Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Mayberry, Travis"'
Autor:
Martin, Jeremy, Alpuche, Douglas, Bodeman, Kristina, Brown, Lamont, Fenske, Ellis, Foppe, Lucas, Mayberry, Travis, Rye, Erik C., Sipes, Brandon, Teplov, Sam
We investigate Apple's Bluetooth Low Energy (BLE) Continuity protocol, designed to support interoperability and communication between iOS and macOS devices, and show that the price for this seamless experience is leakage of identifying information an
Externí odkaz:
http://arxiv.org/abs/1904.10600
Publikováno v:
Proc. ACM Conf. on Computer and Communications Security (CCS) 2017
Write-Only Oblivious RAM (WoORAM) protocols provide privacy by encrypting the contents of data and also hiding the pattern of write operations over that data. WoORAMs provide better privacy than plain encryption and better performance than more gener
Externí odkaz:
http://arxiv.org/abs/1706.03827
Autor:
Martin, Jeremy, Mayberry, Travis, Donahue, Collin, Foppe, Lucas, Brown, Lamont, Riggins, Chadwick, Rye, Erik C., Brown, Dane
MAC address randomization is a privacy technique whereby mobile devices rotate through random hardware addresses in order to prevent observers from singling out their traffic or physical location from other nearby devices. Adoption of this technology
Externí odkaz:
http://arxiv.org/abs/1703.02874
Oblivious RAM (ORAM) protocols are powerful techniques that hide a client's data as well as access patterns from untrusted service providers. We present an oblivious cloud storage system, ObliviSync, that specifically targets one of the most widely-u
Externí odkaz:
http://arxiv.org/abs/1605.09779
Autor:
Carback, Richard T., Chaum, David, Clark, Jeremy, Essex, Aleksander, Mayberry, Travis, Popoveniuc, Stefan, Rivest, Ronald L, Shen, Emily H., Sherman, Alan T., Vora, Poorvi L., Wittrock, John, Zagórski, Filip
Publikováno v:
Other repository
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od________88::84f2e98c1aae18ff53ca613806ccff0c
https://hdl.handle.net/1721.1/128360
https://hdl.handle.net/1721.1/128360
Autor:
Carback, Richard T., Chaum, David, Clark, Jeremy, Conway, John, Essex, Aleksander, Herrnson, Paul S., Mayberry, Travis, Popoveniuc, Stefan, Rivest, Ronald L., Shen, Emily (Emily Huei-Yi), Sherman, Alan T., Vora, Poorvi L.
Publikováno v:
MIT web domain
On November 3, 2009, voters in Takoma Park, Maryland, cast ballots for the mayor and city council members using the Scantegrity II voting system—the first time any end-to-end (E2E) voting system with ballot privacy has been used in a binding govern
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od________88::16db64ef525a318310f91b8ccefac936
http://hdl.handle.net/1721.1/63143
http://hdl.handle.net/1721.1/63143
Publikováno v:
Financial Cryptography & Data Security (9783662478530); 2015, p147-167, 21p
Publikováno v:
Financial Cryptography & Data Security (9783642398834); 2013, p371-385, 15p
Publikováno v:
MILITARY COMMUNICATIONS CONFERENCE, 2011 - MILCOM 2011; 2011, p1345-1350, 6p