C Kuhn, M Beck, T Strufe - 2020 IEEE Symposium on Security …, 2020 - ieeexplore.ieee.org
After several years of research on onion routing, Camenisch and Lysyanskaya, in an attempt at rigorous analysis, defined an ideal functionality in the universal composability model …
S Sasy, I Goldberg - Proceedings on Privacy Enhancing …, 2024 - petsymposium.org
Protecting metadata of communications has been an area of active research since the dining cryptographers problem was introduced by David Chaum in 1988. The Snowden …
C Kuhn, M Beck, T Strufe - Online Social Networks and Media, 2021 - Elsevier
The recent SARS-CoV-2 pandemic gave rise to management approaches using mobile apps for contact tracing. The corresponding apps track individuals and their interactions, to …
Featured Application Internet of Things and Industrial Internet of Things. Abstract Security and privacy (SP)-related challenges constitute a significant barrier to the wider adoption of …
We analyze the anonymity provided by continuous mixnets (eg, Loopix) when messages with different latency requirements are sent through the same network. The anonymity …
V Nunes, J Brás, A Carvalho, D Barradas… - Proceedings of the …, 2023 - dl.acm.org
Anonymous communication systems are essential tools for preserving privacy and freedom of expression. However, traffic analysis attacks make it challenging to maintain unlinkability …
Publish/Subscribe systems like Twitter and Reddit let users communicate with many recipients without requiring prior personal connections. The content that participants of these …
J Cui, C Huang, H Meng, R Wei - Cybersecurity, 2023 - Springer
In order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the overall network and ignore the …
Messaging systems built on mesh networks consisting of smartphones communicating over Bluetooth have been used by protesters around the world after governments have disrupted …