%---------------------------------------------------------------------------%
%-                                                                         -%
%-                             Bibliography                                -%
%-                                                                         -%
%---------------------------------------------------------------------------%


@INPROCEEDINGS{8356345,
  author={Niaz, Muhammad Saqib and Saake, Gunter},
  booktitle={2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)}, 
  title={Forward secure searchable symmetric encryption}, 
  year={2017},
  volume={},
  number={},
  pages={49-54},
  keywords={Encryption;Servers;Privacy;Indexes;Cloud computing;component;Dynamic Searchable Symmetric Encryption;Dynamic Searchable Encryption;Searchable Symmetric Encryption;Forward Privacy;Backward Privacy;Space Reclaiming},
  doi={10.23919/ICITST.2017.8356345}}


@INPROCEEDINGS{9832032,
  author={Meng, Zihua and Wang, Yue},
  booktitle={2022 IEEE 2nd International Conference on Electronic Technology, Communication and Information (ICETCI)}, 
  title={Asymmetric Encryption Algorithms: Primitives and Applications}, 
  year={2022},
  volume={},
  number={},
  pages={876-881},
  keywords={Electron traps;Elliptic curves;Conferences;Elliptic curve cryptography;Encryption;Internet;asymmetric encryption;RSA;trapdoor function;descrte logarithm problem},
  doi={10.1109/ICETCI55101.2022.9832032}}


@INPROCEEDINGS{656246,
  author={Bertino, E. and Bettini, C. and Samarati, P.},
  booktitle={Proceedings New Security Paradigms Workshop}, 
  title={A discretionary access control model with temporal authorizations}, 
  year={1994},
  volume={},
  number={},
  pages={102-107},
  keywords={Access control;Authorization;Object oriented modeling;Data security;Data models;Databases;Invasive software;Office automation;Proposals},
  doi={10.1109/NSPW.1994.656246}}

@INPROCEEDINGS{8662112,
  author={Ko, Jae-Yong and Lee, Sang-Gil and Lee, Cheol-Hoon},
  booktitle={2019 IEEE International Conference on Consumer Electronics (ICCE)}, 
  title={Real-time Mandatory Access Control on SELinux for Internet of Things}, 
  year={2019},
  volume={},
  number={},
  pages={1-6},
  keywords={Real-time systems;Access control;Linux;Kernel;Instruction sets;Servers},
  doi={10.1109/ICCE.2019.8662112}}

@ARTICLE{8129806,
  author={Power, David and Slaymaker, Mark and Simpson, Andrew},
  journal={The Computer Journal}, 
  title={On Formalizing and Normalizing Role-Based Access Control Systems}, 
  year={2009},
  volume={52},
  number={3},
  pages={305-325},
  keywords={D.2.4 software/program verification—formal methods;D.4.6 security and protection—access control;role-based access controls;Z specification language},
  doi={10.1093/comjnl/bxn016}}




@INPROCEEDINGS{11042182,
  author={Suganthi, M. and Selvan, K. Tamizh and Bright, A. Risen and Loganathan, S. and Sathya, R.},
  booktitle={2025 Third International Conference on Augmented Intelligence and Sustainable Systems (ICAISS)}, 
  title={Secure Data Masking Through Synthetic Data Generation using ML}, 
  year={2025},
  volume={},
  number={},
  pages={111-115},
  keywords={Industries;Data privacy;Data security;Scalability;Pipelines;Machine learning;Generative adversarial networks;Usability;Synthetic data;Testing;Data Masking;Privacy Presentation;GANs;Document Parsing;Machine Learning},
  doi={10.1109/ICAISS61471.2025.11042182}}



@INPROCEEDINGS{10912963,
  author={Cui, Jianhao and Shen, Hua and Cao, Ying},
  booktitle={2024 6th International Conference on Frontier Technologies of Information and Computer (ICFTIC)}, 
  title={Survey on the Applications of Differential Privacy}, 
  year={2024},
  volume={},
  number={},
  pages={43-47},
  keywords={Hands;Surveys;Differential privacy;Privacy;Costs;Noise;Iterative methods;Protection;Usability;Optimization;privacy protection;Differential privacy;Machine learning;data mining},
  doi={10.1109/ICFTIC64248.2024.10912963}}


@INPROCEEDINGS{10446221,
  author={Shahmiri, Ali Moradi and Ling, Chih Wei and Li, Cheuk Ting},
  booktitle={ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, 
  title={Communication-Efficient Laplace Mechanism for Differential Privacy via Random Quantization}, 
  year={2024},
  volume={},
  number={},
  pages={4550-4554},
  keywords={Degradation;Differential privacy;Quantization (signal);Laplace equations;Databases;Servers;Speech processing;Differential privacy;Laplace mechanism;dithered quantization;metric privacy;geo-indistinguishability},
  doi={10.1109/ICASSP48485.2024.10446221}}

@INPROCEEDINGS{10095481,
  author={Hassan, Usman and Chen, Dongjie and Cheung, Sen-Ching S. and Chuah, Chen-Nee},
  booktitle={ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, 
  title={He-Gan: Differentially Private Gan Using Hamiltonian Monte Carlo Based Exponential Mechanism}, 
  year={2023},
  volume={},
  number={},
  pages={1-5},
  keywords={Training;Monte Carlo methods;Laplace equations;Training data;Generative adversarial networks;Task analysis;Speech processing;Generative adversarial networks;differential privacy;exponential mechanism;Hamiltonian Monte Carlo sampling},
  doi={10.1109/ICASSP49357.2023.10095481}}

@INPROCEEDINGS{10035630,
  author={Ryu, Jihyeon and Kim, Keunok and Won, Dongho},
  booktitle={2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)}, 
  title={A Study on Partially Homomorphic Encryption}, 
  year={2023},
  volume={},
  number={},
  pages={1-4},
  keywords={Cloud computing;Information management;Homomorphic encryption;Homomorphic Encryption;Cryptosystem;Security Strength},
  doi={10.1109/IMCOM56909.2023.10035630}}


@INPROCEEDINGS{10467913,
  author={P, Tamilselvi and Lathika, V. and Jayachitra, S. and Arunkumar, S and Balasubramani, M. and Kalaichelvi, V},
  booktitle={2024 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE)}, 
  title={Secure Multi-Party Computation for Collaborative Data Analysis in Network Security}, 
  year={2024},
  volume={},
  number={},
  pages={1-5},
  keywords={Resistance;Privacy;Sensitivity;Data analysis;Scalability;Collaboration;Network security;Secure Multi-Party Computation (SMPC);Collaborative Data Analysis;Network Security;Privacy Preservation;Cryptographic Protocols},
  doi={10.1109/IITCEE59897.2024.10467913}}



@INPROCEEDINGS{10110075,
  author={Tyagi, Sonam and Rajput, Ishwari Singh and Pandey, Richa},
  booktitle={2023 International Conference on Device Intelligence, Computing and Communication Technologies, (DICCT)}, 
  title={Federated learning: Applications, Security hazards and Defense measures}, 
  year={2023},
  volume={},
  number={},
  pages={477-482},
  keywords={Training;Deep learning;Data privacy;Federated learning;Distance learning;Data security;Training data;Federated learning;Horizontal FL;Vertical FL;Federated TL;Poisoning attack},
  doi={10.1109/DICCT56244.2023.10110075}}



  @INBOOK{10520060,
  author={Lütkenhaus, Norbert},
  booktitle={Quantum Information: From Foundations to Quantum Technology Applications}, 
  title={Theory of Quantum Key Distribution (QKD)}, 
  year={2019},
  volume={},
  number={},
  pages={353-367},
  keywords={Protocols;Quantum mechanics;Quantum channels;Phase measurement;Ciphers;Quantum key distribution;Task analysis},
  doi={10.1002/9783527805785.ch16}}




@INPROCEEDINGS{9265904,
  author={Ma, Bin and Ye, Ziying and Zhang, Xufang and Chen, Jiajing and Zhou, Yang and Xia, Qing},
  booktitle={2020 6th International Symposium on System and Software Reliability (ISSSR)}, 
  title={Security of Edge Computing Based on Trusted Computing}, 
  year={2020},
  volume={},
  number={},
  pages={132-137},
  keywords={Security;Edge computing;Cloud computing;Computer architecture;Image edge detection;Software;Computational modeling;Edge computing;safety protection;Trusted Computing;Blockchain},
  doi={10.1109/ISSSR51244.2020.00030}}




%---------------------------------------------------------------------------%
