Results 1 - 10
of
99
UC framework for anonymous communication
, 2011
"... In this research report we present an UC framework for the general task of anonymous communication. Definition of the ideal and the real models are carried out in the BPW (Backes-Pfitzmann-Waidner) formalism. It is shown how this approach relates to and extends earlier proposals [10],[15]. We consid ..."
Abstract
- Add to MetaCart
In this research report we present an UC framework for the general task of anonymous communication. Definition of the ideal and the real models are carried out in the BPW (Backes-Pfitzmann-Waidner) formalism. It is shown how this approach relates to and extends earlier proposals [10],[15]. We
Anonymity Analysis of Onion Routing in the Universally Composable Framework
"... We present the formalization and analysis of a practical paradigm for general anonymous communication using standard cryptographic primitives. Specifically we present a probabilistic analysis of onion routing in a black-box model of anonymous communication in the Universally Composable framework. Fu ..."
Abstract
- Add to MetaCart
We present the formalization and analysis of a practical paradigm for general anonymous communication using standard cryptographic primitives. Specifically we present a probabilistic analysis of onion routing in a black-box model of anonymous communication in the Universally Composable framework
Whom You Know Matters: Venture Capital Networks and Investment Performance,
- Journal of Finance
, 2007
"... Abstract Many financial markets are characterized by strong relationships and networks, rather than arm's-length, spot-market transactions. We examine the performance consequences of this organizational choice in the context of relationships established when VCs syndicate portfolio company inv ..."
Abstract
-
Cited by 138 (8 self)
- Add to MetaCart
investments, using a comprehensive sample of U.S. based VCs over the period 1980 to 2003. VC funds whose parent firms enjoy more influential network positions have significantly better performance, as measured by the proportion of portfolio company investments that are successfully exited through an initial
k-Symmetry Model: A General Framework To Achieve Identity Anonymization In Social Networks
"... Social networks represent relationships between individuals when they take part in some social activities. For example, a telephone communication network could be built according to the phoning record from residents in a city. The WWW and MSN communication network are other examples of social networ ..."
Abstract
- Add to MetaCart
Social networks represent relationships between individuals when they take part in some social activities. For example, a telephone communication network could be built according to the phoning record from residents in a city. The WWW and MSN communication network are other examples of social
Anonymity, information, and machine-assisted proof
, 2010
"... This report demonstrates a technique for proving the anonymity guarantees of communication systems, using a mechanised theorem-prover. The approach is based on Shannon’s theory of information and can be used to analyse probabilistic programs. The information-theoretic metrics that are used for anony ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
This report demonstrates a technique for proving the anonymity guarantees of communication systems, using a mechanised theorem-prover. The approach is based on Shannon’s theory of information and can be used to analyse probabilistic programs. The information-theoretic metrics that are used
Nested Encryption Library for automated IPSec-based Anonymous Circuits Establishment
"... Abstract: Nowadays, security and privacy are becoming two of the most critical issues for current and future generation of communications systems. Since the 80’s, many efficient systems aiming at ensuring flows anonymity, mainly derived from the so-called Chaum’s Mix networks. However, these solutio ..."
Abstract
- Add to MetaCart
, these solutions suffer from a lack of integration with standardized IP approaches and therefore missed a wide adoption by the general public. This paper proposes an anonymous circuit establishment scheme derived from the powerful Mix concept and inheriting from the IPSec Framework. This solution has been
Quantifying Location Privacy
- IEEE SYMPOSIUM ON SECURITY AND PRIVACY
, 2011
"... It is a well-known fact that the progress of personal communication devices leads to serious concerns about privacy in general, and location privacy in particular. As a response to these issues, a number of Location-Privacy Protection Mechanisms (LPPMs) have been proposed during the last decade. Ho ..."
Abstract
-
Cited by 76 (18 self)
- Add to MetaCart
It is a well-known fact that the progress of personal communication devices leads to serious concerns about privacy in general, and location privacy in particular. As a response to these issues, a number of Location-Privacy Protection Mechanisms (LPPMs) have been proposed during the last decade
Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor
"... Tor is the most popular low-latency anonymity overlay network for the Internet, protecting the privacy of hundreds of thousands of people every day. To ensure a high level of security against certainattacks,Torcurrentlyutilizesspecialnodescalledentryguards as each client’s long-term entry point into ..."
Abstract
-
Cited by 18 (3 self)
- Add to MetaCart
of Tor clients using COGS based on Tor’s entry guard selection and rotation algorithms, with real entry guard data collected over the course of eightmonths fromthelive Tor network. Categories andSubjectDescriptors C.2.0[Computer-Communication Networks]: General—Data
Microsoft Word - Stock comovement_2015_01_28_Anonymous.docx
"... Abstract We study the comovement of asset returns caused by communication among investors. We develop an equilibrium model of investor communication and trading and derive a number of testable predictions. We use a novel dataset on an active online stock forum in China to measure investor communica ..."
Abstract
- Add to MetaCart
Abstract We study the comovement of asset returns caused by communication among investors. We develop an equilibrium model of investor communication and trading and derive a number of testable predictions. We use a novel dataset on an active online stock forum in China to measure investor
A Framework for Avoiding Steganography Usage Over HTTP
"... Steganographic techniques allow users to covertly transmit information, hid-ing the existence of the communication itself. These can be used in several scenarios ranging from evading censorship to discreetly extracting sensitive information from an organization. In this paper, we consider the proble ..."
Abstract
- Add to MetaCart
the problem of using steganography through a widely used network protocol (i.e. HTTP). We analyze the steganographic possibilities of HTTP, and propose an ac-tive warden model to eliminate any covert communication channel. Our framework is meant to be useful in many scenarios. It could be employed to ensure
Results 1 - 10
of
99