Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Wolinsky, David Isaac"'
Autor:
Syta, Ewa, Tamas, Iulia, Visher, Dylan, Wolinsky, David Isaac, Jovanovic, Philipp, Gasser, Linus, Gailly, Nicolas, Khoffi, Ismail, Ford, Bryan
The secret keys of critical network authorities - such as time, name, certificate, and software update services - represent high-value targets for hackers, criminals, and spy agencies wishing to use these keys secretly to compromise other hosts. To p
Externí odkaz:
http://arxiv.org/abs/1503.08768
Social networking sites supporting federated identities offer a convenient and increasingly popular mechanism for cross-site authentication. Unfortunately, they also exacerbate many privacy and tracking risks. We propose Crypto-Book, an anonymizing l
Externí odkaz:
http://arxiv.org/abs/1406.4053
Autor:
Wolinsky, David Isaac, Ford, Bryan
Despite the attempts of well-designed anonymous communication tools to protect users from tracking or identification, flaws in surrounding software (such as web browsers) and mistakes in configuration may leak the user's identity. We introduce Nymix,
Externí odkaz:
http://arxiv.org/abs/1312.3665
Publikováno v:
ACM CCS'13, Nov 04-08 2013, Berlin, Germany
Some anonymity schemes might in principle protect users from pervasive network surveillance - but only if all messages are independent and unlinkable. Users in practice often need pseudonymity - sending messages intentionally linkable to each other b
Externí odkaz:
http://arxiv.org/abs/1305.5236
The DC-nets approach to anonymity has long held attraction for its strength against traffic analysis, but practical implementations remain vulnerable to internal disruption or "jamming" attacks requiring time-consuming tracing procedures to address.
Externí odkaz:
http://arxiv.org/abs/1209.4819
P2P overlays provide a framework for building distributed applications consisting of few to many resources with features including self-configuration, scalability, and resilience to node failures. Such systems have been successfully adopted in large-
Externí odkaz:
http://arxiv.org/abs/1004.2308
Online social networking has quickly become one of the most common activities of Internet users. As social networks evolve, they encourage users to share more information, requiring the users, in turn, to place more trust into social networks. Peer-t
Externí odkaz:
http://arxiv.org/abs/1002.0865
Structured P2P overlays provide a framework for building distributed applications that are self-configuring, scalable, and resilient to node failures. Such systems have been successfully adopted in large-scale Internet services such as content delive
Externí odkaz:
http://arxiv.org/abs/1001.2569
Autor:
Wolinsky, David Isaac, Abraham, Linton, Lee, Kyungyong, Liu, Yonggang, Xu, Jiangyan, Boykin, P. Oscar, Figueiredo, Renato
Centralized Virtual Private Networks (VPNs) when used in distributed systems have performance constraints as all traffic must traverse through a central server. In recent years, there has been a paradigm shift towards the use of P2P in VPNs to allevi
Externí odkaz:
http://arxiv.org/abs/1001.2575
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.