Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
CAPSID: A Private Session ID System for Small UAVs
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 1791–1805https://doi.org/10.1145/3658644.3690324The US Federal Aviation Administration (FAA) has recently mandated that small unmanned aerial vehicles (UAVs) be equipped with a transmitter that broadcasts the UAV's serial number, location, and altitude. The inclusion of a unique identifier in the form ...
- research-articleDecember 2024
FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 4688–4702https://doi.org/10.1145/3658644.3670321Attribute-Based Encryption (ABE) provides fine-grained access control to encrypted data and finds applications in various domains. The practicality of ABE schemes hinges on the balance between security and efficiency. The state-of-the-art adaptive secure ...
- research-articleNovember 2024
Life Histories of Taboo Knowledge Artifacts
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 8, Issue CSCW2Article No.: 505, Pages 1–32https://doi.org/10.1145/3687044Communicating about some vital topics---such as sexuality and health---is treated as taboo and subjected to censorship. How can we construct knowledge about these topics? Wikipedia is home to numerous high-quality knowledge artifacts about taboo topics ...
- research-articleOctober 2024
Breaking On-Chip Communication Anonymity Using Flow Correlation Attacks
ACM Journal on Emerging Technologies in Computing Systems (JETC), Volume 20, Issue 4Article No.: 12, Pages 1–27https://doi.org/10.1145/3677034Network-on-chip (NoC) is widely used to facilitate communication between components in sophisticated system-on-chip (SoC) designs. Security of the on-chip communication is crucial because exploiting any vulnerability in shared NoC would be a goldmine for ...
- research-articleAugust 2024
-
- research-articleJuly 2024
Let the Users Choose: Low Latency or Strong Anonymity? Investigating Mix Nodes with Paired Mixing Techniques
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 2, Pages 1–11https://doi.org/10.1145/3664476.3664516Current anonymous communication systems either provide strong anonymity with significant delay or low latency with unreliable anonymity. This division leads to smaller user bases and reduced anonymity as users choose systems based on their specific ...
- research-articleJuly 2024
Compromising anonymity in identity-reserved k-anonymous datasets through aggregate knowledge
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 6, Pages 1–12https://doi.org/10.1145/3664476.3664489Data processors increasingly rely on external data sources to improve strategic or operational decision taking. Data owners can facilitate this by releasing datasets directly to data processors or doing so indirectly via data spaces. As data processors ...
- ArticleJuly 2024
Threshold Ring Signatures with Accountability
Information Security and PrivacyPages 368–388https://doi.org/10.1007/978-981-97-5025-2_19AbstractThreshold ring signatures (TRS) allow several signers to sign the same message on behalf of a group. This scheme is fully anonymity in that a signature reveals the number of signers who created the signature but tells nothing about the identity of ...
- research-articleJuly 2024
Designated Verifier Signature with Repudiability
APKC '24: Proceedings of the 11th ACM Asia Public-Key Cryptography WorkshopPages 32–41https://doi.org/10.1145/3659467.3659901Designated Verifier Signature (DVS) is an extension of digital signature that allows the specification of the verifier. This feature is realized by granting the designated verifier the privilege of simulating a valid signature, thereby virtually ...
- research-articleJuly 2024
Transferable, Auditable and Anonymous Ticketing Protocol
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityPages 1911–1927https://doi.org/10.1145/3634737.3645008Digital ticketing systems typically offer ticket purchase, refund, validation, and, optionally, anonymity of users. However, it would be interesting for users to transfer their tickets, as is currently done with physical tickets. We propose Applause, a ...
- research-articleJune 2024
CLAM: Client-Aware Routing in Mix Networks
IH&MMSec '24: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia SecurityPages 199–209https://doi.org/10.1145/3658664.3659631Mix networks (mixnets) enhance anonymity at the cost of increased end-to-end latency, deterring clients from adopting mixnets for web browsing or instant messaging. This often leads clients to seek alternative anonymous communication systems, potentially ...
- research-articleSeptember 2024
Academic Data Privacy-Preserving using Centralized and Distributed Systems: A Comparative Study
BDSIC '24: Proceedings of the 2024 6th International Conference on Big-data Service and Intelligent ComputationPages 8–16https://doi.org/10.1145/3686540.3686542Data privacy has become a critical concern in a set of domains, including healthcare, education, traffic monitoring, etc., due to technology's high deployment and massive data collection. In education, academic institutions have started taking several ...
- research-articleJune 2024
Jointly Preserving Subject and Object Anonymity in Nearby Friends Querying for Curious Service Providers
AICCONF '24: Proceedings of the Cognitive Models and Artificial Intelligence ConferencePages 20–24https://doi.org/10.1145/3660853.3660857This work studies the urban area location privacy preserving location updates and nearby friends (NF) querying for the centralized proximity based services (PBSs). The urban area constraint forces the user mobility to be on the city road network, ...
- research-articleApril 2024
Investigating the Possibility of Using an AR Mask to Support Online Psychological Counseling
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 8, Issue CSCW1Article No.: 78, Pages 1–33https://doi.org/10.1145/3637355Mental health problems are prevalent issues in modern society. While psychological counseling has been a traditional solution, it faces such barriers as negative societal perceptions and limited accessibility. To overcome these, researchers have explored ...
- keynoteMarch 2024
What I Learned from Spending a Dozen Years in the Dark Web
WSDM '24: Proceedings of the 17th ACM International Conference on Web Search and Data MiningPages 2–3https://doi.org/10.1145/3616855.3637632Founded in 2011, Silk Road was the first online anonymous marketplace, in which buyers and sellers could transact with anonymity guarantees far superior to those available in online or offline alternatives, thanks to the innovative use of ...
- posterNovember 2023
Poster: Metadata-private Messaging without Coordination
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 3615–3617https://doi.org/10.1145/3576915.3624385Metadata-private messaging (MPM) refers to an end-to-end encrypted messaging system that protects not just the payload messages but also the privacy-revealing communication metadata, such as user identities, conversation frequencies, traffic volumes, ...
- research-articleOctober 2023
Taboo and Collaborative Knowledge Production: Evidence from Wikipedia
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 7, Issue CSCW2Article No.: 299, Pages 1–25https://doi.org/10.1145/3610090By definition, people are reticent or even unwilling to talk about taboo subjects. Because subjects like sexuality, health, and violence are taboo in most cultures, important information on each of these subjects can be difficult to obtain. Are peer ...
- research-articleSeptember 2023
Decentralized Inverse Transparency with Blockchain
Distributed Ledger Technologies: Research and Practice (DLT), Volume 2, Issue 3Article No.: 17, Pages 1–28https://doi.org/10.1145/3592624Employee data can be used to facilitate work, but their misusage may pose risks for individuals. Inverse transparency therefore aims to track all usages of personal data, allowing individuals to monitor them to ensure accountability for potential ...
- research-articleSeptember 2023
Bystanders Join in Cyberbullying on Social Networking Sites: The Deindividuation and Moral Disengagement Perspectives
Information Systems Research (INFORMS-ISR), Volume 34, Issue 3Pages 828–846https://doi.org/10.1287/isre.2022.1161Bystanders Join in Cyberbullying on Social Networking Sites: The Deindividuation and Moral Disengagement Perspectives
Cyberbullying on social networking sites escalates when bystanders join in the bullying. Bystanders’ joining-in behaviors reinforce the ...
Cyberbullying on social networking sites (SNSs) escalates when bystanders join in the bullying. Although researchers have recognized the harmful consequences of joining in cyberbullying behaviors, little is known about the role of information technology (...
- research-articleAugust 2023
Effect of Group Based Synchronization on User Anonymity in Mix Networks
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and SecurityArticle No.: 146, Pages 1–9https://doi.org/10.1145/3600160.3604998In so-called closed environments, the MIX network can theoretically provide perfect security, i.e. if perfect protection is envisaged, all senders and receivers should be perfectly synchronized and participate equally in each communication round of the ...