• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 99
Next 10 →

UC framework for anonymous communication

by István Vajda , 2011
"... In this research report we present an UC framework for the general task of anonymous communication. Definition of the ideal and the real models are carried out in the BPW (Backes-Pfitzmann-Waidner) formalism. It is shown how this approach relates to and extends earlier proposals [10],[15]. We consid ..."
Abstract - Add to MetaCart
In this research report we present an UC framework for the general task of anonymous communication. Definition of the ideal and the real models are carried out in the BPW (Backes-Pfitzmann-Waidner) formalism. It is shown how this approach relates to and extends earlier proposals [10],[15]. We

Anonymity Analysis of Onion Routing in the Universally Composable Framework

by Joan Feigenbaum, Aaron Johnson, Paul Syverson
"... We present the formalization and analysis of a practical paradigm for general anonymous communication using standard cryptographic primitives. Specifically we present a probabilistic analysis of onion routing in a black-box model of anonymous communication in the Universally Composable framework. Fu ..."
Abstract - Add to MetaCart
We present the formalization and analysis of a practical paradigm for general anonymous communication using standard cryptographic primitives. Specifically we present a probabilistic analysis of onion routing in a black-box model of anonymous communication in the Universally Composable framework

Whom You Know Matters: Venture Capital Networks and Investment Performance,

by Yael Hochberg , Alexander Ljungqvist , Yang Lu , Steve Drucker , Jan Eberly , Eric Green , Yaniv Grinstein , Josh Lerner , Laura Lindsey , Max Maksimovic , Roni Michaely , Maureen O'hara , Ludo Phalippou Mitch Petersen , Jesper Sorensen , Per Strömberg Morten Sorensen , Yael Hochberg , Johnson - Journal of Finance , 2007
"... Abstract Many financial markets are characterized by strong relationships and networks, rather than arm's-length, spot-market transactions. We examine the performance consequences of this organizational choice in the context of relationships established when VCs syndicate portfolio company inv ..."
Abstract - Cited by 138 (8 self) - Add to MetaCart
investments, using a comprehensive sample of U.S. based VCs over the period 1980 to 2003. VC funds whose parent firms enjoy more influential network positions have significantly better performance, as measured by the proportion of portfolio company investments that are successfully exited through an initial

k-Symmetry Model: A General Framework To Achieve Identity Anonymization In Social Networks

by Wentao Wu
"... Social networks represent relationships between individuals when they take part in some social activities. For example, a telephone communication network could be built according to the phoning record from residents in a city. The WWW and MSN communication network are other examples of social networ ..."
Abstract - Add to MetaCart
Social networks represent relationships between individuals when they take part in some social activities. For example, a telephone communication network could be built according to the phoning record from residents in a city. The WWW and MSN communication network are other examples of social

Anonymity, information, and machine-assisted proof

by Aaron R. Coble , 2010
"... This report demonstrates a technique for proving the anonymity guarantees of communication systems, using a mechanised theorem-prover. The approach is based on Shannon’s theory of information and can be used to analyse probabilistic programs. The information-theoretic metrics that are used for anony ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
This report demonstrates a technique for proving the anonymity guarantees of communication systems, using a mechanised theorem-prover. The approach is based on Shannon’s theory of information and can be used to analyse probabilistic programs. The information-theoretic metrics that are used

Nested Encryption Library for automated IPSec-based Anonymous Circuits Establishment

by Hervé Aiache, Mattéo Lauriano, Corinne Sieux, Cédric Tavernier
"... Abstract: Nowadays, security and privacy are becoming two of the most critical issues for current and future generation of communications systems. Since the 80’s, many efficient systems aiming at ensuring flows anonymity, mainly derived from the so-called Chaum’s Mix networks. However, these solutio ..."
Abstract - Add to MetaCart
, these solutions suffer from a lack of integration with standardized IP approaches and therefore missed a wide adoption by the general public. This paper proposes an anonymous circuit establishment scheme derived from the powerful Mix concept and inheriting from the IPSec Framework. This solution has been

Quantifying Location Privacy

by Reza Shokri, George Theodorakopoulos, Jean-yves Le Boudec, Jean-pierre Hubaux - IEEE SYMPOSIUM ON SECURITY AND PRIVACY , 2011
"... It is a well-known fact that the progress of personal communication devices leads to serious concerns about privacy in general, and location privacy in particular. As a response to these issues, a number of Location-Privacy Protection Mechanisms (LPPMs) have been proposed during the last decade. Ho ..."
Abstract - Cited by 76 (18 self) - Add to MetaCart
It is a well-known fact that the progress of personal communication devices leads to serious concerns about privacy in general, and location privacy in particular. As a response to these issues, a number of Location-Privacy Protection Mechanisms (LPPMs) have been proposed during the last decade

Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor

by Tariq Elahi, Kevin Bauer, Mashael Alsabah, Roger Dingledine, Ian Goldberg
"... Tor is the most popular low-latency anonymity overlay network for the Internet, protecting the privacy of hundreds of thousands of people every day. To ensure a high level of security against certainattacks,Torcurrentlyutilizesspecialnodescalledentryguards as each client’s long-term entry point into ..."
Abstract - Cited by 18 (3 self) - Add to MetaCart
of Tor clients using COGS based on Tor’s entry guard selection and rotation algorithms, with real entry guard data collected over the course of eightmonths fromthelive Tor network. Categories andSubjectDescriptors C.2.0[Computer-Communication Networks]: General—Data

Microsoft Word - Stock comovement_2015_01_28_Anonymous.docx

by R Greenwood , S Grossman , J Stiglitz
"... Abstract We study the comovement of asset returns caused by communication among investors. We develop an equilibrium model of investor communication and trading and derive a number of testable predictions. We use a novel dataset on an active online stock forum in China to measure investor communica ..."
Abstract - Add to MetaCart
Abstract We study the comovement of asset returns caused by communication among investors. We develop an equilibrium model of investor communication and trading and derive a number of testable predictions. We use a novel dataset on an active online stock forum in China to measure investor

A Framework for Avoiding Steganography Usage Over HTTP

by Jorge Blascoa, Julio Cesar Hern, Jose ́ Maŕıa De Fuentesa
"... Steganographic techniques allow users to covertly transmit information, hid-ing the existence of the communication itself. These can be used in several scenarios ranging from evading censorship to discreetly extracting sensitive information from an organization. In this paper, we consider the proble ..."
Abstract - Add to MetaCart
the problem of using steganography through a widely used network protocol (i.e. HTTP). We analyze the steganographic possibilities of HTTP, and propose an ac-tive warden model to eliminate any covert communication channel. Our framework is meant to be useful in many scenarios. It could be employed to ensure
Next 10 →
Results 1 - 10 of 99
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University