A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Private Key and Decoder Side Information for Secure and Private Source Coding
2022
Entropy
Exact rate regions are characterized for a lossy source coding problem with a private key, remote source, and decoder side information under security, privacy, communication, and distortion constraints ...
with respect to the remote source. ...
• We characterize the lossy secure and private source coding region when noisy measurements of a remote source are observed by all terminals, and there is one private key available. ...
doi:10.3390/e24121716
pmid:36554121
pmcid:PMC9778382
fatcat:cyrk3jk5cnfkdj4cob66z5eu2i
Secure and Private Source Coding with Private Key and Decoder Side Information
[article]
2022
arXiv
pre-print
The problem of secure source coding with multiple terminals is extended by considering a remote source whose noisy measurements are the correlated random variables used for secure source reconstruction ...
Exact rate regions are characterized for a lossy source coding problem with a private key, remote source, and decoder side information under security, privacy, communication, and distortion constraints ...
We characterize the rate region for a lossy secure and private source coding problem with one private key, remote source, encoder, decoder, eavesdropper, and eavesdropper and decoder side information. ...
arXiv:2205.05068v3
fatcat:a3wm445aezf5vphsle43lcgwfm
Secure Multi-Function Computation with Private Remote Sources
[article]
2022
arXiv
pre-print
We consider a distributed function computation problem in which parties observing noisy versions of a remote source facilitate the computation of a function of their observations at a fusion center through ...
Specifically, 1) the remote source should remain private from an eavesdropper and the fusion center, measured in terms of the information leaked about the remote source; 2) the function computed should ...
Noisy measurements of a remote source used to compute a function securely and privately with the help of a public communication link. ...
arXiv:2106.09485v4
fatcat:sc6ikbyp25dhnotofmfmrh4jmm
Private Remote Sources for Secure Multi-Function Computation
[article]
2021
IACR Cryptology ePrint Archive
We consider a distributed function computation problem in which parties observing noisy versions of a remote source facilitate the computation of a function of their observations at a fusion center through ...
of the function, to ensure secrecy regardless of the exact function used; 2) the remote source should remain private from the eavesdropper and the fusion center, measured in terms of the information leaked ...
Index Terms secure multiple function computation, private remote source, lossy function computation, information bottleneck, rate-limited public communication.
I. ...
dblp:journals/iacr/GunluBS21
fatcat:7k6nbwtlq5et3n2lcntlntnztm
Function Computation under Privacy, Secrecy, Distortion, and Communication Constraints
2022
Entropy
The problem of reliable function computation is extended by imposing privacy, secrecy, and storage constraints on a remote source whose noisy measurements are observed by multiple parties. ...
The main additions to the classic function computation problem include (1) privacy leakage to an eavesdropper is measured with respect to the remote source rather than the transmitting terminals' observed ...
We consider a private remote source whose three noisy versions are used for secure single-function computation. Suppose two nodes transmit public indices to a fusion center to compute one function. ...
doi:10.3390/e24010110
pmid:35052136
pmcid:PMC8774550
fatcat:6x4e6y56jvbc5nmdy2ocfb57vq
Function Computation Under Privacy, Secrecy, Distortion, and Communication Constraints
[article]
2022
arXiv
pre-print
The problem of reliable function computation is extended by imposing privacy, secrecy, and storage constraints on a remote source whose noisy measurements are observed by multiple parties. ...
The main additions to the classic function computation problem include 1) privacy leakage to an eavesdropper is measured with respect to the remote source rather than the transmitting terminals' observed ...
We consider a private remote source whose three noisy versions are used for secure single-function computation. Suppose two nodes transmit public indices to a fusion center to compute one function. ...
arXiv:2201.03948v3
fatcat:o4ibsods4rbo3c6xbh55xf7yni
Parallel Secure Computation Scheme for Biometric Security and Privacy in Standard-Based BioAPI Framework
[chapter]
2011
Biometrics - Unique and Diverse Applications in Nature, Science, and Technology
Generally speaking, SMC deals with the problem in which two or more parties with private inputs would like to compute jointly some function of their inputs, but no party wishes to reveal its private input ...
This is essentially a kind of cloud computing model to harass the computing power from multiple sources for PSIPPA. ...
Parallel Secure Computation Scheme for Biometric Security and Privacy in Standard-Based BioAPI Framework, Biometrics -Unique and Diverse Applications in Nature, Science, and Technology, Dr. ...
doi:10.5772/15559
fatcat:3m3jfnatybhgveznk5ribjicie
MMS: An autonomic network-layer foundation for network management
2010
IEEE Journal on Selected Areas in Communications
Index Terms-Autonomic communication, network management, security, performance, system design and implementation. ...
We demonstrate the practicality of the MMS via a fully functional implementation that runs on commodity hardware. The MMS software is freely available. ...
We find that the strong security features in our fully functional implementation do not significantly hurt performance, even when run on commodity hardware. ...
doi:10.1109/jsac.2010.100103
fatcat:n3wi5p6nibfsrpmeogl67dhibu
Medical Image Compression and Encryption Using Adaptive Arithmetic Coding, Quantization Technique and RSA in DWT Domain
2022
Iraqi Journal of Science
secure against passive or active attacks. ...
The medical images represent the basis of clinical diagnosis and the source of telehealth and teleconsultation processes. ...
To achieve that, data source authentication is applied through creating a digital signature. Before sending compressed image, sender computes hash value and signs it using his private key. ...
doi:10.24996/ijs.2022.63.5.38
fatcat:poi573r4indanjzbfqhfievkrm
Secure Information Processing with Privacy Assurance - standard based design and development for biometric applications
2010
2010 Eighth International Conference on Privacy, Security and Trust
This paper presents the design and development of a technique referred to as SIPPA -Secure Information Processing with Privacy Assurance -for biometric data reconstruction. ...
SIPPA enables a client/server model with the following two properties: (1) the client party can compare the similarity between his/her sample data with the source data on the server side ---without each ...
Generally speaking, SMC deals with the problem in which multiple parties with private inputs would like to compute jointly some function of their inputs, but no party wishes to reveal its private input ...
doi:10.1109/pst.2010.5593255
dblp:conf/pst/SyRK10
fatcat:zabwza5f7jgfflvehz64vs5qcu
Delegation-based authentication and authorization for the IP-based Internet of Things
2014
2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)
Additionally, our delegation architecture naturally provides authorization functionality when leveraging the central role of the delegation server in the initial connection establishment. ...
The evaluation results show that compared to a public-key-based DTLS handshake our delegation architecture reduces the memory overhead by 64 %, computations by 97 %, network transmissions by 68 %. ...
The responsibility for the content of this publication lies with the authors. ...
doi:10.1109/sahcn.2014.6990364
dblp:conf/secon/HummenSRVW14
fatcat:ntdqbadf25er5bfeisn2fy3vvu
Security for the Industrial IoT: The Case for Information-Centric Networking
[article]
2019
arXiv
pre-print
We showcase hazardous gas sensing in widespread industrial environments, such as refineries, and compare with IP-based approaches such as CoAP and MQTT. ...
With the advent of the IoT, embedded controllers link these 'things' to local networks that often are of low power wireless kind, and are interconnected via gateways to some cloud from the global Internet ...
Fig. 3 : 3 Computational efforts for signing and verifying data with HMAC(SHA-256) on typical IoT nodes.
TABLE I : I Comparison of MQTT, CoAP, and ICN with respect to security measures. ...
arXiv:1810.04645v2
fatcat:weaw3bp3qvdf5ndf6fmxerce5a
Internet of things (IoT): a survey on protocols and security risks
2018
International Journal of Engineering & Technology
In this paper we discussed about essential protocols and security issues of IoT. ...
The world is being connected and interlinked with the exponential growth of this pervasive technology. ...
The Security model of IoT can be clarified by 3C's ie, Computation, Communication and Control [18] . ...
doi:10.14419/ijet.v7i1.7.9380
fatcat:zuk7f3p4jbhbfbqxqspiizfhoi
Breaking Barriers in Emerging Biomedical Applications
2022
Entropy
With this motivation, the paper indicates how data compression and entropy used in security algorithms may pave the way towards mass deployment of such IoT healthcare devices. ...
Nevertheless, such applications require reliable, resilient, and secure networks. ...
The security technologies have been developed and integrated with the Open Medical Record System to provide advanced security and privacy protection, as well as the remote access and share of sensitive ...
doi:10.3390/e24020226
pmid:35205520
pmcid:PMC8871046
fatcat:w45mc7ttkncrzggyxno777pvzm
Communicate to Learn at the Edge
[article]
2020
arXiv
pre-print
Private and secure distributed computation. Distributed training also introduces privacy and security challenges. ...
Consider two devices with their local observations. ...
arXiv:2009.13269v1
fatcat:t6dcbiwzffbrveyyfzyzstb5ea
« Previous
Showing results 1 — 15 out of 1,229 results