Search Results

1 - 10 of 49 items :

  • Information Technology x
  • IT-Security and Cryptology x
Clear All
Dropping on the Edge: Flexibility and Traffic Confirmation in Onion Routing Protocols

-guard-discovery.txt , 2017. Accessed: 2017-05-20. [9] Github repository regarding data and code of this paper. https://github.com/frochet/dropping_on_the_edge , 2017. [10] Ricochet: Anonymous instant messaging for real privacy. https://ricochet.im/ , 2017. Accessed: 2017-05-20. [11] Securly and anonymously sharing files with onionshare. https://github.com/micahflee/onionshare , 2017. Accessed: 2017-05-20. [12] Ticket 21155: Client’s choice of rend point can leak info about guard(s) of misconfigured hidden services with entrynodes option. https

Open access
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction

. Augustin, B. Krishnamurthy, and W. Willinger. IXPs: mapped? In Proceedings of the 9th ACM SIGCOMM conference on Internet Measurement Conference (IMC) , pages 336–349, 2009. [8] K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker. Low-Resource Routing Attacks Against Tor. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES) , 2007. [9] R. Collon. Use of OSI IS-IS for Routing in TCP/IP and Dual Environments accessed 05/14/2015., December 1990. https://www.ietf.org/rfc/rfc1195.txt Accessed 05/14/2015. [10] Í. Cunha, R

Open access
Circumventing Cryptographic Deniability with Remote Attestation

,” Tech. Rep., 2016. [5] (2018) Briar: Secure messaging, anywhere. Accessed 2018-04-29. [Online]. Available: https://briarproject.org/ [6] (2018) Messenger. Accessed 2018-05-03. [Online]. Available: https://www.messenger.com/ [7] (2018) OTR version 4. Draft, accessed 2018-05-03. [Online]. Available: https://github.com/otrv4/otrv4/blob/master/otrv4.md [8] “Signal Protocol C library,” Code, 2018, commit 9e10362fce9072b104e6d5a51d6f56d939d1f36e. [Online]. Available: https://github.com/signalapp/libsignal-protocol-c [9] N. Asokan, G. Tsudik

Open access
Cardinality Estimators do not Preserve Privacy

References [1] [n. d.]. Approximate algorithms in Apache Spark: HyperLogLog and Quantiles. https://databricks.com/blog/2016/05/19/approximate-algorithms-in-apache-spark-hyperloglog-and-quantiles.html . Accessed: 2018-05-03. [2] [n. d.]. BigQuery Technical Documentation on Functions & Operators. https://cloud.google.com/bigquery/docs/reference/standardsql/functions-and-operators . Accessed: 2017-10-24. [3] [n. d.]. HyperLogLog implementation for mssql. https://github.com/shuvava/mssql-hll . Accessed: 2018-05-03. [4] [n. d.]. PostgreSQL

Open access
I never signed up for this! Privacy implications of email tracking

Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security , pages 1129–1140. ACM, 2013. [9] Julia Angwin. Why online tracking is getting creepier. ProPublica , Jun 2014. [10] Mika D Ayenson, Dietrich James Wambach, Ashkan Soltani, Nathan Good, and Chris Jay Hoofnagle. Flash cookies and privacy II: Now with html5 and etag respawning. 2011. [11] Bananatag. Email Tracking for Gmail, Outlook and other clients. https://bananatag.com/email-tracking/ . Online; accessed 2017-09-04. [12] Justin Brookman, Phoebe Rouge, Aaron Alva

Open access
Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol

Timestamps. In International Conference on Passive and Active Network Measurement , pages 82–98. Springer, 2019. [58] P. Sapiezynski, A. Stopczynski, R. Gatej, and S. Lehmann. Tracking Human Mobility using wifi Signals. PloS one , 10(7):e0130824, 2015. [59] Z. Shamsi, A. Nandwani, D. Leonard, and D. Loguinov. Hershel: Single-packet OS Fingerprinting. In ACM SIGMETRICS Performance Evaluation Review , volume 42, pages 195–206. ACM, 2014. [60] A. Soltani. Privacy Trade-Offs in Retail Tracking. Tech@ FTC. URL https

Open access
Riffle
An Efficient Communication System With Strong Anonymity

. [10] D. Bernstein. The poly1305-aes message-authentication code. In H. Gilbert and H. Handschuh, editors, Fast Software Encryption, volume 3557 of Lecture Notes in Computer Science, pages 32-49. Springer Berlin Heidelberg, 2005. [11] D. J. Bernstein. Curve25519: new diffie-hellman speed records. In In Public Key Cryptography (PKC), Springer- Verlag LNCS 3958, page 2006, 2006. [12] D. J. Bernstein. New stream cipher designs. chapter The Salsa20 Family of Stream Ciphers, pages 84-97. Springer- Verlag, Berlin, Heidelberg, 2008

Open access
Privacy-Preserving Interdomain Routing at Internet Scale

://github.com/encryptogroup/ABY . [7] C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian. Delayed internet routing convergence. SIGCOMM’00 , 30(4):175–187, 2000. [8] B. Zhang, D. Massey, and L. Zhang. Destination reachability and BGP convergence time [border gateway routing protocol]. In GLOBECOM’04 , volume 3, pages 1383–1389. IEEE, 2004. [9] R. Oliveira, B. Zhang, D. Pei, and L. Zhang. Quantifying path exploration in the internet. IEEE/ACM Transactions on Networking , 17(2):445–458, 2009. [10] N. Kushman, S. Kandula, and D. Katabi. Can you hear me now?!: It must be BGP. SIGCOMM

Open access
Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS)

. [50] M. Strohmeier, M. Schäfer, R. Pinheiro, V. Lenders, and I. Martinovic. On Perception and Reality in Wireless Air Traffic Communications Security. 2016. URL http://arxiv.org/abs/1602.08777. Retrieved on 2016-10-05. [51] M. Strohmeier, M. Smith, M. Schäfer, V. Lenders, and I. Martinovic. Assessing the Impact of Aviation Security on Cyber Power. In Cyber Conflict (CYCON), 8th International Conference on. IEEE, 2016. [52] M. Strohmeier, M. Smith, V. Lenders, and I. Martinovic. The Real First Class? Inferring Confidential Corporate

Open access
PD-DM: An efficient locality-preserving block device mapper with plausible deniability

– CRYPTO’97 , pages 90–104. Springer, 1997. [10] R. M. Corless, G. H. Gonnet, D. E. Hare, D. J. Jeffrey, and D. E. Knuth. On the lambertw function. Advances in Computational mathematics , 5(1):329–359, 1996. [11] P. Desnoyers. Analytic models of ssd write performance. Trans. Storage , 10(2):8:1–8:25, Mar. 2014. [12] P. Desnoyers. Analytic models of SSD write performance. ACM Transactions on Storage (TOS) , 10(2):8, 2014. [13] F. Douglis and J. Ousterhout. Log-structured file systems. In COMPCON Spring’89. Thirty-Fourth IEEE Computer Society

Open access