Search Results

1 - 3 of 3 items :

  • Computer Sciences, other x
  • Information Technology x
Clear All
An Empirical Analysis of Traceability in the Monero Blockchain

, Clément Fischer, Shruti Tople, and Prateek Saxena. A traceability analysis of Monero’s blockchain. In Simon N. Foley, Dieter Gollmann, and Einar Snekkenes, editors, Computer Security - ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 1-15, 2017, Proceedings, Part II, pages 153-173. Springer International Publishing, 2017. [16] Adam Mackenzie, Surae Noether, and Monero Core Team. MRL-0004: Improving obfuscation in the CryptoNote protocol. https://lab.getmonero.org/pubs/MRL-0004.pdf, January 2015

Open access
Privacy Attitudes of Smart Speaker Users

Danielle Lottridge. Understanding the Long-Term Use of Smart Speaker Assistants. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. , 2(3):91:1–91:24, September 2018. [7] Dieter Bohn. Amazon says 100 million Alexa devices have been sold. The Verge , January 2019. [8] Phoebe Braithwaite. Smart home tech is being turned into a tool for domestic abuse. Wired , July 2018. [9] Joseph Bugeja, Andreas Jacobsson, and Paul Davidsson. On privacy and security challenges in smart connected homes. In 2016 European Intelligence and Security Informatics

Open access
Blocking-resistant communication through domain fronting

://kscope.news.cs.nyu.edu/pub/TR-2008-918.pdf . [57] Tor Project. #4744: GFW probes based on Tor’s SSL cipher list, Dec. 2011. https://bugs.torproject.org/4744 . [58] Tor Project. #8860: Registration over App Engine, May 2013. https://bugs.torproject.org/8860 . [59] Tor Project. #12778: Put meek HTTP headers on a diet, Aug. 2014. https://bugs.torproject.org/12778 . [60] Tor Project. Bridge users using transport meek, May 2015. https://metrics.torproject.org/userstats-bridge-transport.html?graph=userstats-bridge-transport&end=2015-05-15&transport=meek . [61] Tor

Open access