A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

Verifying computations without reexecuting them

M Walfish, AJ Blumberg - Communications of the ACM, 2015 - dl.acm.org
Verifying computations without reexecuting them Page 1 74 COMMUNICATIONS OF THE ACM
| FEBRUARY 2015 | VOL. 58 | NO. 2 review articles DOI:10.1145/2641562 From theoretical …

A survey on security and privacy issues in Internet-of-Things

Y Yang, L Wu, G Yin, L Li, H Zhao - IEEE Internet of things …, 2017 - ieeexplore.ieee.org
Internet-of-Things (IoT) are everywhere in our daily life. They are used in our homes, in
hospitals, deployed outside to control and report the changes in environment, prevent fires …

Privacy-preserving deep learning

R Shokri, V Shmatikov - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
Deep learning based on artificial neural networks is a very popular approach to modeling,
classifying, and recognizing complex data such as images, speech, and text. The …

Prio: Private, robust, and scalable computation of aggregate statistics

H Corrigan-Gibbs, D Boneh - 14th USENIX symposium on networked …, 2017 - usenix.org
This paper presents Prio, a privacy-preserving system for the collection of aggregate
statistics. Each Prio client holds a private data value (eg, its current location), and a small set …

Scalable bias-resistant distributed randomness

E Syta, P Jovanovic, EK Kogias, N Gailly… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Bias-resistant public randomness is a critical component in many (distributed) protocols.
Generating public randomness is hard, however, because active adversaries may behave …

Lightweight techniques for private heavy hitters

D Boneh, E Boyle, H Corrigan-Gibbs… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
This paper presents a new protocol for solving the private heavy-hitters problem. In this
problem, there are many clients and a small set of data-collection servers. Each client holds …

Vuvuzela: Scalable private messaging resistant to traffic analysis

J Van Den Hooff, D Lazar, M Zaharia… - Proceedings of the 25th …, 2015 - dl.acm.org
Private messaging over the Internet has proven challenging to implement, because even if
message data is encrypted, it is difficult to hide metadata about who is communicating in the …

Privacy-preserving collaborative deep learning with unreliable participants

L Zhao, Q Wang, Q Zou, Y Zhang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With powerful parallel computing GPUs and massive user data, neural-network-based deep
learning can well exert its strong power in problem modeling and solving, and has archived …

Riposte: An anonymous messaging system handling millions of users

H Corrigan-Gibbs, D Boneh… - 2015 IEEE Symposium …, 2015 - ieeexplore.ieee.org
This paper presents Riposte, a new system for anonymous broadcast messaging. Riposte is
the first such system, to our knowledge, that simultaneously protects against traffic-analysis …