Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2022
Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 2947–2960https://doi.org/10.1145/3548606.3560617Due to the popularity of blockchain-based cryptocurrencies, the increasing digitalization of payments, and the constantly reducing role of cash in society, central banks have shown an increased interest in deploying central bank digital currencies (...
- research-articleOctober 2022
AdaptOver: adaptive overshadowing attacks in cellular networks
MobiCom '22: Proceedings of the 28th Annual International Conference on Mobile Computing And NetworkingPages 743–755https://doi.org/10.1145/3495243.3560525In cellular networks, attacks on the communication link between a mobile device and the core network significantly impact privacy and availability. Up until now, fake base stations have been required to execute such attacks. Since they require a ...
- research-articleNovember 2021
ROSEN: RObust and SElective Non-repudiation (for TLS)
CCSW '21: Proceedings of the 2021 on Cloud Computing Security WorkshopPages 97–109https://doi.org/10.1145/3474123.3486763A versatile non-repudiation service that can be used directly and without application-specific modifications is desirable in many realistic use-cases. Since TLS is one of the most popular current means of secure communication, several proposals have ...
- research-articleOctober 2016
On Information Leakage in Deduplicated Storage Systems
CCSW '16: Proceedings of the 2016 ACM on Cloud Computing Security WorkshopPages 61–72https://doi.org/10.1145/2996429.2996432Most existing cloud storage providers rely on data deduplication in order to significantly save storage costs by storing duplicate data only once. While the literature has thoroughly analyzed client-side information leakage associated with the use of ...
- research-articleMay 2015
Misbehavior in Bitcoin: A Study of Double-Spending and Accountability
ACM Transactions on Information and System Security (TISSEC), Volume 18, Issue 1Article No.: 2, Pages 1–32https://doi.org/10.1145/2732196Bitcoin is a decentralized payment system that relies on Proof-of-Work (PoW) to resist double-spending through a distributed timestamping service. To ensure the operation and security of Bitcoin, it is essential that all transactions and their order of ...
- research-articleNovember 2014
Quantifying Web-Search Privacy
CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications SecurityPages 966–977https://doi.org/10.1145/2660267.2660367Web search queries reveal extensive information about users' personal lives to the search engines and Internet eavesdroppers. Obfuscating search queries through adding dummy queries is a practical and user-centric protection mechanism to hide users' ...
- research-articleMay 2014
Microcomputations as Micropayments in Web-based Services
ACM Transactions on Internet Technology (TOIT), Volume 13, Issue 3Article No.: 8, Pages 1–23https://doi.org/10.1145/2611526In this article, we propose a new micropayment model for nonspecialized commodity web-services based on microcomputations. In our model, a user that wishes to access online content (offered by a website) does not need to register or pay to access the ...
- research-articleNovember 2013
Secure data deletion from persistent media
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 271–284https://doi.org/10.1145/2508859.2516699Secure deletion is the task of deleting data irrecoverably from a physical medium. In this work, we present a general approach to the design and analysis of secure deletion for persistent storage that relies on encryption and key wrapping. We define a ...
- research-articleFebruary 2013
For some eyes only: protecting online information sharing
CODASPY '13: Proceedings of the third ACM conference on Data and application security and privacyPages 1–12https://doi.org/10.1145/2435349.2435351End-users have become accustomed to the ease with which online systems allow them to exchange messages, pictures, and other files with colleagues, friends, and family. This con- venience, however, sometimes comes at the expense of hav- ing their data be ...
- research-articleDecember 2012
On physical-layer identification of wireless devices
ACM Computing Surveys (CSUR), Volume 45, Issue 1Article No.: 6, Pages 1–29https://doi.org/10.1145/2379776.2379782Physical-layer device identification aims at identifying wireless devices during radio communication by exploiting unique characteristics of their analog (radio) circuitry. This work systematizes the existing knowledge on this topic in order to enable a ...
- research-articleMay 2012
User-level secure deletion on log-structured file systems
ASIACCS '12: Proceedings of the 7th ACM Symposium on Information, Computer and Communications SecurityPages 63–64https://doi.org/10.1145/2414456.2414493Deleting a file from a storage medium serves two purposes: it reclaims storage resources and ensures that any sensitive information contained in the file becomes inaccessible. When done for the latter purpose, it is critical that the file is securely ...
- ArticleJuly 2011
On the practicality of UHF RFID fingerprinting: how real is the RFID tracking problem?
PETS'11: Proceedings of the 11th international conference on Privacy enhancing technologiesPages 97–116In this work, we demonstrate the practicality of people tracking by means of physical-layer fingerprints of RFID tags that they carry. We build a portable low-cost USRP-based RFID fingerprinter and we show, over a set of 210 EPC C1G2 tags, that this ...
- research-articleJuly 2011
Home is safer than the cloud!: privacy concerns for consumer cloud storage
SOUPS '11: Proceedings of the Seventh Symposium on Usable Privacy and SecurityArticle No.: 13, Pages 1–20https://doi.org/10.1145/2078827.2078845Several studies ranked security and privacy to be major areas of concern and impediments of cloud adoption for companies, but none have looked into end-users' attitudes and practices. Not much is known about consumers' privacy beliefs and expectations ...
- research-articleMarch 2011
Pay as you browse: microcomputations as micropayments in web-based services
WWW '11: Proceedings of the 20th international conference on World wide webPages 307–316https://doi.org/10.1145/1963405.1963451Currently, several online businesses deem that advertising revenues alone are not sufficient to generate profits and are therefore set to charge for online content. In this paper, we explore a complement to the current advertisement model; more ...
- research-articleMay 2004
The Security and Privacy of Smart Vehicles
IEEE Security and Privacy (IEEE-SEC-PRIVACY), Volume 2, Issue 3Pages 49–55https://doi.org/10.1109/MSP.2004.26Road safety, traffic management, and driver convenience continue to improve, in large part thanks to appropriate usage of information technology. But this evolution has deep implications for security and privacy, which the research community has ...