A survey on routing in anonymous communication protocols

F Shirazi, M Simeonovski, MR Asghar… - ACM Computing …, 2018‏ - dl.acm.org
The Internet has undergone dramatic changes in the past 2 decades and now forms a global
communication platform that billions of users rely on for their daily activities. While this …

SoK: secure messaging

N Unger, S Dechand, J Bonneau, S Fahl… - … IEEE Symposium on …, 2015‏ - ieeexplore.ieee.org
Motivated by recent revelations of widespread state surveillance of personal communication,
many solutions now claim to offer secure and private messaging. This includes both a large …

DP5: A private presence service

N Borisov, G Danezis, I Goldberg - Proceedings on Privacy …, 2015‏ - petsymposium.org
Users of social applications like to be notified when their friends are online. Typically, this is
done by a central server kee** track of who is online and offline, as well as of all of the …

Deniable key exchanges for secure messaging

N Unger, I Goldberg - Proceedings of the 22nd acm sigsac conference …, 2015‏ - dl.acm.org
In the wake of recent revelations of mass government surveillance, secure messaging
protocols have come under renewed scrutiny. A widespread weakness of existing solutions …

A protocol for anonymous short communications in social networks and its application to proximity-based services

F Buccafurri, V De Angelis, MF Idone… - Online Social Networks …, 2022‏ - Elsevier
Several innovative applications could be advantageously placed within social networks, to
be effective, attractive, and pervasive. Examples of application domains that could benefit …

Highly distributed and privacy-preserving queries on personal data management systems

L Bouganim, J Loudet, I Sandu Popa - The VLDB Journal, 2023‏ - Springer
Personal data management system (PDMS) solutions are flourishing, boosted by smart
disclosure initiatives and new regulations. PDMSs allow users to easily store and manage …

CDAG: A serialized blockDAG for permissioned blockchain

H Gupta, D Janakiram - arxiv preprint arxiv:1910.08547, 2019‏ - arxiv.org
Blockchain is maintained as a global log between a network of nodes and uses
cryptographic distributed protocols to synchronize the updates. As adopted by Bitcoin and …

Privacy-preserving data infrastructure for smart home appliances based on the Octopus DHT

B Fabian, T Feldhaus - Computers in Industry, 2014‏ - Elsevier
Smart homes are about to become reality, involving technology such as Radio-Frequency
Identification (RFID), which enables querying for extended product information from the …

The case for distributed data archival using secret splitting with percival

TM Kroeger, JC Frank, EL Miller - 2013 6th International …, 2013‏ - ieeexplore.ieee.org
Most encryption used today obfuscates data behind a secret key or a problem believed to be
computationally complex. One can fundamentally think of it as delayed release for a …

SPA: A secure and private auction framework for decentralized online social networks

A Thapa, W Liao, M Li, P Li… - IEEE Transactions on …, 2015‏ - ieeexplore.ieee.org
The security and privacy threats on e-commerce have attracted intensive attention recently.
The explosive growth of online social networks (OSNs) has made them potential new great …