206
click to vote
CCS
9 years 10 months ago
2015 ACM
A privacy policy is a statement informing users how their information will be collected, used, and disclosed. Failing to provide a correct privacy policy may result in a fine. Ho...
195
click to vote
CCS
9 years 10 months ago
2015 ACM
There have been several attempts recently at using homomorphic encryption to increase the efficiency of Oblivious RAM protocols. One of the most successful has been Onion ORAM, w...
180
click to vote
CCS
9 years 10 months ago
2015 ACM
In this paper, we study Password Authenticated Key Exchange (PAKE) in a group. First, we present a generic “fairy-ring dance” construction that transforms any secure two-party...
178
click to vote
CCS
9 years 10 months ago
2015 ACM
We present a method to regenerate diversified code dynamically in a Java bytecode JIT compiler, and to update the diversification frequently during the execution of the program. T...
176
click to vote
CCS
9 years 10 months ago
2015 ACM
Anonymity networks such as Tor are a critical privacy-enabling technology. Tor’s hidden services provide both client and server anonymity. They protect the location of the serve...
|