2 Hits in 4.1 sec

dPHI: An improved high-speed network-layer anonymity protocol

Alexander Bajic, Georg T. Becker
2020 Proceedings on Privacy Enhancing Technologies  
As a direct consequence of this analysis we propose a new protocol called dependable PHI (dPHI).  ...  The security analysis of dPHI includes a detailed quantitative anonymity analysis that compares dPHI with PHI, LAP and HORNET.  ...  Second, we propose an improved lightweight anonymity protocol named dependable PHI (dPHI) that withstands these attacks.  ... 
doi:10.2478/popets-2020-0054 fatcat:qeqcgfhyyfeqpctr6ny3ua6gpa

Practical software model checking via dynamic interface reduction

Huayang Guo, Ming Wu, Lidong Zhou, Gang Hu, Junfeng Yang, Lintao Zhang
2011 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles - SOSP '11  
practical with the following contributions: (i) proposing dynamic interface reduction, a new state-space reduction technique, (ii) introducing a framework that enables dynamic interface reduction in an  ...  been running in production data centers for years to manage tens of thousands of machines, DEMETER manages to explore completely a logically meaningful state space that covers both phases of the PAXOS protocol  ...  Sean McDirmid helped greatly in improving the writing of this paper. Charles E. Killian, Jr. provided valuable information on MACEMC.  ... 
doi:10.1145/2043556.2043582 dblp:conf/sosp/GuoWZHYZ11 fatcat:mpxh3kczhzcb3kpbk353zshycy