Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Tariq Elahi"'
Publikováno v:
Ma, X, Rochet, F & Elahi, T 2022, Stopping Silent Sneaks : Defending against Malicious Mixes with Topological Engineering . in Proceedings-38th Annual Computer Security Applications Conference, ACSAC 2022 . ACM International Conference Proceeding Series, ACM Press, New York, pp. 132–145 . https://doi.org/10.1145/3564625.3567996
Mixnets provide strong meta-data privacy and recent academic research and industrial projects have made strides in making them more secure, performant, and scalable. In this paper, we focus our work on stratified Mixnets, a popular design with real-w
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2020, Iss 4, Pp 111-130 (2020)
Watson, L, Mediratta, A, Elahi, M T & Sarkar, R 2020, ' Privacy Preserving Detection of Path Bias Attacks in Tor ', Water Treatment Technology, vol. 2020, no. 4, pp. 111-130 . https://doi.org/10.2478/popets-2020-0065
Watson, L, Mediratta, A, Elahi, M T & Sarkar, R 2020, ' Privacy Preserving Detection of Path Bias Attacks in Tor ', Water Treatment Technology, vol. 2020, no. 4, pp. 111-130 . https://doi.org/10.2478/popets-2020-0065
Anonymous communication networks like Tor are vulnerable to attackers that control entry and exit nodes. Such attackers can compromise the essential anonymity and privacy properties of the network. In this paper, we consider the path bias attack– w
Autor:
Joseph Gardiner, Partha Das Chowdhury, Jacob Halsey, Mohammad Tahaei, Tariq Elahi, Awais Rashid
Publikováno v:
Computer Security. ESORICS 2021 International Workshops ISBN: 9783030954833
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::280ab723a17b4d30f33438d9f1d21bfd
https://doi.org/10.1007/978-3-030-95484-0_12
https://doi.org/10.1007/978-3-030-95484-0_12
Autor:
Colleen M. Swanson, Laurent Simon, Steven J. Murdoch, Ian Goldberg, Tariq Elahi, Sheharbano Khattak
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2016, Iss 4, Pp 37-61 (2016)
Khattak, S, Elahi, M T, Simon, L, Swanson, C M, Murdoch, S J & Goldberg, I 2016, ' SoK: Making Sense of Censorship Resistance Systems ', Water Treatment Technology, vol. 2016, no. 4, pp. 37-61 . https://doi.org/10.1515/popets-2016-0028
Khattak, S, Elahi, M T, Simon, L, Swanson, C M, Murdoch, S J & Goldberg, I 2016, ' SoK: Making Sense of Censorship Resistance Systems ', Water Treatment Technology, vol. 2016, no. 4, pp. 37-61 . https://doi.org/10.1515/popets-2016-0028
An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. Several censorship resistance systems (CRSs) have emerged to help bypass such blocks. The diversity of the censor’s attack landscape h
Publikováno v:
Elahi, M T, Doucette, J A, Hosseini, H, Murdoch, S J & Goldberg, I 2016, ' A Framework for the Game-theoretic Analysis of Censorship Resistance ', Water Treatment Technology, vol. 2016, no. 4, pp. 83-101 . https://doi.org/10.1515/popets-2016-0030
Proceedings on Privacy Enhancing Technologies, Vol 2016, Iss 4, Pp 83-101 (2016)
Proceedings on Privacy Enhancing Technologies, Vol 2016, Iss 4, Pp 83-101 (2016)
We present a game-theoretic analysis of optimal solutions for interactions between censors and censorship resistance systems (CRSs) by focusing on the data channel used by the CRS to smuggle clients’ data past the censors. This analysis leverages t
Publikováno v:
NDSS
Publikováno v:
ACM Conference on Computer and Communications Security
In addition to their common use for private online communication, anonymous communication networks can also be used to circumvent censorship. However, it is difficult to determine the extent to which they are actually used for this purpose without vi
Publikováno v:
Privacy Enhancing Technologies ISBN: 9783642390760
Privacy Enhancing Technologies
Privacy Enhancing Technologies
Tor is the most popular low-latency anonymity network for enhancing ordinary users’ online privacy and resisting censorship. While it has grown in popularity, Tor has a variety of performance problems that result in poor quality of service, a stron
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a6f11f94a0719a4fa6f51df00192f552
https://doi.org/10.1007/978-3-642-39077-7_8
https://doi.org/10.1007/978-3-642-39077-7_8
Autor:
Tariq Elahi, Siani Pearson
Publikováno v:
Digital Privacy ISBN: 9783642190490
Digital Privacy-PRIME
Digital Privacy-PRIME
This chapter relates to the mechanisms developed within PRIME for privacy assurance checking: that is, for providing a greater degree of assurance to the user about the treatment of their personal data. This process involves checking that the service
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::235ce7056b0b3554f9d2bcfeecb46ded
https://doi.org/10.1007/978-3-642-19050-6_16
https://doi.org/10.1007/978-3-642-19050-6_16
Autor:
Tariq Elahi, Siani Pearson
Publikováno v:
Trust, Privacy and Security in Digital Business ISBN: 9783540744085
TrustBus
TrustBus
Personal identifying information is released without much control from the end user to service providers. We describe a system to scrutinize the stated claims of a service provider on safeguarding PII by interrogating their infrastructure. We attempt
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9cddc8cdef9dd358e1ccab1699176329
https://doi.org/10.1007/978-3-540-74409-2_9
https://doi.org/10.1007/978-3-540-74409-2_9