WebMy research interests are in the areas of cryptography and security, with a specific focus on secure computation and its applications such as contact tracing, online advertising, secure machine learning, and privacy-preserving bio-computing. Education Oregon State University, United States Ph.D. in Computer Science Mar 2024 WebOct 3, 2024 · To fight against infectious diseases (e.g., SARS, COVID-19, Ebola, etc.), government agencies, technology companies and health institutes have launched various contact tracing approaches to identify and notify the people exposed to infection sources. However, existing tracing approaches can lead to severe privacy and security concerns, …
Location Data and COVID-19 Contact Tracing: How Data Privacy ...
WebFeb 16, 2024 · However, no one application is the same. Below is a list of several ways digital contact tracing applications can differ that affect their respective ethical and legal postures: Voluntariness and Disclosure. First, digital contact tracing applications differ in voluntariness and disclosure. There are several features that can affect this: WebDec 24, 2024 · In this work we describe a token-based solution to Contact Tracing via Distributed Point Functions (DPF) and, more generally, Function Secret Sharing (FSS). The … sierra jewelry and loan
Demonstrating 15 contact tracing and other tools built to mitigate …
WebMay 19, 2024 · We analyze the computation and communication complexities of these techniques under the typical client-server architecture utilized by contact tracing … WebThis called for technological tools such as Mobile Contact Tracing Applications (MCTA), which are used to digitally trace contacts among people, and in case a positive case is found, people with the application installed which had been in contact will be notified. ... Naaz. 2024. Applicability of Mobile Contact Tracing in Fighting Pandemic ... WebFocuses on the design and analysis of contact tracing applications from cryptologic viewpoint Points out the possible research directions toward the security evaluation of existing contact tracing applications Analyzes the design of contact tracing applications developed in different countries the power of a prayerful woman