Search Results - "Partala, Juha"
-
1
Provably Secure Covert Communication on Blockchain
Published in Cryptography (01-09-2018)“…Blockchain is a public open ledger that provides data integrity in a distributed manner. It is the underlying technology of cryptocurrencies and an increasing…”
Get full text
Journal Article -
2
Indifferentiable hash functions in the standard model
Published in IET information security (01-07-2021)“…Indifferentiability of iterated hash functions is seen as evidence that there are no structural flaws in the iteration structure of the algorithm. However, it…”
Get full text
Journal Article -
3
Algebraic generalization of Diffie–Hellman key exchange
Published in Journal of mathematical cryptology (01-03-2018)“…The Diffie–Hellman key exchange scheme is one of the earliest and most widely used public-key primitives. Its underlying algebraic structure is a cyclic group…”
Get full text
Journal Article -
4
Non-Interactive Zero-Knowledge for Blockchain: A Survey
Published in IEEE access (2020)“…We survey the state-of-the-art non-interactive zero-knowledge argument schemes and their applications in confidential transactions and private smart contracts…”
Get full text
Journal Article -
5
Symmetric Blind Decryption with Perfect Secrecy
Published in Journal of computer networks and communications (01-01-2017)“…A blind decryption scheme enables a user to query decryptions from a decryption server without revealing information about the plain-text message. Such schemes…”
Get full text
Journal Article -
6
Improving Robustness of Biometric Identity Determination with Digital Watermarking
Published in Journal of electrical and computer engineering (01-01-2016)“…The determination of an identity from noisy biometric measurements is a continuing challenge. In many applications, such as identity-based encryption, the…”
Get full text
Journal Article -
7
TrustedMaaS: Transforming trust and transparency Mobility-as-a-Service with blockchain
Published in Future generation computer systems (01-12-2023)Get full text
Journal Article -
8
Semantically Secure Symmetric Encryption with Error Correction for Distributed Storage
Published in Security and communication networks (01-01-2017)“…A distributed storage system (DSS) is a fundamental building block in many distributed applications. It applies linear network coding to achieve an optimal…”
Get full text
Journal Article -
9
Threat modeling AI/ML with the Attack Tree
Published in IEEE access (12-11-2024)“…The pervasive use of AI assistant systems and machine learning-based applications in various fields and everyday life has significantly shifted. However, this…”
Get full text
Journal Article -
10
Blockchain-Based Mobility-as-a-Service
Published in 2019 28th International Conference on Computer Communication and Networks (ICCCN) (01-07-2019)“…In this paper, we present a vision for a blockchain-based Mobility-as-a-Service (MaaS) as an application of edge computing. In current MaaS systems, a central…”
Get full text
Conference Proceeding -
11
Reversible Data Hiding in FTIR Microspectroscopy Images with Tamper Indication and Payload Error Correction
Published in BioMed research international (01-01-2017)“…Fourier transform infrared (FTIR) microspectroscopy images contain information from the whole infrared spectrum used for microspectroscopic analyses. In…”
Get full text
Journal Article -
12
Privacy-Aware Blockchain Innovation for 6G: Challenges and Opportunities
Published in 2020 2nd 6G Wireless Summit (6G SUMMIT) (01-03-2020)“…6G wireless networks improve on 5G by further increasing reliability, speeding up the networks and increasing the available bandwidth. These evolutionary…”
Get full text
Conference Proceeding -
13
Computationally Efficient Early Prognosis of the Outcome of Comatose Cardiac Arrest Survivors Using Slow-Wave Activity Features in EEG
Published in 2023 Computing in Cardiology (CinC) (01-10-2023)“…This study, part of 'Predicting Neurological Recovery from Coma After Cardiac Arrest: The George B. Moody PhysioNet Challenge 2023', evaluated a…”
Get full text
Conference Proceeding -
14
Symmetric Blind Decryption with Perfect Secrecy
Published 21-10-2015“…A blind decryption scheme enables a user to query decryptions from a decryption server without revealing information about the plaintext message. Such schemes…”
Get full text
Journal Article -
15
On the conjugacy search problem and left conjugacy closed loops
Published in Applicable algebra in engineering, communication and computing (01-08-2008)“…The conjugacy search problem (CSP) is used as a primitive in several braid group-based public key encryption schemes. It has been pointed out that, in braid…”
Get full text
Journal Article -
16
Situation Awareness for Autonomous Vehicles Using Blockchain-based Service Cooperation
Published 07-04-2022“…Efficient Vehicle-to-Everything enabling cooperation and enhanced decision-making for autonomous vehicles is essential for optimized and safe traffic…”
Get full text
Journal Article -
17
A note on conjugacy search and racks
Published 10-11-2009“…We show that for every effective left conjugacy closed left quasigroup, there is an induced rack that retains the conjugation structure of the left…”
Get full text
Journal Article -
18
Autonomy and Intelligence in the Computing Continuum: Challenges, Enablers, and Future Directions for Orchestration
Published 03-05-2022“…Future AI applications require performance, reliability and privacy that the existing, cloud-dependant system architectures cannot provide. In this article, we…”
Get full text
Journal Article -
19
6G White paper: Research challenges for Trust, Security and Privacy
Published 24-04-2020“…The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a…”
Get full text
Journal Article -
20
Security threats against the transmission chain of a medical health monitoring system
Published in 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013) (01-10-2013)“…One of the most important aspects of a wireless health monitoring system is the security of data. In this paper, security attacks against the complete…”
Get full text
Conference Proceeding