44 research outputs found

    Synthetic Generation of Social Network Data With Endorsements

    Get PDF
    In many simulation studies involving networks there is the need to rely on a sample network to perform the simulation experiments. In many cases, real network data is not available due to privacy concerns. In that case we can recourse to synthetic data sets with similar properties to the real data. In this paper we discuss the problem of generating synthetic data sets for a certain kind of online social network, for simulation purposes. Some popular online social networks, such as LinkedIn and ResearchGate, allow user endorsements for specific skills. For each particular skill, the endorsements give rise to a directed subgraph of the corresponding network, where the nodes correspond to network members or users, and the arcs represent endorsement relations. Modelling these endorsement digraphs can be done by formulating an optimization problem, which is amenable to different heuristics. Our construction method consists of two stages: The first one simulates the growth of the network, and the second one solves the aforementioned optimization problem to construct the endorsements.Comment: 5 figures, 2 algorithms, Journal of Simulation 201

    Parking Tickets for Privacy-Preserving Pay-by-Phone Parking

    Get PDF
    This document is a postprint version of the paper presented at the 18th Workshop on Privacy in the Electronic Society (WPES’19), November 11, 2019, London (United Kingdom).Traditionally, the payment required for parking in regulated areas has been made through parking meters. In the last years, several applications which allow to perform these payments using a mobile device have appeared. In this paper we propose a privacy-preserving pay-by-phone parking system o ering the same privacy as the traditional paper- based method even assuming an internal attacker with full access to all the information managed by the system servers. Drivers'privacy is preserved without requiring them to trust any party. Furthermore, the system can tolerate that the mobile devices of drivers fall out of coverage while their cars are parked

    A Digital Cash Paradigm with Valued and No-Valued e-Coins

    Get PDF
    Digital cash is a form of money that is stored digitally. Its main advantage when compared to traditional credit or debit cards is the possibility of carrying out anonymous transactions. Diverse digital cash paradigms have been proposed during the last decades, providing different approaches to avoid the double-spending fraud, or features like divisibility or transferability. This paper presents a new digital cash paradigm that includes the so-called no-valued e-coins, which are e-coins that can be generated free of charge by customers. A vendor receiving a payment cannot distinguish whether the received e-coin is valued or not, but the customer will receive the requested digital item only in the former case. A straightforward application of bogus transactions involving no-valued e-coins is the masking of consumption patterns. This new paradigm has also proven its validity in the scope of privacy-preserving pay-by-phone parking systems, and we believe it can become a very versatile building block in the design of privacy-preserving protocols in other areas of research. This paper provides a formal description of the new paradigm, including the features required for each of its components together with a formal analysis of its security.This research was funded by the Spanish Ministry of Science, Innovation and Universities grant number MTM2017-83271-R

    A Genomic Survey of HECT Ubiquitin Ligases in Eukaryotes Reveals Independent Expansions of the HECT System in Several Lineages

    Get PDF
    The posttranslational modification of proteins by the ubiquitination pathway is an important regulatory mechanism in eukaryotes. To date, however, studies on the evolutionary history of the proteins involved in this pathway have been restricted to E1 and E2 enzymes, whereas E3 studies have been focused mainly in metazoans and plants. To have a wider perspective, here we perform a genomic survey of the HECT family of E3 ubiquitin-protein ligases, an important part of this posttranslational pathway, in genomes from representatives of all major eukaryotic lineages. We classify eukaryotic HECTs and reconstruct, by phylogenetic analysis, the putative repertoire of these proteins in the last eukaryotic common ancestor (LECA). Furthermore, we analyze the diversity and complexity of protein domain architectures of HECTs along the different extant eukaryotic lineages. Our data show that LECA had six different HECTs and that protein expansion and N-terminal domain diversification shaped HECT evolution. Our data reveal that the genomes of animals and unicellular holozoans considerably increased the molecular and functional diversity of their HECT system compared with other eukaryotes. Other eukaryotes, such as the Apusozoa Thecanomas trahens or the Heterokonta Phytophthora infestans, independently expanded their HECT repertoire. In contrast, plant, excavate, rhodophyte, chlorophyte, and fungal genomes have a more limited enzymatic repertoire. Our genomic survey and phylogenetic analysis clarifies the origin and evolution of different HECT families among eukaryotes and provides a useful phylogenetic framework for future evolutionary studies of this regulatory pathway
    corecore