Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Florentin Rochet"'
Publikováno v:
Ma, X, Rochet, F & Elahi, T 2022, Stopping Silent Sneaks : Defending against Malicious Mixes with Topological Engineering . in Proceedings-38th Annual Computer Security Applications Conference, ACSAC 2022 . ACM International Conference Proceeding Series, ACM Press, New York, pp. 132–145 . https://doi.org/10.1145/3564625.3567996
Mixnets provide strong meta-data privacy and recent academic research and industrial projects have made strides in making them more secure, performant, and scalable. In this paper, we focus our work on stratified Mixnets, a popular design with real-w
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2020, Iss 3, Pp 175-203 (2020)
Dinh, T-N, Rochet, F, Pereira, O & Wallach, D S 2020, ' Scaling Up Anonymous Communication with Efficient Nanopayment Channels ', Proceedings on Privacy Enhancing Technology, vol. 2020, no. 3, pp. 175-203 . https://doi.org/10.2478/popets-2020-0048
Proceedings on Privacy Enhancing Technologies, Vol. 2020, no.3, p. 175-203 (2020)
Dinh, T-N, Rochet, F, Pereira, O & Wallach, D S 2020, ' Scaling Up Anonymous Communication with Efficient Nanopayment Channels ', Proceedings on Privacy Enhancing Technology, vol. 2020, no. 3, pp. 175-203 . https://doi.org/10.2478/popets-2020-0048
Proceedings on Privacy Enhancing Technologies, Vol. 2020, no.3, p. 175-203 (2020)
Tor, the most widely used and well-studied traffic anonymization network in the world, suffers from limitations in its network diversity and performance. We propose to mitigate both problems simultaneously through the introduction of a premium bandwi
Autor:
Emery Assogba, Florentin Rochet, Korian Edeline, Benoit Donnet, Olivier Bonaventure, Maxime Piraux
Publikováno v:
Proceedings of the 17th International Conference on emerging Networking EXperiments and Technologies.
TCP and TLS are among the essential protocols in today's Internet. TCP ensures reliable data delivery while TLS secures the data transfer. Although they are very often used together, they have been designed independently following the Internet layere
Autor:
Olivier Pereira, Florentin Rochet
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2017, Iss 2, Pp 4-22 (2017)
Rochet, F & Pereira, O 2017, ' Waterfilling : Balancing the Tor network with maximum diversity ', Proceedings on Privacy Enhancing Technology, vol. 2017, no. 2, pp. 4-22 . https://doi.org/10.1515/popets-2017-0013
PoPETs, Proceedings on Privacy Enhancing Technologies, Vol. 2, p. 4-22 (2017)
Rochet, F & Pereira, O 2017, ' Waterfilling : Balancing the Tor network with maximum diversity ', Proceedings on Privacy Enhancing Technology, vol. 2017, no. 2, pp. 4-22 . https://doi.org/10.1515/popets-2017-0013
PoPETs, Proceedings on Privacy Enhancing Technologies, Vol. 2, p. 4-22 (2017)
We present the Waterfilling circuit selection method, which we designed in order to mitigate the risks of a successful end-to-end traffic correlation attack. Waterfilling proceeds by balancing the Tor network load as evenly as possible on endpoints o
Autor:
Florentin Rochet, Olivier Pereira
Publikováno v:
Rochet, F & Pereira, O 2018, ' Dropping on the Edge : Flexibility and Traffic Confirmation in Onion Routing Protocols. ', Proceedings on Privacy Enhancing Technology, vol. 2018, no. 2, pp. 27-46 . https://doi.org/10.1515/popets-2018-0011
Proceedings on Privacy Enhancing Technologies, Vol 2018, Iss 2, Pp 27-46 (2018)
Proceedings on Privacy Enhancing Technologies, Vol 2018, Iss 2, Pp 27-46 (2018)
The design of Tor includes a feature that is common to most distributed systems: the protocol is flexible. In particular, the Tor protocol requires nodes to ignore messages that are not understood, in order to guarantee the compatibility with future
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a6b6cc3bb41581362a53f7b45421abea
https://pure.unamur.be/ws/files/71368432/popets_2018_0011.pdf
https://pure.unamur.be/ws/files/71368432/popets_2018_0011.pdf