JAVA

Efficient Anonymous Message Submission

Abstract:

In online surveys, many people are not willing to provide true answers due to privacy concerns. Thus, anonymity is important Read More

Conditional Diagnosability of (n; k)-Star Graphs under the PMC Model

Abstract:

Fault diagnosis has played a major role in measuring the reliability of multiprocessor systems. The diagnosability of many well-known multiprocessor Read More

Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis

Abstract:

With the proliferation of websites, the security level of password-protected accounts is no longer purely determined by individual ones. Users Read More

On the Efficiency of FHE-based Private Queries

Abstract:

Private query processing is a very attractive problem in the fields of both cryptography and databases. In this work, we Read More

Physical Attestation in the Smart Grid for Distributed State Verification

Abstract:

A cyber-physical system (CPS) integrates a physical infrastructure with cyber computation for improved performance and reliability. Most CPSs are distributed Read More

PDA: Semantically Secure Time-Series Data Analytics with Dynamic User Groups

Abstract:

Third-party analysis on private records is becoming increasingly important due to the widespread data collection for various analysis purposes. However, Read More

End-to-End Detection of Caller ID Spoofing Attacks

Abstract:

Caller ID (caller identification) is a service provided by telephone operators where the phone number and/or the name of the Read More

Conditional (t; k)-Diagnosis in Regular and Irregular Graphs Under the Comparison Diagnosis Model

Abstract:

Assume that there are at most t faulty vertices. A system is conditionally (t; k)-diagnosable if at least k faulty Read More