• Publications
  • Influence
A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
Based on the nomenclature of the early papers in the field privacy by data minimization, we develop a terminology which is both expressive and precise. More particularly, we define anonymity,Expand
  • 667
  • 58
  • PDF
Attacks on Steganographic Systems
TLDR
We present both visual attacks, making use of the ability of humans to clearly discern between noise and visual patterns, and statistical attacks which are much easier to automate. Expand
  • 945
  • 54
  • PDF
Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology
TLDR
Based on the nomenclature of the early papers in the field, we propose a set of terminology which is both expressive and precise. Expand
  • 898
  • 50
  • PDF
How to Break the Direct RSA-Implementation of Mixes
TLDR
MIXes are a means of untraceable communication based on a public key cryptosystem, as published by David Chaum in 1981 (CACM 24/2, 84–88). Expand
  • 141
  • 10
ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead
TLDR
We present a technique, called ISDN-Mixes, which shows that this is not the case. Expand
  • 274
  • 9
The Disadvantages of Free MIX Routes and how to Overcome Them
TLDR
We compare two special configurations: a fixed MIX route used by all participants and a network of freely usable MIXes where each participant chooses his own route. Expand
  • 190
  • 9
  • PDF
Networks Without User Observability: Design Options
TLDR
In usual communication networks, the network operator or an intruder could easily observe when, how much and with whom the users communicate, even if the users employ end-to-end encryption. Expand
  • 174
  • 8
Information Hiding
TLDR
We propose an information theoretic approach to steganography, which allows one to describe the two basic issues, secrecy and robustness, in terms of mutual information. Expand
  • 140
  • 7
Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego , Jsteg , Steganos , and STools — and Some Lessons Learned
TLDR
We present both visual attacks, making use of the ability of humans to clearly discern between noise and visual patterns, and statistical attacks which are much easier to automate. Expand
  • 106
  • 7
  • PDF
Modeling the Security of Steganographic Systems
TLDR
We present a model of steganographic systems which allows to evaluate their security. Expand
  • 219
  • 6
  • PDF
...
1
2
3
4
5
...