
-
Concealer: SGX-based Secure, Volume Hiding, and Verifiable Processing of Spatial Time-Series Datasets
This paper proposes a system, entitled Concealer that allows sharing tim...
read it
-
Quest: Practical and Oblivious Mitigation Strategies for COVID-19 using WiFi Datasets
Contact tracing has emerged as one of the main mitigation strategies to ...
read it
-
LOCATER: Cleaning WiFi Connectivity Datasets for Semantic Localization
This paper explores the data cleaning challenges that arise in using WiF...
read it
-
Canopy: A Verifiable Privacy-Preserving Token Ring based Communication Protocol for Smart Homes
This paper focuses on the new privacy challenges that arise in smart hom...
read it
-
IoT Expunge: Implementing Verifiable Retention of IoT Data
The growing deployment of Internet of Things (IoT) systems aims to ease ...
read it
-
IoT Notary: Sensor Data Attestation in Smart Environment
Contemporary IoT environments, such as smart buildings, require end-user...
read it
-
Smart Home Survey on Security and Privacy
Smart homes are a special use-case of the Internet-of-Things (IoT) parad...
read it
-
Verifiable Round-Robin Scheme for Smart Homes
Advances in sensing, networking, and actuation technologies have resulte...
read it
-
An Event Based Approach To Situational Representation
Many application domains require representing interrelated real-world ac...
read it