[4] viXra:2403.0122 [pdf] submitted on 2024-03-25 06:33:09
Authors: Priyanshi Thakkar, Nishant Doshi
Comments: 14 Pages.
In the realm of cybersecurity, the preservation of privacy in data analysis processes is of paramount importance. This paper explores the application of privacy-preserving techniques, particularly focusing on the pivotal role of differential privacy. Differential privacy offers a rigorous mathematical framework to quantify privacy guarantees, ensuring that data analysis outcomes do not compromise individual privacy. Amidst escalating concerns surrounding privacy breaches and data vulnerabilities, the adoption of robust privacy-preserving measures becomes imperative. Through an extensive literature review, this paper delves into the theoretical foundations of differential privacy, evaluates its effectiveness in practical applications, and outlines future research directions. By elucidating the potential of this technique, the paper aims to contribute to the advancement of privacy-preserving practices and bolster the overall security posture in the cybersecurity landscape.
Category: Data Structures and Algorithms
[3] viXra:2403.0121 [pdf] submitted on 2024-03-25 06:34:03
Authors: Priyanshi Thakkar, Nishant Doshi
Comments: 9 Pages.
The Internet of Things (IoT) represents a transformative paradigm shift in technology, enabling the seamless integration of physical objects into the digital realm through internet connectivity. This paper explores the foundational components of IoT, including devices, sensors, and connectivity infrastructure, and examines its wide-ranging applications across industries such as healthcare, smart cities, and manufacturing. While IoT promises unparalleled automation and efficiency, the paramount importance of cybersecurity cannot be overstated. As IoT devices proliferate, the need to safeguard data integrity, confidentiality, and availability becomes increasingly critical. Robust cybersecurity measures are essential to protect against potential threats and vulnerabilities that could compromise sensitive information or grant unauthorized access to interconnected devices. This paper underscores the imperative of prioritizing cybersecurity in IoT deployment to ensure the reliability and trustworthiness of interconnected systems in our increasingly digitized world.
Category: Data Structures and Algorithms
[2] viXra:2403.0110 [pdf] submitted on 2024-03-22 07:40:12
Authors: Sin Chol-Nam, Ri Kuk-Jin, Cha Hung-Dok
Comments: 14 Pages.
Certificate verification and revocation are important aspects of public-key infrastructures (PKI). This paper presents the Tree-List Certificate Verification (TLCV) scheme, which uses a novel tree-list structure to provide efficient digital certificate verification. Under this scheme, users in a public-key infrastructure are partitioned into clusters and a separate blacklist of revoked certificates is maintained for each cluster. The verification proof for each cluster’s blacklist comes in the form of a hash path and a digital signature. An algorithm to derive an optimal number of clusters that minimizes the TLCV response size was described. The characteristics of TLCV were examined. Simulations were carried out to compare TLCV against a few other schemes and the performance metrics that were examined include computational overhead, network bandwidth, overall user delay and storage overhead. In general, we find that TLCV performs relatively well against the other schemes in most aspects.
Category: Data Structures and Algorithms
[1] viXra:2403.0001 [pdf] submitted on 2024-03-01 22:20:43
Authors: Romain Viguier
Comments: 18 Pages. (Note by viXra Admin: Please cite scientific references)
This article involves many things (hologram, computation, time, fields etc..) with the leading object being called Unifying Circuit.
Category: Data Structures and Algorithms