End-to-end encrypted relational database management systems are the “holy grail” of database security and have been studied by the research community for the last 20 …
Grassroots organizing is a process by which people work from within marginalized communities to effect social, political, economic, and environmental change. People who engage in …
In the modern digital society, individuals, businesses and governments perform numerous everyday tasks such as shopping, banking and commuting using electronic media. Although these electronic …
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since …
In today's age of blockchain and cloud-computing, we are constantly in search of tools that offer accountability without compromising privacy. A class of predominantly used …
The adoption of cloud services is on the rise, with both personal and corporate data being stored on third-party server databases. In order to protect …
An integral component of the modern computing era is the ability to outsource data and computation to remote Cloud Service Providers or CSPs. The advent …
We present several novel constructions—combining cryptography, error correcting codes (ECCs), and data compression—that find ready application in enhancing security and fault-tolerance in cloud storage. We …