Mastering data privacy: leveraging K-anonymity for robust health data sharingSpringer Science and Business Media LLC - - 2024
Stylianos Karagiannis, Christoforos Ntantogian, Emmanouil Magkos, Aggeliki Tsohou, Luís Landeiro Ribeiro
In modern healthcare systems, data sources are highly integrated, and the privacy challenges are becoming a paramount concern. Despite the critical importance of privacy preservation in safeguarding sensitive and private information across various domains, there is a notable deficiency of learning and training material for privacy preservation. In this research, we present a k-anonymity algorithm ...... hiện toàn bộ
CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersectionSpringer Science and Business Media LLC - Tập 10 - Trang 301-319 - 2011
Luciana Marconi, Mauro Conti, Roberto Di Pietro
Enforcing security often requires the two legitimate parties of a communication to determine if they share a secret, without disclosing information (e.g., the shared secret itself, or just the existence of such a secret) to third parties. In this paper, we propose CASSANDRA, a toolbox composed of three probabilistic protocols that allows two parties, each one having a subset of elements drawn by a...... hiện toàn bộ
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycleSpringer Science and Business Media LLC - Tập 17 - Trang 135-151 - 2017
Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Youki Kadobayashi
A web user who falsely accesses a compromised website is usually redirected to an adversary’s website and is forced to download malware after being exploited. Additionally, the adversary steals the user’s credentials by using information-leaking malware. The adversary may also try to compromise public websites owned by individual users by impersonating the website administrator using the stolen cr...... hiện toàn bộ
CADS-ML/DL: efficient cloud-based multi-attack detection systemSpringer Science and Business Media LLC - - 2023
Saida Farhat, Manel Abdelkader, Amel Meddeb-Makhlouf, Faouzi Zarai
With the increasing adoption of cloud computing, securing cloud-based systems and applications has become a critical concern for almost every organization. Traditional security approaches such as signature-based and rule-based have limited detection capabilities toward new and sophisticated attacks. To address this issue, there has been an increasing focus on implementing Artificial Intelligence (...... hiện toàn bộ
Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologiesSpringer Science and Business Media LLC -
W. M. A. B. Wijesundara, Joong-Sun Lee, Dara Tith, Eleni Aloupogianni, Hiroki Suzuki, Takashi Obi
AbstractWith the increase of IoT devices generating large amounts of user-sensitive data, improper firmware harms users’ security and privacy. Latest home appliances are integrated with features to assure compatibility with smart home IoT. However, applying complex security mechanisms to IoT is limited by device hardware capabilities, making them vulnerable to atta...... hiện toàn bộ
Efficient verifiably encrypted signatures from latticesSpringer Science and Business Media LLC - Tập 13 - Trang 305-314 - 2014
Kee Sung Kim, Ik Rae Jeong
Verifiably encrypted signature schemes can convince a verifier that a given ciphertext is an encryption of an ordinary signature on a given message and the ordinary signature can be recovered by the third party, called adjudicator. In 2010, Rückert et al. proposed a general construction for the verifiably encrypted signatures, and then, they also showed that there exist the lattice-based verifiabl...... hiện toàn bộ
A method for identifying Web applicationsSpringer Science and Business Media LLC - Tập 8 - Trang 455-467 - 2009
Mario Kozina, Marin Golub, Stjepan Groš
Web applications are ubiquitous in today’s businesses. The security of these applications is of utmost importance since security breaches might negatively impact good reputation, and even result in bankruptcy. There are different methods of assessing security of Web applications, mainly based on some automated method of scanning. One type of scan method feeds random data to the application and mon...... hiện toàn bộ