Search Results

1 - 10 of 43 items :

  • Information Technology x
  • IT-Security and Cryptology x
Clear All
SeaGlass: Enabling City-Wide IMSI-Catcher Detection

:// . Accessed: 2017-03-14. [25] Qrc surveyor 500. . Accessed: 2017-03-14. [26] T. Rappaport. Wireless Communications: Principles and Practice . Prentice Hall PTR, Upper Saddle River, NJ, USA, 2nd edition, 2001. [27] J. Scahill and M. Williams. Stingrays a secret catalogue of government gear for spying on your cellphone. , December 2015. Accessed: 2017-03-14. [28] Skyhook wireless. http

Open access
Location Privacy with Randomness Consistency

, all anonymous. http://, 2014. [13] G. Ananthanarayanan, V. N. Padmanabhan, L. Ravindranath, and C. A. Thekkath. Combine: leveraging the power of wireless peers through collaborative downloading. In Proceedings of the 5th international conference on Mobile systems, applications and services, pages 286-298. ACM, 2007. [14] M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Geo-indistinguishability: Differential privacy for

Open access
Portrait of a Privacy Invasion
Detecting Relationships Through Large-scale Photo Analysis

:// 851590_229753833859617_1129962605_n.pdf. [11] GigaOM. Instagram reports 200M users. [12] P. Gundecha, G. Barbier, and H. Liu. Exploiting vulnerability to secure user privacy on a social networking site. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 511-519. ACM, 2011. [13] T. Independent. How average Briton is caught on camera 300 times a day. http

Open access
PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer

. Laurie. Drac: An architecture for anonymous low-volume communications. In PETS, 2010. [24] G. Danezis, R. Dingledine, and N. Mathewson. Mixminion: Design of a type III anonymous remailer protocol. In IEEE S&P, 2003. [25] G. Danezis and I. Goldberg. Sphinx: A compact and provably secure mix format. In IEEE S&P, 2009. [26] S. DiBenedetto, P. Gasti, G. Tsudik, and E. Uzun. ANDaNA: Anonymous named data networking application. arXiv preprint arXiv:1112.2205, 2011. [27] R. Dingledine, N. Mathewson, and P

Open access
Circumventing Cryptographic Deniability with Remote Attestation

,” Tech. Rep., 2016. [5] (2018) Briar: Secure messaging, anywhere. Accessed 2018-04-29. [Online]. Available: [6] (2018) Messenger. Accessed 2018-05-03. [Online]. Available: [7] (2018) OTR version 4. Draft, accessed 2018-05-03. [Online]. Available: [8] “Signal Protocol C library,” Code, 2018, commit 9e10362fce9072b104e6d5a51d6f56d939d1f36e. [Online]. Available: [9] N. Asokan, G. Tsudik

Open access
On the Privacy and Security of the Ultrasound Ecosystem

:// , 2016. [10] Signal360’s Use Cases. , 2016. [11] 3GPP. 3rd generation partnership project, technical specification of international mobile station equipment identities (imei). [12] A. Andreadis and G. Giambene. The global system for mobile communications. Protocols for High-Efficiency Wireless Networks , pages 17–44, 2002. [13] anfractuosity. Ultrasound Networking. 00003. [14] Audible magic. , 2016. [15] C. Calabrese. Comments for November 2015 Workshop on

Open access
Privacy Challenges in the Quantified Self Movement – An EU Perspective

on purchasing behavior: An experimental study. Info. Sys. Research, 22(2):254-268, June 2011. [37] G. Wolf. What is The Quantified Self., Mar. 2011. [38] C. K. Wong, M. Gouda, and S. S. Lam. Secure group communications using key graphs. In Proceedings of the ACM SIGCOMM ’98 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, SIGCOMM ’98, pages 68-79, New York, NY, USA, 1998. ACM. [39] A. C. Yao. Protocols for

Open access
Towards Mining Latent Client Identifiers from Network Traffic

:// Online. Sep, 2015. [7] Safe Browsing API. [8] Xprobe. Online. Sep, 2015. [9] G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan, and C. Diaz. The web never forgets: Persistent tracking mechanisms in the wild. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2014. [10] G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. Gürses, F. Piessens, and B

Open access
Fingerprinting Mobile Devices Using Personalized Configurations

References [1] Apple, “Worldwide Developer’s Conference (WWDC) Keynote 2014.” [2] AppBrain Stats, “Distribution of free vs. paid Android apps.” [3] M. Egele, C. Kruegel, E. Kirda, and G. Vigna, “Pios: Detecting privacy leaks in ios applications.,” in NDSS, 2011. [4] A. Kurtz, A. Weinlein, C. Settgast, and F. Freiling, “DiOS: Dynamic Privacy Analysis of

Open access
Investigating sources of PII used in Facebook’s targeted advertising

email without consent. . [23] Facebook: About the delivery system: Ad auctions. . [24] How Facebook Figures Out Everyone You’ve Ever Met. . [25] How Trump Conquered Facebookâ•flWithout Russian Ads. . [26] Improving Enforcement and Promoting Diversity: Updates to Ads

Open access