Search Results

101 - 110 of 120 items :

  • Information Technology x
Clear All
Exploiting TLS Client Authentication for Widespread User Tracking

] China Deputizes Smart Phones to Spy on Beijing Residents’ Real-Time Location. , Oct 2011. [12] D. Adrian, K. Bhargavan, Z. Durumeric, P. Gaudry, M. Green, J. A. Halderman, N. Heninger, D. Springall, E. Thomé, L. Valenta, et al. Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security , pages 5–17. ACM, 2015. [13] B. Anderson and D. McGrew. OS Fingerprinting: New

Open access
Recursive Trees for Practical ORAM

References [1] D. Boneh, D. Mazières, and R.A. Popa. Remote oblivious storage: Making oblivious RAM practical, 2011. . [2] K. Brown. Balls in bins with limited capacity, 2014. . [3] G. Casella and R.L. Berger. Statistical inference . Duxbury advanced series in statistics and decision sciences. Thomson Learning, 2002. ISBN 9780534243128. [4] K.-M. Chung and R. Pass. A Simple ORAM. IACR Cryptology ePrint Archive , 2013

Open access
Blogs, Twitter Feeds, and Reddit Comments: Cross-domain Authorship Attribution

. [18] Jing Jiang and ChengXiang Zhai. Instance weighting for domain adaptation in nlp. In Association for Computational Linguistics (ACL), 2007. [19] P. Juola and D. Vescovi. Empirical evaluation of authorship obfuscation using jgaap. In Proceedings of the 3rd ACM workshop on Artificial intelligence and security, pages 14-18. ACM, 2010. [20] Patrick Juola. Authorship attribution. Foundations and Trends in information Retrieval, 1(3):233-334, 2008. [21] G. Kacmarcik and M. Gamon. Obfuscating document stylometry to

Open access
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing

Deserve Our Trust? , Nov. 2014. [5] BlaBlaCar - Trusted carpooling. . [6] R. Chen, B. C. M. Fung, and B. C. Desai. Differentially private trajectory data publication. CoRR , abs/1112.2020, 2011. [7] M. Ciampi and C. Orlandi. Combining private set-intersection with secure two-party computation. In Security and Cryptography for Networks - 11th International Conference, SCN 2018, Amalfi, Italy, September 5-7, 2018, Proceedings , pages

Open access
BrainTool v2.0 for Software Modeling in UML

] P. Rittgen, “Quality and perceived usefulness of process models,” in Proc. of the 2010 ACM Symp. on Appl. Computing, Sierre, Switzerland, 2010, pp. 65-72. [5] O. Nikiforova and M. Kirikova, “Two-hemisphere model driven approach: engineering based software development,” in The 16th Int. Conf. Advanced Information Systems Engineering, CAiSE 2004, vol. 3084, June 7-11, 2004, Riga, Latvia. pp. 219-233. [6] G. Krishnamurthy “CASE Tools,” [Online

Open access
Towards a Model on the Factors Influencing Social App Users’ Valuation of Interdependent Privacy

field experiment. Economics Letters, 117(1):25-27, 2012. [9] A. Besmer and H. Lipford. Users’ (mis)conceptions of social applications. In Proceedings of Graphics Interface (GI), pages 63-70, 2010. [10] G. Biczók and P. Chia. Interdependent privacy: Let me share your data. In A.-R. Sadeghi, editor, Financial Cryptography and Data Security, volume 7859 of Lecture Notes in Computer Science, pages 338-353. Springer, 2013. [11] R. Böhme and J. Grossklags. Vanishing signals: Trading agent kills market information. In

Open access
SoK: Making Sense of Censorship Resistance Systems

. [13] R. Sommer and V. Paxson, “Outside the Closed World: On Using Machine Learning For Network Intrusion Detection,” in In Proceedings of the IEEE Symposium on Security and Privacy, 2010. [14] P. Dorfinger, G. Panholzer, and W. John, “Entropy Estimation for Real-Time Encrypted Traffic Identification,” in Traffic Monitoring and Analysis, vol. 6613 of Lecture Notes in Computer Science, pp. 164-171, Springer Berlin Heidelberg, 2011. [15] L. Bernaille and R. Teixeira, “Early Recognition of Encrypted Applications,” in Proceedings of the 8

Open access
An Efficient Communication System With Strong Anonymity

. [22] H. Corrigan-Gibbs and B. Ford. Dissent: Accountable anonymous group messaging. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS ’10, pages 340-350, New York, NY, USA, 2010. ACM. [23] H. Corrigan-Gibbs, D. I. Wolinsky, and B. Ford. Proactively accountable anonymous messaging in verdict. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13), pages 147-162, Washington, D.C., 2013. USENIX. [24] G. Danezis, R. Dingledine, D. Hopwood, and N. Mathewson. Mixminion: Design of

Open access
Guard Placement Attacks on Path Selection Algorithms for Tor

. [17] David M. Goldschlag, Michael G. Reed, and Paul F. Syverson. Hiding Routing Information. In Proceedings of the First International Workshop on Information Hiding , 1996. [18] Jamie Hayes and George Danezis. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique. In 25th USENIX Security Symposium (USENIX Security 16) , 2016. [19] Andrew Hintz. Fingerprinting Websites Using Traffic Analysis. In Proceedings of the 2nd International Conference on Privacy Enhancing Technologies , 2003. [20] Rob Jansen, Tavish Vaidya, and Micah Sherr

Open access
Towards a Standard-Based Domain-Specific Platform to Describe Points of Interest

Management Group, 2003, [Online]. Available: . [10] Van Deursen, A., Klint, P., Visser, J., “Domain-specific languages: An annotated Bibliography,” ACM Sigplan Notices , vol. 35, issue 6, pp. 26–36, 2000. [11] Asnina, E., Osis, J., „Topological Functioning Model as a CIM-Business Model,” in Model-Driven Domain Analysis and Software Development: Architectures and Functions . IGI Global, Hershey - New York, 2011, pp. 40–64. [12] Osis, J., Asnina, E., „Derivation

Open access