SR
S. Roos
23 records found
1
Federated Learning is highly susceptible to backdoor and targeted attacks as participants can manipulate their data and models locally without any oversight on whether they follow the correct process. There are a number of server-side defenses that mitigate the attacks by modify
...
Blockchain technology has revolutionized the way data is stored, managed, and shared across various industries. Its decentralized nature and immutability make it highly attractive in use cases that require transparency, integrity, and accountability. However, some applications de
...
Payment channel networks (PCNs) are a promising solution to the blockchain scalability problem. They move payments off-chain, i.e., not all payments have to be included in the blockchain. Thus, they do not require that every payment is broadcast to all participants and verified b
...
Privacy-Preserving Verifiable Double Auctions
An application for electricity trading
Double Auctions are mechanisms to trade commodities such as electricity or parts of the wireless spectrum at optimal prices. Bidders and sellers simultaneously submit quantity-price pairs to an auctioneer, denoting the quantity they want to buy or sell at specific prices. The auc
...
Revisit Attacks on Searchable Symmetric Encryption
Explore More, Reveal More
Searchable Symmetric Encryption (SSE) schemes provide secure search over encrypted databases while allowing admitted information leakages. Generally, the leakages can be categorized into access, search, and volume pattern. In most existing Searchable Encryption (SE) schemes, thes
...
We can see and we can hear through the internet, but not yet touch. Tactile Internet (TI) is the paradigm that will enable the transmission of tactile feedback through the internet. TI requires Ultra Low Latency (ULL) networking to prevent desynchronization. Reaching the ULL requ
...
As technology evolves, transmission speeds become faster. Tactile Internet requires ultra-low-latency (ULL) communications to further immerse humans in a remote environment by transmitting movement and force feedback, allowing them to interact with that environment in real-time.
...
The tactile internet can be described as the next step of the internet. It can empower people, adding physical interactions to what normally is just an audiovisual experience.
It however does need ultra-low latency.
A solution to having delays can be found in environment ...
It however does need ultra-low latency.
A solution to having delays can be found in environment ...
A problem faced by Tactile Internet (TI) is the distance limitation. A possible solution is to create a simulation of the remote environment, such that the delay experienced by a human operator is reduced. However, to obtain a model of the remote environment, before the user inte
...
Some of the most prominent types of attacks against modern cryptographic implementations are side-channel attacks. These attacks leverage some unintended, often physical, leakage of the implementation to retrieve secret information. In recent times, a large part of the focus of s
...
SSE Is Not As Secure As It Looks
New Attacks On Range Queries Using PQ-Trees And Auxiliary Information
In a world where more data gets uploaded to the cloud, it is essential that the data gets stored securely. For users to keep search functionality, searchable symmetric encryption has been developed. SSE works by a user sending a token representing a keyword (or a range), after wh
...
The increasing demand for sharing Internet of Things (IoT) increases demand for a secure way of sharing data. Smart contracts could provide this because of its distributed nature. Proxy re-encryption is an encryption (PRE) method that can be used to share information. In this pap
...
Privacy and security are important topics in data aggregation, as companies are aggregating large amounts of sensitive data from their users. The aim of this paper is to improve the security and privacy of data aggregation using smart contracts, homomorphic encryption and post-qu
...
A rise in the use of blockchain systems implies an increase in smart contract usage. Blockchain systems can easily be found these days, most notably in cryptocurrencies and financial management. Furthermore, the Internet of Things (IoT) is being developed with blockchain, since b
...
Blockchains like Bitcoin are known to be victim of scalability issues. The lack in high throughput and low latency form a great bottleneck to its network. A promis- ing solution are layer 2 protocols, more precisely payment channel networks (PCN). Payment success rates are a comm
...
The largest payment channel network, Bitcoin Lightning, shows a potential alternative to cur- rent financial systems, overcoming the scalability limitations of blockchain. Source onion routing is used to route payments, but novel routing protocols claim improved effectiveness by
...
Bubblechain
An IoT authentication system
Authentication of domains has been a crucial part of the growth of web browsing, especially for e-commerce and secure browsing. However, the digital space has expanded from web domains to include devices such as smart cars, smart houses, and other IoT devices. The future for thes
...
Network covert timing channels are techniques to covertly transmit information over computer networks, by utilizing the time between subsequent network packets. Previous work on the detection of the various techniques has introduced numerous new methods, with high reported succes
...
Unsatisfiable core learning for Chuffed
Improving the performance of Chuffed, a Lazy-Clause-Generation solver, by using machine learning to predict unsatisfiable cores
Solving propositional satisfiability (SAT) and constraint programming (CP) instances has been a fundamental part of a wide range of modern applications. For this reason a lot of research went into improving the efficiency of modern SAT and CP solvers. Recently much of this resear
...
The adoption of smart wearable devices has been on the rise over the past few years. These wearables are able to track the user's vital signs, making them valuable for use in the healthcare industry. Sharing this information with the user's healthcare provider has the potential t
...