Search
Now showing items 1-10 of 12
The limit of blockchains: Infeasibility of a smart obama-trump contract
(
Association for Computing Machinery
, 2019 , Article)
Although smart contracts are Turing complete, it is a misconception that they can fulfill all routine contracts.
Almost BPXOR Coding Technique for Tolerating Three Disk Failures in RAID7 Architectures
(
Hamad bin Khalifa University Press (HBKU Press)
, 2018 , Conference Paper)
Redundant Array of Independent Disks (RAID) storage architectures provide protection of digital infrastructure against potential disks failures. For example, RAID-5 and RAID-6 architectures provide protection against one ...
Privacy preserving computation in cloud using noise-free fully homomorphic encryption (FHE) schemes
(
Springer Verlag
, 2016 , Conference Paper)
With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
Candidate MDS array codes for tolerating three disk failures in RAID-7 architectures
(
Association for Computing Machinery, Inc
, 2017 , Conference Paper)
Current storage systems use RAID-5 and RAID-6 architectures to provide protection against one and two disk failures, respectively. However, as the size of storage system grows rapidly three concurrent disk failures are ...
Data confidentiality in cloud-based pervasive system
(
Association for Computing Machinery
, 2017 , Conference Paper)
Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ...
Breaking HK17 in Practice
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In November 2017, Hecht and Kamlofsky submitted HK17, a quaternion(octonion)-based Diffie-Hellman key exchange protocol, to NIST post-quantum cryptography project, and thought that at least O(p8) arithmetic operations are ...
Private Function Evaluation Using Intel's SGX
(
John Wiley and Sons Inc
, 2020 , Article)
Private Function Evaluation (PFE) is the problem of evaluating one party's private data using a private function owned by another party. Existing solutions for PFE are based on universal circuits evaluated in secure ...
Free Chain: Enabling Freedom of Expression through Public Blockchains
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Everyone should have the right to expression and opinion without interference. Nevertheless, Internet censorship is often misused to block freedom of speech. The distributed ledger technology provides a globally shared ...
Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs
(
Springer
, 2022 , Conference Paper)
When users store encrypted data in a cloud environment, it is important for users to ask cloud to carry out some computation on the remote data remotely. ORAM is a good potential approach to carry out this kind of remote ...
Garbled computation in cloud
(
Elsevier
, 2016 , Article)
With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...