Search Results

1 - 3 of 3 items :

  • Computer Sciences, other x
  • Information Technology x
Clear All
An Empirical Analysis of Traceability in the Monero Blockchain

, Clément Fischer, Shruti Tople, and Prateek Saxena. A traceability analysis of Monero’s blockchain. In Simon N. Foley, Dieter Gollmann, and Einar Snekkenes, editors, Computer Security - ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 1-15, 2017, Proceedings, Part II, pages 153-173. Springer International Publishing, 2017. [16] Adam Mackenzie, Surae Noether, and Monero Core Team. MRL-0004: Improving obfuscation in the CryptoNote protocol., January 2015

Open access
Privacy Attitudes of Smart Speaker Users

Danielle Lottridge. Understanding the Long-Term Use of Smart Speaker Assistants. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. , 2(3):91:1–91:24, September 2018. [7] Dieter Bohn. Amazon says 100 million Alexa devices have been sold. The Verge , January 2019. [8] Phoebe Braithwaite. Smart home tech is being turned into a tool for domestic abuse. Wired , July 2018. [9] Joseph Bugeja, Andreas Jacobsson, and Paul Davidsson. On privacy and security challenges in smart connected homes. In 2016 European Intelligence and Security Informatics

Open access
Blocking-resistant communication through domain fronting

:// . [57] Tor Project. #4744: GFW probes based on Tor’s SSL cipher list, Dec. 2011. . [58] Tor Project. #8860: Registration over App Engine, May 2013. . [59] Tor Project. #12778: Put meek HTTP headers on a diet, Aug. 2014. . [60] Tor Project. Bridge users using transport meek, May 2015. . [61] Tor

Open access