reclaimID: Secure, self-sovereign identities using name systems and attribute-based encryption

M Schanzenbach, G Bramm… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
In this paper we present reclaimID: An architecture that allows users to reclaim their digital
identities by securely sharing identity attributes without the need for a centralised service …

A censorship-resistant, privacy-enhancing and fully decentralized name system

M Wachs, M Schanzenbach, C Grothoff - Cryptology and Network Security …, 2014 - Springer
Abstract The Domain Name System (DNS) is vital for access to information on the Internet.
This makes it a target for attackers whose aim is to suppress free access to information. This …

Splitting payments locally while routing interdimensionally

L Eckey, S Faust, K Hostáková, S Roos - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Abstract Payment Channel Networks (PCNs) enable fast, scalable, and cheap payments by
moving transactions off-chain, thereby overcoming debilitating drawbacks of blockchains …

Anonymous addresses for efficient and resilient routing in f2f overlays

S Roos, M Beck, T Strufe - IEEE INFOCOM 2016-The 35th …, 2016 - ieeexplore.ieee.org
Friend-to-friend (F2F) overlays, which restrict direct communication to mutually trusted
parties, are a promising substrate for privacy-preserving communication due to their inherent …

Practical attacks against the I2P network

C Egger, J Schlumberger, C Kruegel… - Research in Attacks …, 2013 - Springer
Anonymity networks, such as Tor or I2P, were built to allow users to access network
resources without revealing their identity. Newer designs, like I2P, run in a completely …

On the feasibility of a censorship resistant decentralized name system

M Wachs, M Schanzenbach, C Grothoff - International Symposium on …, 2013 - Springer
A central problem on the Internet today is that key infrastructure for security is concentrated
in a few places. This is particularly true in the areas of naming and public key infrastructure …

Greedy embedding, routing and content addressing for darknets

A Hoefer, S Roos, T Strufe - 2013 Conference on Networked …, 2013 - ieeexplore.ieee.org
To achieve anonymous and censorship-resistant overlay communication, darknets restrict
overlay links to trusted parties. Efficient data retrieval in such a restricted topology requires a …

Secure data sharing framework via hierarchical greedy embedding in darknets

Y Sun, M Li, S Su, Z Tian, W Shi, M Han - Mobile Networks and …, 2021 - Springer
Geometric routing, which combines greedy embedding and greedy forwarding, is a
promising approach for efficient data sharing in darknets. However, the security of data …

Semi–supervised and compound classification of network traffic

J Zhang, C Chen, Y Xiang… - International Journal of …, 2012 - inderscienceonline.com
This paper presents a new semi–supervised method to effectively improve traffic
classification performance when very few supervised training data are available. Existing …

Mitigating eclipse attacks in peer-to-peer networks

D Germanus, S Roos, T Strufe… - 2014 IEEE conference on …, 2014 - ieeexplore.ieee.org
Peer-to-Peer (P2P) protocols usage is proliferating for a variety of applications including
time-and safety-critical ones. While the distributed design of P2P provides inherent fault …