Learn More
Censorship-circumvention tools are in an arms race against censors. The censors study all traffic passing into and out of their controlled sphere, and try to disable censorship-circumvention tools without completely shutting down the Internet. Tools aim to shape their traffic patterns to match unblocked programs, so that simple traffic profiling cannot(More)
—cMix is a cryptographic protocol for mix networks that uses precomputations of a group-homomorphic encryption function to avoid all real-time public-key operations by the senders, mix nodes, and receivers. Like other mix network protocols, cMix can enable an anonymity service that accepts inputs from senders and delivers them to an output buffer, in a way(More)
In many communication scenarios it is not sufficient to protect only the content of the communication, it is necessary to also protect the identity of communicating parties. Various protocols and technologies have been proposed to offer such protection, for example, anonymous proxies, mix-networks, or onion routing. The protocol that offers the strongest(More)
The Internet of Things (IoT) is a ubiquitous system that incorporates not only the current Internet of computers, but also smart objects and sensors. IoT technologies often rely on centralised architectures that follow the current business models. This makes efficient data collection and processing possible, which can be beneficial from a business(More)
Processes that are far both from equilibrium and from phase transition are studied. It is shown that a process with mean velocity that exhibits power-law growth in time can be analyzed using the Langevin equation with multiplicative noise. The solution to the corresponding Fokker-Planck equation is derived. Results of the numerical solution of the Langevin(More)
This paper presents a new approach for RFID tag attribute matching problem. Unlike previous approaches, most notably the T-Match protocol, presented in [9], we do not need a central database server or any connectiv-ity between readers. Furthermore, we do not need expensive homomorphic encryption or multiparty computation and we extend attribute matching to(More)
DC-networks offer desirable properties for anonymous communication, but a practical implementation for large networks is challenging. Other approaches like Tor exist and are easier to use in large networks, but they do not provide strong anonymity. This thesis describes a design for a DC-network implementation that targets large networks. It does not offer(More)
  • 1