STAR: Distributed Secret Sharing for Private Threshold Aggregation Reporting

no code yet • 21 Sep 2021

In practice and research, threshold aggregation systems~ -- ~that attempt to preserve client K-anonymity during data analysis~ -- ~incur significant implementation hurdles, including: i) use of trusted servers; ii) complex and expensive coordination between clients to ensure records are not identifying; and iii) protocols that are expensive in terms of computation, network use, or both.

Cryptography and Security

TWEETS

Pinpointing and Measuring Wasabi and Samourai CoinJoins in the Bitcoin Ecosystem

no code yet • 21 Sep 2021

Our study reveals a somewhat steady adoption of these services and found a growing trend with a total amount of 190, 777. 11 mixed BTC with a value of ca.

Cryptography and Security Computers and Society

TWEETS

SoK: Cryptographic Confidentiality of Data on Mobile Devices

no code yet • 22 Sep 2021

We then analyze existing mobile device confidentiality measures to identify research areas that have not received proper attention from the community and represent opportunities for future research.

Cryptography and Security

TWEETS

Security Review of Ethereum Beacon Clients

no code yet • 23 Sep 2021

The beacon chain is the backbone of the Ethereum's evolution towards a proof-of-stake-based scalable network.

Cryptography and Security

TWEETS

"It's a Trap!"-How Speculation Invariance Can Be Abused with Forward Speculative Interference

no code yet • 22 Sep 2021

We show that forward speculative interference whereolder speculative instructions interfere with younger speculation invariant instructions effectively turns them into transmitters for secret data accessed during speculation.

Cryptography and Security Hardware Architecture

TWEETS

MedKnowts: Unified Documentation and Information Retrieval for Electronic Health Records

no code yet • 23 Sep 2021

Clinical documentation can be transformed by Electronic Health Records, yet the documentation process is still a tedious, time-consuming, and error-prone process.

Human-Computer Interaction

TWEETS

Developers Perception of Peer Code Review in Research Software Development

no code yet • 22 Sep 2021

Method: We conducted interviews and a community survey of research software developers to collect information about their current peer code review practices, difficulties they face, and how they address those difficulties.

Software Engineering

TWEETS

Scholarly outputs of EU Research Funding Programs: Understanding differences between datasets of publications reported by grant holders and OpenAIRE Research Graph in H2020

no code yet • 22 Sep 2021

For the EU research funding programs, there are multiple datasets linking scholarly publications to the individual grants, including both open data and those from commercial bibliometric databases.

Digital Libraries

TWEETS

A Deep Learning Perspective on Connected Automated Vehicle (CAV) Cybersecurity and Threat Intelligence

no code yet • 22 Sep 2021

To deal with the security threats in high-speed, high dimensional, multimodal data and assets from eccentric stakeholders of the CAV ecosystem, this chapter presents and analyzes some of the state of art deep learning-based threat intelligence for attack detection.

Cryptography and Security Systems and Control Systems and Control

TWEETS

GPU4S: Embedded GPUs in Space -- Latest Project Updates

no code yet • 22 Sep 2021

In this project, we study the applicability of embedded GPUs in space, which have shown a dramatic improvement of their performance per-watt ratio coming from their proliferation in consumer markets based on competitive European technology.

Hardware Architecture

TWEETS