Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,229 Hits in 6.4 sec

Private Key and Decoder Side Information for Secure and Private Source Coding

Onur Günlü, Rafael F. Schaefer, Holger Boche, Harold Vincent Poor
2022 Entropy  
Exact rate regions are characterized for a lossy source coding problem with a private key, remote source, and decoder side information under security, privacy, communication, and distortion constraints  ...  with respect to the remote source.  ...  • We characterize the lossy secure and private source coding region when noisy measurements of a remote source are observed by all terminals, and there is one private key available.  ... 
doi:10.3390/e24121716 pmid:36554121 pmcid:PMC9778382 fatcat:cyrk3jk5cnfkdj4cob66z5eu2i

Secure and Private Source Coding with Private Key and Decoder Side Information [article]

Onur Günlü, Rafael F. Schaefer, Holger Boche, H. Vincent Poor
2022 arXiv   pre-print
The problem of secure source coding with multiple terminals is extended by considering a remote source whose noisy measurements are the correlated random variables used for secure source reconstruction  ...  Exact rate regions are characterized for a lossy source coding problem with a private key, remote source, and decoder side information under security, privacy, communication, and distortion constraints  ...  We characterize the rate region for a lossy secure and private source coding problem with one private key, remote source, encoder, decoder, eavesdropper, and eavesdropper and decoder side information.  ... 
arXiv:2205.05068v3 fatcat:a3wm445aezf5vphsle43lcgwfm

Secure Multi-Function Computation with Private Remote Sources [article]

Onur Günlü, Matthieu Bloch, Rafael F. Schaefer
2022 arXiv   pre-print
We consider a distributed function computation problem in which parties observing noisy versions of a remote source facilitate the computation of a function of their observations at a fusion center through  ...  Specifically, 1) the remote source should remain private from an eavesdropper and the fusion center, measured in terms of the information leaked about the remote source; 2) the function computed should  ...  Noisy measurements of a remote source used to compute a function securely and privately with the help of a public communication link.  ... 
arXiv:2106.09485v4 fatcat:sc6ikbyp25dhnotofmfmrh4jmm

Private Remote Sources for Secure Multi-Function Computation [article]

Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer
2021 IACR Cryptology ePrint Archive  
We consider a distributed function computation problem in which parties observing noisy versions of a remote source facilitate the computation of a function of their observations at a fusion center through  ...  of the function, to ensure secrecy regardless of the exact function used; 2) the remote source should remain private from the eavesdropper and the fusion center, measured in terms of the information leaked  ...  Index Terms secure multiple function computation, private remote source, lossy function computation, information bottleneck, rate-limited public communication. I.  ... 
dblp:journals/iacr/GunluBS21 fatcat:7k6nbwtlq5et3n2lcntlntnztm

Function Computation under Privacy, Secrecy, Distortion, and Communication Constraints

Onur Günlü
2022 Entropy  
The problem of reliable function computation is extended by imposing privacy, secrecy, and storage constraints on a remote source whose noisy measurements are observed by multiple parties.  ...  The main additions to the classic function computation problem include (1) privacy leakage to an eavesdropper is measured with respect to the remote source rather than the transmitting terminals' observed  ...  We consider a private remote source whose three noisy versions are used for secure single-function computation. Suppose two nodes transmit public indices to a fusion center to compute one function.  ... 
doi:10.3390/e24010110 pmid:35052136 pmcid:PMC8774550 fatcat:6x4e6y56jvbc5nmdy2ocfb57vq

Function Computation Under Privacy, Secrecy, Distortion, and Communication Constraints [article]

Onur Günlü
2022 arXiv   pre-print
The problem of reliable function computation is extended by imposing privacy, secrecy, and storage constraints on a remote source whose noisy measurements are observed by multiple parties.  ...  The main additions to the classic function computation problem include 1) privacy leakage to an eavesdropper is measured with respect to the remote source rather than the transmitting terminals' observed  ...  We consider a private remote source whose three noisy versions are used for secure single-function computation. Suppose two nodes transmit public indices to a fusion center to compute one function.  ... 
arXiv:2201.03948v3 fatcat:o4ibsods4rbo3c6xbh55xf7yni

Parallel Secure Computation Scheme for Biometric Security and Privacy in Standard-Based BioAPI Framework [chapter]

Arun P. Kumara Krishan, Bon K., Adam Ramirez
2011 Biometrics - Unique and Diverse Applications in Nature, Science, and Technology  
Generally speaking, SMC deals with the problem in which two or more parties with private inputs would like to compute jointly some function of their inputs, but no party wishes to reveal its private input  ...  This is essentially a kind of cloud computing model to harass the computing power from multiple sources for PSIPPA.  ...  Parallel Secure Computation Scheme for Biometric Security and Privacy in Standard-Based BioAPI Framework, Biometrics -Unique and Diverse Applications in Nature, Science, and Technology, Dr.  ... 
doi:10.5772/15559 fatcat:3m3jfnatybhgveznk5ribjicie

MMS: An autonomic network-layer foundation for network management

Hemant Gogineni, Albert Greenberg, David Maltz, T. Eugene Ng, Hong Yan, Hui Zhang
2010 IEEE Journal on Selected Areas in Communications  
Index Terms-Autonomic communication, network management, security, performance, system design and implementation.  ...  We demonstrate the practicality of the MMS via a fully functional implementation that runs on commodity hardware. The MMS software is freely available.  ...  We find that the strong security features in our fully functional implementation do not significantly hurt performance, even when run on commodity hardware.  ... 
doi:10.1109/jsac.2010.100103 fatcat:n3wi5p6nibfsrpmeogl67dhibu

Medical Image Compression and Encryption Using Adaptive Arithmetic Coding, Quantization Technique and RSA in DWT Domain

Nehad Hameed Hussein, Maytham A. Ali
2022 Iraqi Journal of Science  
secure against passive or active attacks.  ...  The medical images represent the basis of clinical diagnosis and the source of telehealth and teleconsultation processes.  ...  To achieve that, data source authentication is applied through creating a digital signature. Before sending compressed image, sender computes hash value and signs it using his private key.  ... 
doi:10.24996/ijs.2022.63.5.38 fatcat:poi573r4indanjzbfqhfievkrm

Secure Information Processing with Privacy Assurance - standard based design and development for biometric applications

Bon K. Sy, Adam Ramirez, Arun P. Kumara Krishnan
2010 2010 Eighth International Conference on Privacy, Security and Trust  
This paper presents the design and development of a technique referred to as SIPPA -Secure Information Processing with Privacy Assurance -for biometric data reconstruction.  ...  SIPPA enables a client/server model with the following two properties: (1) the client party can compare the similarity between his/her sample data with the source data on the server side ---without each  ...  Generally speaking, SMC deals with the problem in which multiple parties with private inputs would like to compute jointly some function of their inputs, but no party wishes to reveal its private input  ... 
doi:10.1109/pst.2010.5593255 dblp:conf/pst/SyRK10 fatcat:zabwza5f7jgfflvehz64vs5qcu

Delegation-based authentication and authorization for the IP-based Internet of Things

Rene Hummen, Hossein Shafagh, Shahid Raza, Thiemo Voig, Klaus Wehrle
2014 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)  
Additionally, our delegation architecture naturally provides authorization functionality when leveraging the central role of the delegation server in the initial connection establishment.  ...  The evaluation results show that compared to a public-key-based DTLS handshake our delegation architecture reduces the memory overhead by 64 %, computations by 97 %, network transmissions by 68 %.  ...  The responsibility for the content of this publication lies with the authors.  ... 
doi:10.1109/sahcn.2014.6990364 dblp:conf/secon/HummenSRVW14 fatcat:ntdqbadf25er5bfeisn2fy3vvu

Security for the Industrial IoT: The Case for Information-Centric Networking [article]

Michael Frey, Cenk Gündoğan, Peter Kietzmann, Martine Lenders, Hauke Petersen, Thomas C. Schmidt, Felix Shzu-Juraschek, Matthias Wählisch
2019 arXiv   pre-print
We showcase hazardous gas sensing in widespread industrial environments, such as refineries, and compare with IP-based approaches such as CoAP and MQTT.  ...  With the advent of the IoT, embedded controllers link these 'things' to local networks that often are of low power wireless kind, and are interconnected via gateways to some cloud from the global Internet  ...  Fig. 3 : 3 Computational efforts for signing and verifying data with HMAC(SHA-256) on typical IoT nodes. TABLE I : I Comparison of MQTT, CoAP, and ICN with respect to security measures.  ... 
arXiv:1810.04645v2 fatcat:weaw3bp3qvdf5ndf6fmxerce5a

Internet of things (IoT): a survey on protocols and security risks

R H Aswathy, N Malarvizhi
2018 International Journal of Engineering & Technology  
In this paper we discussed about essential protocols and security issues of IoT.  ...  The world is being connected and interlinked with the exponential growth of this pervasive technology.  ...  The Security model of IoT can be clarified by 3C's ie, Computation, Communication and Control [18] .  ... 
doi:10.14419/ijet.v7i1.7.9380 fatcat:zuk7f3p4jbhbfbqxqspiizfhoi

Breaking Barriers in Emerging Biomedical Applications

Konstantinos Katzis, Lazar Berbakov, Gordana Gardašević, Olivera Šveljo
2022 Entropy  
With this motivation, the paper indicates how data compression and entropy used in security algorithms may pave the way towards mass deployment of such IoT healthcare devices.  ...  Nevertheless, such applications require reliable, resilient, and secure networks.  ...  The security technologies have been developed and integrated with the Open Medical Record System to provide advanced security and privacy protection, as well as the remote access and share of sensitive  ... 
doi:10.3390/e24020226 pmid:35205520 pmcid:PMC8871046 fatcat:w45mc7ttkncrzggyxno777pvzm

Communicate to Learn at the Edge [article]

Deniz Gunduz, David Burth Kurka, Mikolaj Jankowski, Mohammad Mohammadi Amiri, Emre Ozfatura, Sreejith Sreekumar
2020 arXiv   pre-print
Private and secure distributed computation. Distributed training also introduces privacy and security challenges.  ...  Consider two devices with their local observations.  ... 
arXiv:2009.13269v1 fatcat:t6dcbiwzffbrveyyfzyzstb5ea
« Previous Showing results 1 — 15 out of 1,229 results