A survey of key technologies for constructing network covert channel
J Tian, G **ong, Z Li, G Gou - Security and Communication …, 2020 - Wiley Online Library
In order to protect user privacy or guarantee free access to the Internet, the network covert
channel has become a hot research topic. It refers to an information channel in which the …
channel has become a hot research topic. It refers to an information channel in which the …
Hiding the access pattern is not enough: Exploiting search pattern leakage in searchable encryption
Recent Searchable Symmetric Encryption (SSE) schemes enable secure searching over an
encrypted database stored in a server while limiting the information leaked to the server …
encrypted database stored in a server while limiting the information leaked to the server …
A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization
D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …
Deanonymization and linkability of cryptocurrency transactions based on network analysis
Bitcoin, introduced in 2008 and launched in 2009, is the first digital currency to solve the
double spending problem without relying on a trusted third party. Bitcoin provides a way to …
double spending problem without relying on a trusted third party. Bitcoin provides a way to …
Stadium: A distributed metadata-private messaging system
Private communication over the Internet remains a challenging problem. Even if messages
are encrypted, it is hard to deliver them without revealing metadata about which pairs of …
are encrypted, it is hard to deliver them without revealing metadata about which pairs of …
Honeybadgermpc and asynchromix: Practical asynchronous mpc and its application to anonymous communication
D Lu, T Yurek, S Kulshreshtha, R Govind… - Proceedings of the …, 2019 - dl.acm.org
Multiparty computation as a service (MPSaaS) is a promising approach for building privacy-
preserving communication systems. However, in this paper, we argue that existing MPC …
preserving communication systems. However, in this paper, we argue that existing MPC …
Karaoke: Distributed private messaging immune to passive traffic analysis
Karaoke is a system for low-latency metadata-private communication. Karaoke provides
differential privacy guarantees, and scales better with the number of users than prior such …
differential privacy guarantees, and scales better with the number of users than prior such …
Express: Lowering the cost of metadata-hiding communication with cryptographic privacy
Existing systems for metadata-hiding messaging that provide cryptographic privacy
properties have either high communication costs, high computation costs, or both. In this …
properties have either high communication costs, high computation costs, or both. In this …
Blinder--Scalable, Robust Anonymous Committed Broadcast
Anonymous Committed Broadcast is a functionality that extends DC-nets and allows a set of
clients to privately commit messages to set of servers, which can then simultaneously open …
clients to privately commit messages to set of servers, which can then simultaneously open …
[PDF][PDF] The cyber security body of knowledge
D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …
The project would like organisations using, or intending to use, CyBOK for the purposes of …