deniability against multi-snapshot adversaries. Proceedings on Privacy Enhancing Technologies , 2017(3), 2017.
 D. Beaver. Plug and play encryption. In Advances in Cryptology – CRYPTO’97 , pages 75–89. springer.
 E.-O. Blass, T. Mayberry, G. Noubir, and K. Onarlioglu. Toward robust hidden volumes using write-only oblivious ram. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security , pages 203–214. ACM, 2014.
 R. Canetti, C. Dwork, M. Naor, and R. Ostrovsky. Deniable encryption. In Advances in Cryptology
of Witness Hiding Protocols. In Annual International Cryptology Conference , pages 174–187. Springer, 1994.
 Mario Di Raimondo, Rosario Gennaro, and Hugo Krawczyk. Secure Off-the-Record Messaging. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society , pages 81–89. ACM, 2005.
 Mario Di Raimondo, Rosario Gennaro, and Hugo Krawczyk. Deniable Authentication and Key Exchange. In Conference on Computer and Communications Security , pages 400–409. ACM, 2006.
 Theodore Diament, Homin K Lee, Angelos D Keromytis, and
Lachlan J. Gunn, Ricardo Vieitez Parra and N. Asokan
Activities Board, Jan. 1999.
 Y. Dodis, J. Katz, A. Smith, and S. Walfish, “Composability and on-line deniability of authentication,” in TCC 2009: 6th Theory of Cryptography Conference , ser. Lecture Notes in Computer Science, O. Reingold, Ed., vol. 5444. Springer, Heidelberg, Mar. 2009, pp. 146–162.
 M. Gay, “Political world embraces encrypted-messaging app Signal amid fears of hacking,” The Wall Street Journal , 2017, 2017-01-27. [Online]. Available: https
1 A preliminary version of this paper was present as a poster  with an overview of the technical solution described here.
 Bonnie++ . “ http://www.coker.com.au/bonnie++ ”.
 Hive . “ http://www.onarlioglu.com/hive ”.
 Plausible Deniability . “ http://en.wikipedia.org/wiki/Plausible_deniability ”.
 Rubberhose . “ http://en.wikipedia.org/wiki/Rubberhose_(filesystem) ”.
 TrueCrypt . “ http://truecrypt.sourceforge.net/ ”.
 Ross Anderson, Roger Needham, and Adi Shamir. The steganographic
, G. Noubir, and K. Onarlioglu, “Toward robust hidden volumes using write-only oblivious RAM,” in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014 , 2014, pp. 203–214.
 A. Chakraborti, C. Chen, and R. Sion, “Datalair: Efficient block storage with plausible deniability against multi-snapshot adversaries,” PoPETs , vol. 2017, no. 3, p. 179, 2017. [Online]. Available: https://doi.org/10.1515/popets-2017-0035
 A. Chakraborti, A. J. Aviv, S. G. Choi, T. Mayberry, D. S
With the takeover of Crimea by masked Russian soldiers/fighters without national insignia in February/March 2014, with the Kremlin at first denying its involvement, war became ‘hybrid’ in our minds. The follow-on conflict in Eastern Ukraine, with separatism supported by neighbouring countries and the armed establishment and military securing of pseudo-state people’s republics, including recourse to pro-Russian fighters ‘on holiday’, has reinforced the impression of a hybrid form of warfare, raising the question: what is hybrid warfare? This article argues that the specific nature of hybrid warfare is essentially a strategic matter characterised by three key tendencies and their orchestration within a hybrid ‘grand strategy’: 1. Focusing the decision of the war/conflict, as such, primarily on a broad spectrum of non-military centres of gravity in a flexible and dynamic manner. 2. Operating in the shadow of various interfaces against specific vulnerabilities of the opponent, thus challenging traditional lines of order and responsibilities, creating ambiguity and paralysing the decision-making process of the opponent. 3. Creative combination and parallel use of different civilian and military means and methods, categories and forms of warfare and fighting, thus creating ‘new’ mixed, hybrid forms.1 At the same time, there is a growing sense that hybrid forms of warfare will shape the face of war in the 21st century.2 They seem to offer unpretentious political success by smart recourse to limited, deniable and supposedly manageable use of force. The assumption that the risk of military escalation and political damage could be kept within limits may at the same time increase the likelihood of the offensive use of hybrid forms of warfare. For this reason, it is high time to improve our common and comprehensive understanding of hybrid forms of warfare as a precondition for common and comprehensive action in defence and response.
Zhengan Huang, Shengli Liu, Baodong Qin and Kefei Chen
. and Wei, B. (2012). Deniable encryptions secure against adaptive chosen ciphertext attack, in M.D. Ryan, B. Smyth and G. Wang (Eds.), Information Security Practice and Experience, Springer, Berlin/Heidelberg, pp. 46-62.
Hemenway, B., Libert, B., Ostrovsky, R. and Vergnaud, D. (2011). Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security, in D.H. Lee and X. Wang (Eds.), Advances in Cryptology-ASIACRYPT 2011, Springer, Berlin/Heidelberg, pp. 70-88.
Hofheinz, D. (2012). All
Allain, J. (2004). The True Challenge to the United Nations System of the Use of Force: The Failures of Kosovo and Iraq and the Emergence of the African Union. 8 Max Planck Yearbook of United Nations Law , pp. 237-242.
Allison, R. (2014). Russian “deniable” intervention in Ukraine: how and why Russia broke the rules, International Affairs, The Royal Institute of International Affairs , available at: http://commonweb.unifr.ch/artsdean/pub/gestens/f/as/files/4760/39349_202339.pdf (accessed January 22nd, 2017).
Blank, S. (2011
Michael Schliep, Eugene Vasserman and Nicholas Hopper
 M. Di Raimondo, R. Gennaro, and H. Krawczyk, “Deniable authentication and key exchange,” in Proceedings of the 13th ACM conference on Computer and communications security, pp. 400-409, ACM, 2006.
 linode, linode. https://linode.com/.
 J. Ugander, B. Karrer, L. Backstrom, and C. Marlow, “The anatomy of the facebook social graph,” arXiv preprint arXiv:1111.4503, 2011.
 OpenStack IRC meetings. http://eavesdrop.openstack.org/.
 twitter, twitter. https://twitter.com/.
Anna Kobusińska, Jerzy Brzeziński, Michał Boroń, Łukasz Inatlewski, Michał Jabczyński and Mateusz Maciejewski
Berthold, O., Federrath, H. and Kpsell, S. (2001). Web mixes: A system for anonymous and unobservable internet access, International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, pp. 115-129.
Boyd, C., Mao, W. and Paterson, K.G. (2005). Deniable authenticated key establishment for internet protocols, in B. Christianson et al. (Eds.), Security Protocols, Springer, Berlin/Heidelberg, pp. 255-271.
Dabek, F., Li, J., Sit, E., Robertson, J., Kaashoek, M. and Morris, R