Learn More
Censorship-circumvention tools are in an arms race against censors. The censors study all traffic passing into and out of their controlled sphere, and try to disable censorship-circumvention tools without completely shutting down the Internet. Tools aim to shape their traffic patterns to match unblocked programs, so that simple traffic profiling cannot(More)
cMix is a suite of cryptographic protocols that can replace today's dominant chat systems, offering superior confidentiality and anonymity, while providing comparable performance to users. cMix permutes batches of uniform-length messages through a fixed cascade of nodes and moves all expensive public-key operations into precomputations that can be carried(More)
In many communication scenarios it is not sufficient to protect only the content of the communication, it is necessary to also protect the identity of communicating parties. Various protocols and technologies have been proposed to offer such protection, for example, anonymous proxies, mix-networks, or onion routing. The protocol that offers the strongest(More)
The Internet of Things (IoT) is a ubiquitous system that incorporates not only the current Internet of computers, but also smart objects and sensors. IoT technologies often rely on centralised architectures that follow the current business models. This makes efficient data collection and processing possible, which can be beneficial from a business(More)
This paper presents a new approach for RFID tag attribute matching problem. Unlike previous approaches, most notably the T-Match protocol, presented in [9], we do not need a central database server or any connectiv-ity between readers. Furthermore, we do not need expensive homomorphic encryption or multiparty computation and we extend attribute matching to(More)
DC-networks offer desirable properties for anonymous communication, but a practical implementation for large networks is challenging. Other approaches like Tor exist and are easier to use in large networks, but they do not provide strong anonymity. This thesis describes a design for a DC-network implementation that targets large networks. It does not offer(More)
Processes that are far both from equilibrium and from phase transition are studied. It is shown that a process with mean velocity that exhibits power-law growth in time can be analyzed using the Langevin equation with multiplicative noise. The solution to the corresponding Fokker-Planck equation is derived. Results of the numerical solution of the Langevin(More)
  • 1