Search for dissertations about: "secure aggregation"

Showing result 1 - 5 of 10 swedish dissertations containing the words secure aggregation.

  1. 1. Secure and Privacy-Preserving Cloud-Assisted Computing

    Author : Georgia Tsaloli; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; differential privacy; decentralization; verifiability; privacy-preservation; secure aggregation; secret sharing; cloud computing; privacy;

    Abstract : Smart devices such as smartphones, wearables, and smart appliances collect significant amounts of data and transmit them over the network forming the Internet of Things (IoT). Many applications in our daily lives (e.g., health, smart grid, traffic monitoring) involve IoT devices that often have low computational capabilities. READ MORE

  2. 2. Secure and Privacy-Aware Data Collection in Wireless Sensor Networks

    Author : Ioana Rodhe; Christian Rohner; Per Gunningberg; Roberto Di Pietro; Uppsala universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Secure Data Collection; Key Distribution; Location Privacy; Quality of Information; Wireless Sensor Networks; Datavetenskap med inriktning mot datorkommunikation; Computer Science with specialization in Computer Communication;

    Abstract : A wireless sensor network is a collection of numerous sensors distributed on an area of interest to collect and process data from the environment. One particular threat in wireless sensor networks is node compromise attacks, that is, attacks where the adversary gets physical access to a node and to the programs and keying material stored on it. READ MORE

  3. 3. The Security Properties of In-Network Aggregation

    Author : Kristjan Valur Jonsson; Mads Dam; Ymir Vigfusson; Philippe Bonnet; KTH; []
    Keywords : ;

    Abstract : In-network aggregation is an important paradigm for current and future networked systems, enabling efficient cooperate processing of aggregate information, while providing sub-linear scalability properties. However, security of this important class of algorithms has to date not been sufficiently addressed. READ MORE

  4. 4. Aspects of Secure and Efficient Streaming and Collaboration

    Author : Gunnar Kreitz; Johan Håstad; Shai Halevi; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Computer science; Datalogi;

    Abstract : Research within the area of cryptography constitutes the core of this the- sis. In addition to cryptography, we also present results in peer-assisted streaming and web security. We present results on two specific cryptographic problems: broadcast encryption and secure multi-party computation. READ MORE

  5. 5. Data Integrity and Availability in Power System Communication Infrastructures

    Author : Ognjen Vuković; György Dán; Deepa Kundur; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Cyber security; power systems; communications; state estimation; distributed;

    Abstract : Society is increasingly dependent on the proper functioning of electric power systems. Today's electric power systems rely heavily on information and networking technology in order to achieve efficient and secure operation. READ MORE