Search
Now showing items 1-6 of 6
Information Slicing: Anonymity Using Unreliable Overlays
(2007-02-23)
This paper proposes a new approach to anonymous communication called information slicing. Typically, anonymizers use onion routing, where a message is encrypted in layers with the public keys of the nodes along the path. ...
Quantitative Information-Flow Tracking for C and Related Languages
(2006-11-17)
We present a new approach for tracking programs' use of data througharbitrary calculations, to determine how much information about secretinputs is revealed by public outputs. Using a fine-grained dynamicbit-tracking ...
Distribution Volume Tracking on Privacy-Enhanced Wireless Grid
(2004-07-25)
In this paper, we discuss a wireless grid in which users are highly mobile, and form ad-hoc and sometimes short-lived connections with other devices. As they roam through networks, the users may choose to employ ...
Quantitative Information Flow as Network Flow Capacity
(2007-12-10)
We present a new technique for determining how much information abouta program's secret inputs is revealed by its public outputs. Incontrast to previous techniques based on reachability from secretinputs (tainting), it ...
Keeping Secrets in Hardware: the Microsoft Xbox(TM) Case Study
(2002-05-26)
This paper discusses the hardware foundations of the cryptosystem employed by the Xbox(TM) video game console from Microsoft. A secret boot block overlay is buried within a system ASIC. This secret boot block decrypts and ...
Perfect Implementation of Normal-Form Mechanisms
(2005)
Privacy and trust affect our strategic thinking, yet they have not been precisely modeled in mechanism design. In settings of incomplete information, traditional implementations of a normal-form mechanism ---by disregarding ...