is not enough to protect her privacy. In this work, we explore an audio streaming mechanism where the assistance system is not aware of the questions that the user retrieves. In addition, we discuss the deployment of these mechanisms on a real system, using VoIP schemes and cloud...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.