The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we address the issue of profiling users over the Internet using meta-data logs derived from network flow data (hence preserving a high degree of privacy). In this broader context, we specifically aim to empirically demonstrate that Internet volume and time of usage of humans do exhibit repeatable behavior over time. In our experimental study, Internet usage statistics of octets and...
This work investigates the anonymous tag cardinality estimation problem in radio frequency identification systems with frame slotted aloha-based protocol. Each tag, instead of sending its identity upon receiving the reader's request, randomly responds by only one bit in one of the time slots of the frame due to privacy and security. As a result, each slot with no response is observed as in an empty...
Due to massive advantages of short range communication technologies such as NFC and RFID, they are ubiquitously utilized in many fancy and sensitive applications. During last decade, there have been impressive endeavors to design efficient authentication protocols which can provide secure and anonymous communication for end-users. In this research, we formally analyze a recently improved authentication...
We investigate the possibility of covert and secret key generation over a discrete memoryless channel model with one way public discussion. Protocols are required to conceal not only the key but also whether a protocol is being implemented. For some models, we show that covert secret key generation is possible and characterize the covert secret key capacity in special cases; in particular, the covert...
We consider the problem of a client efficiently, privately and securely delegating the computation of multiple group exponentiations to a computationally more powerful server (e.g. a cloud server). We provide the first practical and provable solutions to this batch delegation problem for groups commonly used in cryptography, based on discrete logarithm and RSA hardness assumptions. Previous results...
Location-based queries have brought challenging privacy issues for mobile users. Having access to data, anytime from anywhere, raises many security concerns. One of these concerns is user's location privacy, where a user must reveal her location to get the desired result. The question is how to benefit from such queries without endangering user's location privacy. This paper presents a new method...
Cooperative spectrum sensing is often necessary in cognitive radios systems to localize a transmitter by fusing the measurements from multiple sensing radios. However, revealing spectrum sensing information also generally leaks information about the location of the radio that made those measurements. We propose a protocol for performing cooperative spectrum sensing while preserving the privacy of...
Surveillance, management and estimation of spontaneous crowd formations in urban environments, e.g., during open-air festivals or rush hours, are necessary measures for city administration. Most solutions that implement these measures however require additional costly hardware installations (e.g., installation of observation cameras) and infrastructure support, and often pose privacy concerns. In...
The Internet of Things(IoT) has been developing rapidly since the past decade. It is becoming a crucial part of everyday life. It is becoming a way of living in which machines perform activities on their own by communicating with each other, without the need for human beings to instruct them. In such a scenario, which concerns daily life, privacy, and secrecy should be of at most priority. Since in...
In recent years, privacy issues in the networking field are getting more important. In particular, there is a lively debate about how Internet Service Providers (ISPs) should collect and treat data coming from passive network measurements. This kind of information, such as flow records or HTTP logs, carries considerable knowledge from several points of view: traffic engineering, academic research,...
The introduction of the WebRTC API to modern browsers has brought about a new threat to user privacy. WebRTC is a set of communications protocols and APIs that provides browsers and mobile applications with Real-Time Communications (RTC) capabilities over peer-to-peer connections. The WebRTC API causes a range of client IP addresses to become available to a visited website via JavaScript, even if...
In this paper, we consider the privacy preserving problem in an agreement network under interception attacks. First, we introduce a consensus protocol with privacy preserving, where each node hides their initial states into a set of random sequences, and then injects the sequences into the process of consensus. Second, we assume that an attacker with limited power can intercept the data transmitted...
Ongoing research in the field of positioning in cellular devices has led to several Location Based Services (LBSs) and its application flooding the market. However, these applications are neglecting user privacy in order to generate highly accurate results for user queries. While most traditional Location Based Service use the K-anonymity principle to blur user?s exact location information, these...
Modern browsers implement private mode to protect user privacy. However, they do not agree on what protection private mode should provide. We performed the first study on comparing private modes in popular desktop and mobile browsers and found many inconsistencies between different browsers and between the desktop and mobile versions of the same browser. We show that some inconsistencies result from...
Input-handling vulnerabilities have been a constant source of security problems for decades. Many famous recent bugs are in fact input-handling bugs. We argue that the techniques for writing parsers in its present form are insufficient, and hence we propose a new pattern. In this tutorial, we will show participants a new design pattern for designing and implementing parsers using this new method....
Nowadays, passive Ultra High Frequency (UHF) Radio Frequency IDentification (RFID) is used ubiquitously in supply-chain management, logistics, and industrial environments. Both, the tags identifier and user memory may contain sensitive information, raising privacy concerns if read without authorization. To address this issue, security related amendments to the conventional standards have been made...
In the next future, IoT systems will be “ubiquitous” and “pervasive”, bringing several benefits to mankind and also many issues about interoperability, security and privacy. The intrinsic vulnerabilities of IoT devices, with limited resources and heterogeneous technologies, together with the lack of specifically designed IoT standards, represent a fertile ground for the expansion of specific cyber...
Radio frequency identification (RFID) is one of the key technologies of Internet of Things, which have many security issues in an open environment. In order to solve the communication problem between RFID tags and readers, security protocols has been improved constantly as the first choice. But the form of attack is also changing constantly with the development of technology. In this paper we classify...
Automatic tools based on symbolic models have been successful in analyzing security protocols. Such tools are particularly adapted for trace properties (e.g. secrecy or authentication), while they often fail to analyse equivalence properties.Equivalence properties can express a variety of security properties, including in particular privacy properties (vote privacy, anonymity, untraceability). Several...
Statistical clustering plays an important role in data analysis and is one of the most widely used data mining methods. Concerns about the security and privacy of analyzing modernday massive data across distributed networks have prompted the development of privacy preserving data mining algorithms. This paper proposes a scheme for model-based clustering and classification through a privacy-preserving...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.