A survey on encrypted network traffic analysis applications, techniques, and countermeasures
E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …
encryption protocols to secure communications and protect the privacy of users. In addition …
Verifying computations without reexecuting them
M Walfish, AJ Blumberg - Communications of the ACM, 2015 - dl.acm.org
Verifying computations without reexecuting them Page 1 74 COMMUNICATIONS OF THE ACM
| FEBRUARY 2015 | VOL. 58 | NO. 2 review articles DOI:10.1145/2641562 From theoretical …
| FEBRUARY 2015 | VOL. 58 | NO. 2 review articles DOI:10.1145/2641562 From theoretical …
A survey on security and privacy issues in Internet-of-Things
Y Yang, L Wu, G Yin, L Li, H Zhao - IEEE Internet of things …, 2017 - ieeexplore.ieee.org
Internet-of-Things (IoT) are everywhere in our daily life. They are used in our homes, in
hospitals, deployed outside to control and report the changes in environment, prevent fires …
hospitals, deployed outside to control and report the changes in environment, prevent fires …
Privacy-preserving deep learning
R Shokri, V Shmatikov - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
Deep learning based on artificial neural networks is a very popular approach to modeling,
classifying, and recognizing complex data such as images, speech, and text. The …
classifying, and recognizing complex data such as images, speech, and text. The …
Prio: Private, robust, and scalable computation of aggregate statistics
H Corrigan-Gibbs, D Boneh - 14th USENIX symposium on networked …, 2017 - usenix.org
This paper presents Prio, a privacy-preserving system for the collection of aggregate
statistics. Each Prio client holds a private data value (eg, its current location), and a small set …
statistics. Each Prio client holds a private data value (eg, its current location), and a small set …
Scalable bias-resistant distributed randomness
Bias-resistant public randomness is a critical component in many (distributed) protocols.
Generating public randomness is hard, however, because active adversaries may behave …
Generating public randomness is hard, however, because active adversaries may behave …
Lightweight techniques for private heavy hitters
This paper presents a new protocol for solving the private heavy-hitters problem. In this
problem, there are many clients and a small set of data-collection servers. Each client holds …
problem, there are many clients and a small set of data-collection servers. Each client holds …
Vuvuzela: Scalable private messaging resistant to traffic analysis
Private messaging over the Internet has proven challenging to implement, because even if
message data is encrypted, it is difficult to hide metadata about who is communicating in the …
message data is encrypted, it is difficult to hide metadata about who is communicating in the …
Privacy-preserving collaborative deep learning with unreliable participants
With powerful parallel computing GPUs and massive user data, neural-network-based deep
learning can well exert its strong power in problem modeling and solving, and has archived …
learning can well exert its strong power in problem modeling and solving, and has archived …
Riposte: An anonymous messaging system handling millions of users
H Corrigan-Gibbs, D Boneh… - 2015 IEEE Symposium …, 2015 - ieeexplore.ieee.org
This paper presents Riposte, a new system for anonymous broadcast messaging. Riposte is
the first such system, to our knowledge, that simultaneously protects against traffic-analysis …
the first such system, to our knowledge, that simultaneously protects against traffic-analysis …