Filters








32,523 Hits in 2.8 sec

How to Bootstrap Anonymous Communication [article]

Sune K. Jakobsen, Claudio Orlandi
2015 arXiv   pre-print
), - A lower bound on the number of bits which are needed to bootstrap anonymous communication.  ...  We ask whether it is possible to anonymously communicate a large amount of data using only public (non-anonymous) communication together with a small anonymous channel.  ...  Since the decoding key must be sent over an anonymous channel, this gives a lower bound on the number of bits which are necessary to bootstrap anonymous communication.  ... 
arXiv:1502.05273v1 fatcat:bdpucdz5ofaelbjepzdxqrxjji

How To Bootstrap Anonymous Communication

Sune K. Jakobsen, Claudio Orlandi
2016 Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science - ITCS '16  
), -A lower bound on the number of bits which are needed to bootstrap anonymous communication.  ...  We ask whether it is possible to anonymously communicate a large amount of data using only public (non-anonymous) communication together with a small anonymous channel.  ...  Since the decoding key must be sent over an anonymous channel, this gives a lower bound on the number of bits which are necessary to bootstrap anonymous communication.  ... 
doi:10.1145/2840728.2840743 dblp:conf/innovations/JakobsenO16 fatcat:btishzetmvgd3obetaqwhwzja4

Randomized Controlled Trials without Data Retention [article]

Winston Chou
2021 arXiv   pre-print
Devoting special attention to non-i.i.d. data, we further show how to draw robust inferences from RCTs by combining recursive algorithms with bootstrap and federated strategies.  ...  In particular, we show how to use recursive algorithms to construct running estimates of treatment effects in RCTs, which allow individualized records to be deleted or anonymized shortly after collection  ...  Lastly, to address the commonplace challenge of non-i.i.d. records -which create special problems for data deletion and anonymization practices -we show how recursive estimation can be combined with bootstrap  ... 
arXiv:2102.03316v2 fatcat:ziannwkmw5f65mvebmljuklobu

A new authentication protocol for revocable anonymity in ad-hoc networks [article]

Adam Wierzbicki, Aneta Zwierko, Zbigniew Kotulski
2005 arXiv   pre-print
The protocol has been designed to meet specialized requirements of ad-hoc networks, such as lack of direct communication between nodes or requirements for revocable anonymity.  ...  At the same time, a ad-hoc authentication protocol must be resistant to spoofing, eavesdropping and playback, and man-in-the-middle attacks.  ...  If P KI certificates are used, the users cannot be anonymous. 6. Note that we do not consider how to provide message integrity during communication from P I to P U .  ... 
arXiv:cs/0510065v1 fatcat:clunlf7krzfthiufuuluhqc3oi

Who Let the $$\mathcal {DOGS}$$ Out: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed Opening [chapter]

Marina Dehez-Clementi, Jean-Christophe Deneuville, Jérôme Lacan, Hassan Asghar, Dali Kaafar
2020 Lecture Notes in Computer Science  
Over the past two decades, group signature schemes have been developed and used to enable authenticated and anonymous peerto-peer communications.  ...  Additionally, we prove how DOGS is secure against message forgery and anonymity attacks.  ...  We would like to express our great appreciation to E. Lochin for his valuable and constructive suggestions during the planning and development of this research work.  ... 
doi:10.1007/978-3-030-66172-4_28 fatcat:wll2twihbbbttdtjwddfssf3du

Communication and Security in Machine-to-Machine Systems [chapter]

Iva Bojic, Jorge Granjal, Edmundo Monteiro, Damjan Katusic, Pavle Skocir, Mario Kusek, Gordan Jezic
2014 Lecture Notes in Computer Science  
Because of communication technology diversity, research challenges are to uniquely identify devices, and to enable them to communicate securely.  ...  Regarding the latter, we analyze how current standards and architecture of M2M systems define basic processes for secure connection establishment, and also discuss open issues, both in respect to aspects  ...  Acknowledgments This work was supported by two projects: "Machine-to-Machine Communication challenges" funded by Ericsson Nikola Tesla, Croatia, and iCIS project (CENTRO-07-ST24-FEDER-002003), which is  ... 
doi:10.1007/978-3-319-14116-9_14 fatcat:geymsjzhozaexjt7tls4gzny5a

Communication and Security in Machine-to-Machine Systems [chapter]

Iva Bojic, Jorge Granjal, Edmundo Monteiro, Damjan Katusic, Pavle Skocir, Mario Kusek, Gordan Jezic
2014 Lecture Notes in Computer Science  
Because of communication technology diversity, research challenges are to uniquely identify devices, and to enable them to communicate securely.  ...  Regarding the latter, we analyze how current standards and architecture of M2M systems define basic processes for secure connection establishment, and also discuss open issues, both in respect to aspects  ...  Acknowledgments This work was supported by two projects: "Machine-to-Machine Communication challenges" funded by Ericsson Nikola Tesla, Croatia, and iCIS project (CENTRO-07-ST24-FEDER-002003), which is  ... 
doi:10.1007/978-3-319-10834-6_14 fatcat:7iscxu7cajfulirstf5xrywp5y

Trust enhanced ubiquitous payment without too much privacy loss

Jean-Marc Seigneur, Christian Damsgaard Jensen
2004 Proceedings of the 2004 ACM symposium on Applied computing - SAC '04  
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not.  ...  In order to build trust in a customer, a means to link transactions using the same e-purse is required. Roughly, trust is a result of knowledge.  ...  Bootstrapping is the process done to initiate the communication channel (e.g. short-range wireless). A high-level view of our solution is depicted in Figure 1 .  ... 
doi:10.1145/967900.968218 dblp:conf/sac/SeigneurJ04 fatcat:5i5vq24duvfodpwzoedav7lmbu

Building Infrastructure Support for Ubiquitous Context-Aware Systems [chapter]

Wei Li, Martin Jonsson, Fredrik Kilander, Carl Gustaf Jansson
2004 Lecture Notes in Computer Science  
Many context-aware systems have been demonstrated in lab environments; however, due to some difficulties such as the scalability and privacy issues, they are not yet practical for deployment on a large  ...  In our design, these steps are augmented by sensor technologies to support spontaneous bootstrapping.  ...  In section 2, we first introduce our system architecture in general, and then give more details on how to enhance security and privacy protection by enabling pseudonym-based communication.  ... 
doi:10.1007/978-3-540-30566-8_61 fatcat:ffhpbf6efjb6pnf3rt7antaoua

Vicarious Interactions in Online Support Communities: The Roles of Visual Anonymity and Social Identification

Yue (Nancy) Dai, Jingyuan Shi
2022 Journal of Computer-Mediated Communication  
Online information seekers often do not actively post or engage in interactions with others, inviting research on how passive users of online communities benefit from the information they see.  ...  Lay Summary Ample evidence shows that people benefit tremendously from participating in online health support communities, but less is understood about how people who do not actively participate in interactions  ...  in many online communities-influence how a passive user relates to the interactants in vicarious interactions.  ... 
doi:10.1093/jcmc/zmac006 fatcat:5t2o7ehnxbg2ppzyp6ofghinly

EXPERIMENTAL SEMIOTICS: AN ENGINE OF DISCOVERY FOR UNDERSTANDING HUMAN COMMUNICATION

BRUNO GALANTUCCI, GARETH ROBERTS
2012 Advances in Complex Systems  
This comparison highlights how ES can provide an engine of discovery for understanding human communication.  ...  The recent growth of Experimental Semiotics (ES) offers us a new option to investigate human communication.  ...  The bootstrapping of communication The third core question addressed by experimental semioticians is this: How do humans bootstrap a communication system?  ... 
doi:10.1142/s0219525911500263 fatcat:gqxozf7ozvdmjms6vccbubl3zu

Social networking for anonymous communication systems: A survey

Rodolphe Marques, Andre Zuquete
2011 2011 International Conference on Computational Aspects of Social Networks (CASoN)  
In the end it boils down to finding a subset of trusted nodes to be placed in critical positions of the communication path. But the question remains: "How to know if a given node can be trusted?".  ...  Anonymous communication systems have been around for sometime, providing anonymity, enhanced privacy, and censorship circumvention.  ...  In [18] the authors evaluate the anonymity properties of an abstract anonymous communication system of users, linked via a social network, that send messages to their friends, focusing in how the uncertainty  ... 
doi:10.1109/cason.2011.6085953 dblp:conf/cason/MarquesZ11 fatcat:ea52akggr5f75kbzdbtc3lhyke

Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists

Claudio A. Ardagna, Valerio Bellandi, Ernesto Damiani, Michele Bezzi, Cedric Hebert
2021 Computers & electrical engineering  
Our solution acts as a middleware allowing a security expert and a data scientist to collaborate to the deployment of an analytics addressing their needs.  ...  Many domains that can benefit from novel solutions based on data analytics have stringent security requirements to fulfill.  ...  Bootstrap pipeline: Data anonymization This pipeline anonymizes data before using them in the training process to build the classifier.  ... 
doi:10.1016/j.compeleceng.2021.107215 fatcat:3g46gzlyhnff7np4d7o2ypqgqu

On Building Onion Routing into Future Internet Architectures [chapter]

Daniele E. Asoni, Chen Chen, David Barrera, Adrian Perrig
2016 Lecture Notes in Computer Science  
Our goal is to identify promising research directions and incentivize further exploration of the field. ⋆ Author copy. Springer LNCS version to appear.  ...  User privacy on the Internet has become a pressing concern in recent years largely due to the revelations of large scale network surveillance programs.  ...  As deployment of future Internet architectures gains momentum, we expect that these theoretical anonymous network proposals will begin to see real-world adoption.  ... 
doi:10.1007/978-3-319-39028-4_6 fatcat:h6ove4ae5nfvbkips6hxw22asi

Secure communication in a distributed system using identity based encryption

T. Stading
2003 CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003. Proceedings.  
Distributed systems require the ability to communicate securely with other computers in the network.  ...  We evaluate key distribution schemes inside Scribe and provide recommendations for practical implementation to allow for secure, efficient, authenticated communication inside a distributed system.  ...  Anonymity Anonymity is especially important in the design of Scribe to improve security.  ... 
doi:10.1109/ccgrid.2003.1199395 dblp:conf/ccgrid/Stading03 fatcat:ihx7h2i6x5errgesqbxaw36jvu
« Previous Showing results 1 — 15 out of 32,523 results