MIT Libraries homeMIT Libraries logoDSpace@MIT

MIT
Search 
  • DSpace@MIT Home
  • Computer Science and Artificial Intelligence Lab (CSAIL)
  • Search
  • DSpace@MIT Home
  • Computer Science and Artificial Intelligence Lab (CSAIL)
  • Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 1-6 of 6

  • Sort Options:
  • Relevance
  • Title Asc
  • Title Desc
  • Issue Date Asc
  • Issue Date Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

Quantitative Information Flow as Network Flow Capacity 

McCamant, Stephen; Ernst, Michael D. (2007-12-10)
We present a new technique for determining how much information abouta program's secret inputs is revealed by its public outputs. Incontrast to previous techniques based on reachability from secretinputs (tainting), it ...
Thumbnail

Quantitative Information-Flow Tracking for C and Related Languages 

McCamant, Stephen; Ernst, Michael D. (2006-11-17)
We present a new approach for tracking programs' use of data througharbitrary calculations, to determine how much information about secretinputs is revealed by public outputs. Using a fine-grained dynamicbit-tracking ...
Thumbnail

Distribution Volume Tracking on Privacy-Enhanced Wireless Grid 

Uzuner, Ozlem (2004-07-25)
In this paper, we discuss a wireless grid in which users are highly mobile, and form ad-hoc and sometimes short-lived connections with other devices. As they roam through networks, the users may choose to employ ...
Thumbnail

Information Slicing: Anonymity Using Unreliable Overlays 

Katti, Sachin; Cohen, Jeffrey; Katabi, Dina (2007-02-23)
This paper proposes a new approach to anonymous communication called information slicing. Typically, anonymizers use onion routing, where a message is encrypted in layers with the public keys of the nodes along the path. ...
Thumbnail

Perfect Implementation of Normal-Form Mechanisms 

Izmalkov, Sergei; Lepinski, Matt; Micali, Silvio (2005)
Privacy and trust affect our strategic thinking, yet they have not been precisely modeled in mechanism design. In settings of incomplete information, traditional implementations of a normal-form mechanism ---by disregarding ...
Thumbnail

Keeping Secrets in Hardware: the Microsoft Xbox(TM) Case Study 

Huang, Andrew "bunnie" (2002-05-26)
This paper discusses the hardware foundations of the cryptosystem employed by the Xbox(TM) video game console from Microsoft. A secret boot block overlay is buried within a system ASIC. This secret boot block decrypts and ...

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CommunityBy Issue DateAuthorsTitlesSubjects

My Account

Login

Discover

AuthorErnst, Michael D. (2)McCamant, Stephen (2)Cohen, Jeffrey (1)Huang, Andrew "bunnie" (1)Izmalkov, Sergei (1)Katabi, Dina (1)Katti, Sachin (1)Lepinski, Matt (1)Micali, Silvio (1)Uzuner, Ozlem (1)Subject
Privacy (6)
AI (2)Confidentiality (2)Implicit flows (2)Information disclosure (2)Memcheck (2)Tainting (2)Valgrind (2)Cryptography (1)Intellectual Property Protection (1)... View MoreDate Issued2007 (2)2002 (1)2004 (1)2005 (1)2006 (1)Has File(s)Yes (6)

Statistics

OA StatisticsStatistics by CountryStatistics by Department
MIT Libraries homeMIT Libraries logo

Find us on

Twitter Facebook Instagram YouTube RSS

MIT Libraries navigation

SearchHours & locationsBorrow & requestResearch supportAbout us
PrivacyPermissionsAccessibility
MIT
Massachusetts Institute of Technology
Content created by the MIT Libraries, CC BY-NC unless otherwise noted. Notify us about copyright concerns.