Corpus ID: 169311931

User-Centric Security and Privacy Approaches in Untrusted Environments

@inproceedings{Diallo2018UserCentricSA,
  title={User-Centric Security and Privacy Approaches in Untrusted Environments},
  author={Mamadou H. Diallo},
  year={2018}
}
  • Mamadou H. Diallo
  • Published 2018
  • Computer Science
  • Author(s): Diallo, Mamadou Hassimiou | Advisor(s): Mehrotra, Sharad | Abstract: Internet based information systems (and applications) such as cloud and Internet of Things (IoT) systems have evolved significantly in recent years due to advances in computing infrastructure and networking technologies. Organizations of all types and sizes are eager to adopt these systems to manage their information. In fact, these systems are significantly impacting the way we work, socialize, create and share… CONTINUE READING

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 117 REFERENCES

    TIPPERS: A privacy cognizant IoT environment

    VIEW 5 EXCERPTS
    HIGHLY INFLUENTIAL

    An implementation of homomorphic encryption

    • S. Halevi
    • GitHubRepository, https://github. com/shaih/HElib,
    • 2013
    VIEW 6 EXCERPTS
    HIGHLY INFLUENTIAL

    Fully Homomorphic Encryption without Bootstrapping

    VIEW 6 EXCERPTS
    HIGHLY INFLUENTIAL

    Fully homomorphic encryption using ideal lattices

    VIEW 6 EXCERPTS
    HIGHLY INFLUENTIAL

    A Rule Verification System for Smart Buildings

    VIEW 1 EXCERPT

    A novel image encryption scheme using chaos, hyper-chaos systems and the secure Hash algorithm SHA-1

    VIEW 1 EXCERPT