Sciweavers

PET
2004
Springer
13 years 9 months ago
On Flow Correlation Attacks and Countermeasures in Mix Networks
In this paper, we address issues related to flow correlation attacks and the corresponding countermeasures in mix networks. Mixes have been used in many anonymous communication s...
Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati,...
PET
2004
Springer
13 years 9 months ago
Measuring Anonymity in a Non-adaptive, Real-Time System
Gergely Tóth, Zoltán Hornák
PET
2004
Springer
13 years 9 months ago
Anonymity and Covert Channels in Simple Timed Mix-Firewalls
Traditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either measuring the size of the set of possible senders of a p...
Richard E. Newman, Vipan R. Nalla, Ira S. Moskowit...
PET
2004
Springer
13 years 9 months ago
Electromagnetic Eavesdropping Risks of Flat-Panel Displays
Electromagnetic eavesdropping of computer displays – first demonstrated to the general public by van Eck in 1985 – is not restricted to cathode-ray tubes. Modern flat-panel d...
Markus G. Kuhn
PET
2004
Springer
13 years 9 months ago
On the Anonymity of Banknotes
Dennis Kügler
PET
2004
Springer
13 years 9 months ago
Language-Based Enforcement of Privacy Policies
Abstract. We develop a language-based approach for modeling and verifying aspects of privacy policies. Our approach relies on information-flow control. Concretely, we use the prog...
Katia Hayati, Martín Abadi
PET
2004
Springer
13 years 9 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
PET
2004
Springer
13 years 9 months ago
Reputable Mix Networks
We define a new type of mix network that offers a reduced form of robustness: the mixnet can prove that every message it outputs corresponds to an input submitted by a player wit...
Philippe Golle
PET
2004
Springer
13 years 9 months ago
An Improved Construction for Universal Re-encryption
Abstract. Golle et al recently introduced universal re-encryption, defining it as re-encryption by a player who does not know the key used for the original encryption, but which s...
Peter Fairbrother
PET
2004
Springer
13 years 9 months ago
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
Yitao Duan, John F. Canny