|
|
|
Souhail Meftah, Shuhao Zhang, Bharadwaj Veeravalli and Khin Mi Mi Aung
The appealing properties of secure hardware solutions such as trusted execution environment (TEE) including low computational overhead, confidentiality guarantee, and reduced attack surface have prompted considerable interest in adopting them for secure ...
ver más
|
|
|
|
|
|
|
Hyundo Yoon, Soojung Moon, Youngki Kim, Changhee Hahn, Wonjun Lee and Junbeom Hur
Public key encryption with keyword search (PEKS) enables users to search over encrypted data outsourced to an untrusted server. Unfortunately, updates to the outsourced data may incur information leakage by exploiting the previously submitted queries. Pr...
ver más
|
|
|
|
|
|
|
Yongbo Jiang, Yuan Zhou and Tao Feng
At present, secure multi-party computing is an effective solution for organizations and institutions that want to derive greater value and benefit from the collaborative computing of their data. Most current secure multi-party computing solutions use enc...
ver más
|
|
|
|
|
|
|
Min Choi, Shinde Rupali Kiran, Se-Chang Oh and Oh-Young Kwon
In this paper, we present a badge awarding system for performance assessment in education using blockchain technology. Learners will be awarded badges, which are certified for a predetermined level of progress in terms of learning. All the badges are sto...
ver más
|
|
|
|