A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
How to Bootstrap Anonymous Communication
[article]
2015
arXiv
pre-print
), - A lower bound on the number of bits which are needed to bootstrap anonymous communication. ...
We ask whether it is possible to anonymously communicate a large amount of data using only public (non-anonymous) communication together with a small anonymous channel. ...
Since the decoding key must be sent over an anonymous channel, this gives a lower bound on the number of bits which are necessary to bootstrap anonymous communication. ...
arXiv:1502.05273v1
fatcat:bdpucdz5ofaelbjepzdxqrxjji
How To Bootstrap Anonymous Communication
2016
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science - ITCS '16
), -A lower bound on the number of bits which are needed to bootstrap anonymous communication. ...
We ask whether it is possible to anonymously communicate a large amount of data using only public (non-anonymous) communication together with a small anonymous channel. ...
Since the decoding key must be sent over an anonymous channel, this gives a lower bound on the number of bits which are necessary to bootstrap anonymous communication. ...
doi:10.1145/2840728.2840743
dblp:conf/innovations/JakobsenO16
fatcat:btishzetmvgd3obetaqwhwzja4
Randomized Controlled Trials without Data Retention
[article]
2021
arXiv
pre-print
Devoting special attention to non-i.i.d. data, we further show how to draw robust inferences from RCTs by combining recursive algorithms with bootstrap and federated strategies. ...
In particular, we show how to use recursive algorithms to construct running estimates of treatment effects in RCTs, which allow individualized records to be deleted or anonymized shortly after collection ...
Lastly, to address the commonplace challenge of non-i.i.d. records -which create special problems for data deletion and anonymization practices -we show how recursive estimation can be combined with bootstrap ...
arXiv:2102.03316v2
fatcat:ziannwkmw5f65mvebmljuklobu
A new authentication protocol for revocable anonymity in ad-hoc networks
[article]
2005
arXiv
pre-print
The protocol has been designed to meet specialized requirements of ad-hoc networks, such as lack of direct communication between nodes or requirements for revocable anonymity. ...
At the same time, a ad-hoc authentication protocol must be resistant to spoofing, eavesdropping and playback, and man-in-the-middle attacks. ...
If P KI certificates are used, the users cannot be anonymous. 6. Note that we do not consider how to provide message integrity during communication from P I to P U . ...
arXiv:cs/0510065v1
fatcat:clunlf7krzfthiufuuluhqc3oi
Who Let the $$\mathcal {DOGS}$$ Out: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed Opening
[chapter]
2020
Lecture Notes in Computer Science
Over the past two decades, group signature schemes have been developed and used to enable authenticated and anonymous peerto-peer communications. ...
Additionally, we prove how DOGS is secure against message forgery and anonymity attacks. ...
We would like to express our great appreciation to E. Lochin for his valuable and constructive suggestions during the planning and development of this research work. ...
doi:10.1007/978-3-030-66172-4_28
fatcat:wll2twihbbbttdtjwddfssf3du
Communication and Security in Machine-to-Machine Systems
[chapter]
2014
Lecture Notes in Computer Science
Because of communication technology diversity, research challenges are to uniquely identify devices, and to enable them to communicate securely. ...
Regarding the latter, we analyze how current standards and architecture of M2M systems define basic processes for secure connection establishment, and also discuss open issues, both in respect to aspects ...
Acknowledgments This work was supported by two projects: "Machine-to-Machine Communication challenges" funded by Ericsson Nikola Tesla, Croatia, and iCIS project (CENTRO-07-ST24-FEDER-002003), which is ...
doi:10.1007/978-3-319-14116-9_14
fatcat:geymsjzhozaexjt7tls4gzny5a
Communication and Security in Machine-to-Machine Systems
[chapter]
2014
Lecture Notes in Computer Science
Because of communication technology diversity, research challenges are to uniquely identify devices, and to enable them to communicate securely. ...
Regarding the latter, we analyze how current standards and architecture of M2M systems define basic processes for secure connection establishment, and also discuss open issues, both in respect to aspects ...
Acknowledgments This work was supported by two projects: "Machine-to-Machine Communication challenges" funded by Ericsson Nikola Tesla, Croatia, and iCIS project (CENTRO-07-ST24-FEDER-002003), which is ...
doi:10.1007/978-3-319-10834-6_14
fatcat:7iscxu7cajfulirstf5xrywp5y
Trust enhanced ubiquitous payment without too much privacy loss
2004
Proceedings of the 2004 ACM symposium on Applied computing - SAC '04
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. ...
In order to build trust in a customer, a means to link transactions using the same e-purse is required. Roughly, trust is a result of knowledge. ...
Bootstrapping is the process done to initiate the communication channel (e.g. short-range wireless). A high-level view of our solution is depicted in Figure 1 . ...
doi:10.1145/967900.968218
dblp:conf/sac/SeigneurJ04
fatcat:5i5vq24duvfodpwzoedav7lmbu
Building Infrastructure Support for Ubiquitous Context-Aware Systems
[chapter]
2004
Lecture Notes in Computer Science
Many context-aware systems have been demonstrated in lab environments; however, due to some difficulties such as the scalability and privacy issues, they are not yet practical for deployment on a large ...
In our design, these steps are augmented by sensor technologies to support spontaneous bootstrapping. ...
In section 2, we first introduce our system architecture in general, and then give more details on how to enhance security and privacy protection by enabling pseudonym-based communication. ...
doi:10.1007/978-3-540-30566-8_61
fatcat:ffhpbf6efjb6pnf3rt7antaoua
Vicarious Interactions in Online Support Communities: The Roles of Visual Anonymity and Social Identification
2022
Journal of Computer-Mediated Communication
Online information seekers often do not actively post or engage in interactions with others, inviting research on how passive users of online communities benefit from the information they see. ...
Lay Summary Ample evidence shows that people benefit tremendously from participating in online health support communities, but less is understood about how people who do not actively participate in interactions ...
in many online communities-influence how a passive user relates to the interactants in vicarious interactions. ...
doi:10.1093/jcmc/zmac006
fatcat:5t2o7ehnxbg2ppzyp6ofghinly
EXPERIMENTAL SEMIOTICS: AN ENGINE OF DISCOVERY FOR UNDERSTANDING HUMAN COMMUNICATION
2012
Advances in Complex Systems
This comparison highlights how ES can provide an engine of discovery for understanding human communication. ...
The recent growth of Experimental Semiotics (ES) offers us a new option to investigate human communication. ...
The bootstrapping of communication The third core question addressed by experimental semioticians is this: How do humans bootstrap a communication system? ...
doi:10.1142/s0219525911500263
fatcat:gqxozf7ozvdmjms6vccbubl3zu
Social networking for anonymous communication systems: A survey
2011
2011 International Conference on Computational Aspects of Social Networks (CASoN)
In the end it boils down to finding a subset of trusted nodes to be placed in critical positions of the communication path. But the question remains: "How to know if a given node can be trusted?". ...
Anonymous communication systems have been around for sometime, providing anonymity, enhanced privacy, and censorship circumvention. ...
In [18] the authors evaluate the anonymity properties of an abstract anonymous communication system of users, linked via a social network, that send messages to their friends, focusing in how the uncertainty ...
doi:10.1109/cason.2011.6085953
dblp:conf/cason/MarquesZ11
fatcat:ea52akggr5f75kbzdbtc3lhyke
Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists
2021
Computers & electrical engineering
Our solution acts as a middleware allowing a security expert and a data scientist to collaborate to the deployment of an analytics addressing their needs. ...
Many domains that can benefit from novel solutions based on data analytics have stringent security requirements to fulfill. ...
Bootstrap pipeline: Data anonymization This pipeline anonymizes data before using them in the training process to build the classifier. ...
doi:10.1016/j.compeleceng.2021.107215
fatcat:3g46gzlyhnff7np4d7o2ypqgqu
On Building Onion Routing into Future Internet Architectures
[chapter]
2016
Lecture Notes in Computer Science
Our goal is to identify promising research directions and incentivize further exploration of the field. ⋆ Author copy. Springer LNCS version to appear. ...
User privacy on the Internet has become a pressing concern in recent years largely due to the revelations of large scale network surveillance programs. ...
As deployment of future Internet architectures gains momentum, we expect that these theoretical anonymous network proposals will begin to see real-world adoption. ...
doi:10.1007/978-3-319-39028-4_6
fatcat:h6ove4ae5nfvbkips6hxw22asi
Secure communication in a distributed system using identity based encryption
2003
CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003. Proceedings.
Distributed systems require the ability to communicate securely with other computers in the network. ...
We evaluate key distribution schemes inside Scribe and provide recommendations for practical implementation to allow for secure, efficient, authenticated communication inside a distributed system. ...
Anonymity Anonymity is especially important in the design of Scribe to improve security. ...
doi:10.1109/ccgrid.2003.1199395
dblp:conf/ccgrid/Stading03
fatcat:ihx7h2i6x5errgesqbxaw36jvu
« Previous
Showing results 1 — 15 out of 32,523 results