• Publications
  • Influence
SplitBox: Toward Efficient Private Network Function Virtualization
TLDR
This paper presents SplitBox, an efficient system for privacy-preserving processing of network functions that are outsourced as software processes to the cloud. Expand
  • 32
  • 6
  • PDF
Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning
TLDR
We show how current privacy preserving tools are ineffective in finding the right balance between blocking tracking JavaScript programs and allowing functional JavaScript code. Expand
  • 44
  • 5
  • PDF
Private Processing of Outsourced Network Functions: Feasibility and Constructions
TLDR
We present a cryptographic treatment of privacy-preserving outsourcing of network functions, introducing security definitions as well as an abstract model of generic network functions and propose a few instantiations using partial homomorphic encryption. Expand
  • 28
  • 5
  • PDF
Mobility Independent Secret Key Generation for Wearable Health-care Devices
TLDR
We study the effectiveness of combining dual antennas and frequency diversity for obtaining uncorrelated channel samples to improve entropy and bit rate in static channel conditions. Expand
  • 29
  • 4
  • PDF
Cryptanalysis of the convex hull click human identification protocol
TLDR
We analyze the security of this convex hull-based human identification protocol. Expand
  • 29
  • 2
  • PDF
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm
TLDR
We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. Expand
  • 26
  • 2
  • PDF
Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case
TLDR
We study the feasibility of touch gesture behavioural biometrics for implicit authentication of users on smart glasses by proposing a continuous authentication system using two classifiers: SVM with RBF kernel, and a new classifier based on Chebyshev’s concentration inequality. Expand
  • 19
  • 2
  • PDF
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices
TLDR
In this paper, we take a closer look at different ways from algebra, lattices, and coding theory to obtain the secret from a system of linear congruences. Expand
  • 10
  • 1
  • PDF
Gesture-based Continuous Authentication for Wearable Devices: the Google Glass Case
TLDR
We study the feasibility of touch gesture behavioural biometrics for implicit authentication of users on a smartglass (Google Glass) by proposing a continuous authentication system using two classifiers: SVM with RBF kernel, and a new classifier based on Chebyshev's concentration inequality. Expand
  • 10
  • 1
  • PDF
Private Continual Release of Real-Valued Data Streams
TLDR
We present a differentially private mechanism to display statistics (e.g., the moving average) of a stream of real valued observations where the bound on each observation is either too conservative or unknown in advance. Expand
  • 6
  • 1
  • PDF