• Publications
  • Influence
Hierarchical Mobile IPv6 Mobility Management (HMIPv6)
TLDR
This document introduces extensions to Mobile IPv6 and IPv6 Neighbour Discovery to allow for local mobility handling and defines an Experimental Protocol for the Internet community. Expand
Differentiation mechanisms for IEEE 802.11
TLDR
This work presents three service differentiation schemes for IEEE 802.11 based on scaling the contention window according to the priority of each flow or user, and simulates and analyzes the performance of each scheme with TCP and UDP flows. Expand
Efficient aggregation of encrypted data in wireless sensor networks
TLDR
This paper proposes a simple and provably secure additively homomorphic stream cipher that allows efficient aggregation of encrypted data and shows that aggregation based on this cipher can be used to efficiently compute statistical values such as mean, variance and standard deviation of sensed data, while achieving significant bandwidth gain. Expand
I Have a DREAM! (DiffeRentially privatE smArt Metering)
This paper presents a new privacy-preserving smart metering system. Our scheme is private under the differential privacy model and therefore provides strong and provable guarantees.With our scheme,Expand
Hierarchical Mobile IPv6 (HMIPv6) Mobility Management
TLDR
This document introduces extensions to Mobile IPv6 and IPv6 Neighbour Discovery to allow for local mobility handling and the Mobility Anchor Point (MAP) described in this document can also be used to improve the performance of Mobile IPv 6 in terms of handover speed. Expand
Extending SAT Solvers to Cryptographic Problems
TLDR
A new approach to solving cryptographic problems by adapting both the problem description and the solver synchronously instead of tweaking just one of them is presented, which was able to solve a well-researched stream cipher 26 times faster than was previously possible. Expand
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
TLDR
This article proposes a simple and provably secure encryption scheme that allows efficient additive aggregation of encrypted data and constructs an end-to-end aggregate authentication scheme that is secure against outsider-only attacks, based on the indistinguishability property of a pseudorandom function (PRF), a standard cryptographic primitive. Expand
Differentially private sequential data publication via variable-length n-grams
TLDR
A variable-length n-gram model is employed, which extracts the essential information of a sequential database in terms of a set of variable- length n- grams, and a solution for generating a synthetic database, which enables a wider spectrum of data analysis tasks. Expand
Adaptive Password-Strength Meters from Markov Models
TLDR
This paper presents the concept of adaptive password strength meters that estimate password strength using Markov-models and proposes a secure implementation that greatly improves on the accuracy of current techniques. Expand
Differentially Private Histogram Publishing through Lossy Compression
TLDR
This paper proposes two sanitization techniques that exploit the inherent redundancy of real-life datasets in order to boost the accuracy of histograms and lossily compress the data and sanitize the compressed data. Expand
...
1
2
3
4
5
...