Learn More
Censorship-circumvention tools are in an arms race against censors. The censors study all traffic passing into and out of their controlled sphere, and try to disable censorship-circumvention tools without completely shutting down the Internet. Tools aim to shape their traffic patterns to match unblocked programs, so that simple traffic profiling cannot(More)
—cMix is a cryptographic protocol for mix networks that uses precomputations of a group-homomorphic encryption function to avoid all real-time public-key operations by the senders, mix nodes, and receivers. Like other mix network protocols, cMix can enable an anonymity service that accepts inputs from senders and delivers them to an output buffer, in a way(More)
In many communication scenarios it is not sufficient to protect only the content of the communication, it is necessary to also protect the identity of communicating parties. Various protocols and technologies have been proposed to offer such protection, for example, anonymous proxies, mix-networks, or onion routing. The protocol that offers the strongest(More)
The Internet of Things (IoT) is a ubiquitous system that incorporates not only the current Internet of computers, but also smart objects and sensors. IoT technologies often rely on centralised architectures that follow the current business models. This makes efficient data collection and processing possible, which can be beneficial from a business(More)
This paper presents a new approach for RFID tag attribute matching problem. Unlike previous approaches, most notably the T-Match protocol, presented in [9], we do not need a central database server or any connectiv-ity between readers. Furthermore, we do not need expensive homomorphic encryption or multiparty computation and we extend attribute matching to(More)
The paper shows approaches to formalizing the terms "symptom", "symptom-complex", "syndrome", "syndrome-complex" and their quantitative assessments for diagnosis of major renal diseases. The latter are chosen as their diagnosis based on a combination of a great deal of medical parameters, implies virtually all aspects of therapeutical diagnostic activity.(More)
BACKGROUND AND PURPOSE Whereas open radical prostatectomy is performed extraperitoneally, minimally invasive radical prostatectomy is typically performed within the peritoneal cavity. Our objective was to determine whether minimally invasive radical prostatectomy is associated with an increased risk of small bowel obstruction compared with open radical(More)
Cancer preventive services, when used appropriately, result in improved health, better quality of life and decreased costs. For these reasons, cancer preventive services represent important priorities within the Affordable Care Act (ACA). Among the many provisions to improve access to preventive services the ACA introduced Accountable Care Organizations(More)
DC-networks offer desirable properties for anonymous communication, but a practical implementation for large networks is challenging. Other approaches like Tor exist and are easier to use in large networks, but they do not provide strong anonymity. This thesis describes a design for a DC-network implementation that targets large networks. It does not offer(More)