Publications

DeVoS: Deniable Yet Verifiable Vote Updating

Author(s)
Müller, Johannes, Pejó, Balázs, Pryvalov, Ivan
Type
Conference Proceeding refering
Year of publication
2024
Source
Proceedings on Privacy Enhancing Technologies, S. 357 - 378
URL
https://petsymposium.org/popets/2024/popets-2024-0021.pdf
DOI
https://doi.org/10.56553/popets-2024-0021

OCEL (Object-Centric Event Log) 2.0 Specification

Author(s)
Berti, Alessandro, Koren, Istvan, Adams, Jan Niklas, Park, Gyunam, Knopp, Benedikt, Graves, Nina, Rafiei, Majid, Liß, Lukas, Tacke Genannt Unterberg, Leah, Zhang, Yisong, Schwanen, Christopher, Pegoraro, Marco, Aalst, Wil van der
Type
Scientific Article ref.
Year of publication
2024
Source
arXiv, S. 1 - 49
URL
https://arxiv.org/abs/2403.01975

Security and Performance Implications of BGP Rerouting-resistant Guard Selection Algorithms for Tor

Author(s)
Mitseva, Asya, Alexandrova, Marharyta, Panchenko, Andriy
Type
Scientific Article ref.
Year of publication
2023
BGP routing attacks; Tor; Onion routing; Privacy; Traffic analysis
Source
Computers and Security
Volume
132
ISSN
1872-6208
0167-4048
DOI
https://doi.org/10.1016/j.cose.2023.103374

Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond

Author(s)
Bartsch, Witali, Gope, Prosanta, Kavun, Elif, Millwood, Owen, Panchenko, Andriy, Pasikhani, Aryan, Polian, Ilia
Type
Conference Proceeding refering
Year of publication
2023
Publisher name
SciTePress
Secure Processor Architecture; Secure IoT; Hardware Fingerprinting; PUFs; Attack-Resilient Hardware
Source
Proceedings of the 9th International Conference on Information Systems Security and Privacy ICISSP - Volume 1, S. 583 - 591
ISBN
978-989-758-624-8
DOI
https://doi.org/10.5220/0011726900003405

SoK: Secure E-Voting with Everlasting Privacy.

Author(s)
Haines, Thomas, Mosaheb, Rafieh, Müller, Johannes, Pryvalov, Ivan
Type
Conference Proceeding refering
Year of publication
2023
electronic voting; everlasting privacy; protocol analysis
Source
Thomas Haines, Rafieh Mosaheb, Johannes Müller, Ivan Pryvalov. "SoK: Secure E-Voting with Everlasting Privacy." In Proceedings on Privacy Enhancing Technologies (PoPETS), 2023., S. 279 - 293
DOI
https://doi.org/10.56553/popets-2023-0017

Reviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls

Author(s)
Moreno, José Miguel, Pastrana, Sergio, Reelfs, Jens Helge, Vallina, Pelayo, Panchenko, Andriy, Smaragdakis, Georgios, Hohlfeld, Oliver, Vallina-Rodriguez, Narseo, Tapiador, Juan
Type
Scientific Article ref.
Year of publication
2023
Side Channels; Disinformation; Propaganda; User-Generated Content; Russia; Ukraine; Tripadvisor; Google Maps; VKontakte
URL
https://arxiv.org/abs/2302.00598
DOI
https://doi.org/10.48550/arXiv.2302.00598

Challenges and Pitfalls in Generating Representative ICS Datasets in Cyber Security Research

Author(s)
Mitseva, Asya, Thierse, Paul, Hoffmann, Harald, Er, Devran, Panchenko, Andriy
Editor(s)
Katsikas, Sokratis
Type
Conference Proceeding refering
Year of publication
2023
Publisher name
Cham : Springer International Publishing
Source
Computer Security, ESORICS 2022 International WorkshopsCyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022 Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers, S. 379 - 397
ISBN
978-3-031-25459-8
978-3-031-25460-4
DOI
https://doi.org/10.1007/978-3-031-25460-4_22
Lecture notes in computer science ; 13785

A Survey on Controller Area Network Reverse Engineering

Author(s)
Buscemi, Alessio, Turcanu, Ion, Castignani, German, Panchenko, Andriy, Engel, Thomas, Shin, Kang G.
Type
Scientific Article ref.
Year of publication
2023
Publisher name
IEEE
Can bus; reverse engineering; security; connected Vechiles
Source
IEEE Communications Surveys & Tutorials, S. 1445 - 1481
Volume
25
Issue/Journal number
3,3
ISSN
1553-877X
URL
https://ieeexplore.ieee.org/abstract/document/10092880
DOI
https://doi.org/10.1109/COMST.2023.3264928

Explorative Process Discovery Using Activity Projections

Author(s)
Zhang, Yisong, Aalst, Wil van der
Type
Conference Proceeding refering
Year of publication
2023
Publisher name
Springer, Cham
Process mining; Petri nets; Log projection; ProM
Source
International Conference on Applications and Theory of Petri Nets and Concurrency, PETRI NETS 2023, S. 229 - 239
ISBN
978-3-031-33619-5
978-3-031-33620-1
DOI
https://doi.org/10.1007/978-3-031-33620-1_13
Lecture Notes in Computer Science ; vol 13929

Robust principal component analysis based on discriminant information

Author(s)
Gao, Yunlong, Lin, Tingting, Zhang, Yisong, Luo, Sizhe, Nie, Feiping
Type
Conference Proceeding refering
Year of publication
2023
Publisher name
IEEE
Principal component analysis; entropy regularization; robustness
Source
IEEE Transactions on Knowledge and Data Engineering, S. 1991 - 2003
DOI
https://doi.org/10.1109/TKDE.2021.3093447

A Framework for Service-Oriented Architecture (SOA)-Based IoT Application Development

Author(s)
Giao, Joao, Nazarenko, Artem, Luis-Ferreira, Fernando, Gonçalves, Diogo, Sarraipa, Joao
Type
Scientific Article ref.
Year of publication
2022
application programming interfaces; Internet of Things; interoperability; middleware; modular construction
Source
Processes, S. 1 - 25
Volume
10
Issue/Journal number
9
ISSN
2227-9717
URL
https://www.mdpi.com/2227-9717/10/9/1782
DOI
https://doi.org/10.3390/pr10091782

Zero-defect manufacturing terminology standardization: Definition, improvement, and harmonization

Author(s)
Sousa, João, Nazarenko, Artem, Grunewald, Christian, Psarommatis, Foivos, Fraile, Francisco, Meyer, Olga, Sarraipa, João
Type
Scientific Article ref.
Year of publication
2022
zero-defect manufacturing (ZDM); terminology; industrie 4.0; quality management system; inspection
Source
Frontiers in Manufacturing Technology
Volume
2
ISSN
2813-0359
DOI
https://doi.org/10.3389/fmtec.2022.947474

Data Volume Reduction for Deep Packet Inspection by Multi-layer Application Determination

Author(s)
Vogel, Michael, Schuster, Franka, Kopp, Fabian Malte, König, Hartmut
Type
Conference Proceeding refering
Year of publication
2022
Publisher name
IEEE
Source
2022 IEEE International Conference on Cyber Security and Resilience (CSR), 27-29 July 2022, Rhodes, Greece
ISBN
978-1-6654-9952-1
978-1-6654-9953-8
URL
https://ieeexplore.ieee.org/abstract/document/9850293
DOI
https://doi.org/10.1109/CSR54599.2022.9850293

KI-basierte Angriffserkennung: Von der Blackbox zum verständlichen System

Author(s)
Schuster, Franka, Larisch, René
Type
Conference Proceeding refering
Year of publication
2022
Source
54. Kraftwerkstechni­sches Kolloquium 2022
URL
https://tu-dresden.de/ing/maschinenwesen/ifvu/evt/kraftwerkstechnisches-kolloquium/54-kraftwerkstechnisches-kolloquium-2022-1

A Framework for Constructing Single Secret Leader Election from MPC.

Author(s)
Backes, Michael, Berrang, Pascal, Hanzlik, Lucjan, Pryvalov, Ivan
Type
Conference Proceeding refering
Year of publication
2022
Publisher name
Springer
Source
Michael Backes, Pascal Berrang, Lucjan Hanzlik, Ivan Pryvalov. "A Framework for Constructing Single Secret Leader Election from MPC." In Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part II, pp.672-691, Springer., S. 672 - 691
URL
https://link.springer.com/chapter/10.1007/978-3-031-17146-8_33
DOI
https://doi.org/10.1007/978-3-031-17146-8_33
LNCS, volume 13555

CUMUL & Co: High-Impact Artifacts for Website Fingerprinting Research

Author(s)
Pennekamp, Jan, Henze, Martin, Zinnen, Andreas, Lanze, Fabian, Wehrle, Klaus, Panchenko, Andriy
Type
Conference Proceeding refering
Year of publication
2022
Traffic Analysis;Website Fingerprinting; Privacy; Anonymous Communication; Onion Routing; Web Privacy
Source
38th Annual Computer Security Applications Conference (ACSAC 2022), Austin, Texas, USA, December 5-9, 2022.
URL
https://www.acsac.org/2022/program/artifacts_competition/

POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages

Author(s)
Mitseva, Asya, Pennekamp, Jan, Lohmöller, Johannes, Ziemann, Torsten, Hoerchner, Carl, Wehrle, Klaus, Panchenko, Andriy
Type
Conference Proceeding refering
Year of publication
2021
Publisher name
New York : ACM Press
Source
Proceedings of the 28th ACM Conference on Computer and Communications Security (ACM CCS 2021), Seoul, Virtual Event, South Korea, November 2021, S. 2411 - 2413
ISBN
978-1-4503-8454-4
DOI
https://doi.org/10.1145/3460120.3485347

WhisperChord: Scalable and Secure Node Discovery for Overlay Networks

Author(s)
Panchenko, Andriy, Mitseva, Asya, Knabe, Sara
Type
Conference Proceeding refering
Year of publication
2021
Publisher name
IEEE
Source
IEEE 46th Conference on Local Computer Networks (LCN), Edmonton, AB, Canada, 4-7 Oct. 2021, S. 170 - 177
ISBN
978-1-6654-1886-7
978-1-6654-4800-0
DOI
https://doi.org/10.1109/LCN52139.2021.9525008

GuardedGossip: Secure and Anonymous Node Discovery in Untrustworthy Networks

Author(s)
Panchenko, Andriy, Mitseva, Asya, Ziemann, Torsten, Hering, Till
Type
Conference Proceeding refering
Year of publication
2021
Publisher name
Cham : Springer
Node lookup; DHT; Tor; Onion routing; Anonymity
Source
Security and Privacy in Communication Networks : 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part I, S. 123 - 143
ISBN
978-3-030-90018-2
DOI
https://doi.org/10.1007/978-3-030-90019-9_7
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Demo: Traffic Splitting for Tor – A Defense against Fingerprinting Attacks

Author(s)
Reuter, Sebastian, Hiller, Jens, Pennekamp, Jan, Panchenko, Andriy, Wehrle, Klaus
Type
Conference Proceeding refering
Year of publication
2021
Onion Routing; Website Fingerprinting; Multipath Traffic; Privacy
Source
Conference on Networked Systems 2021 (NetSys 2021)
DOI
https://doi.org/10.14279/tuj.eceasst.80.1151.1128

Trustless, Censorship-Resilient and Scalable Votings in the Permission-Based Blockchain Model

Author(s)
Gajek, Sebastian, Lewandowsky, Marco
Type
Conference Proceeding refering
Year of publication
2021
Publisher name
Springer
Voting; Functional encryption; Blockchain; Hyperledger
Source
Euro-Par 2020 International Workshops, Warsaw, Poland, August 24–25, 2020, Revised Selected Papers, S. 54 - 65
ISBN
978-3-030-71592-2
978-3-030-71593-9
DOI
https://doi.org/10.1007/978-3-030-71593-9_5
Lecture Notes in Computer Science (LNCS) ; volume 12480

Discriminant analysis based on reliability of local neighborhood

Author(s)
Gao, Yunlong, Zhang, Yisong, Pan, Jinyan, Luo, Sizhe, Yang, Chengyu
Type
Scientific Article ref.
Year of publication
2021
Dimensionality reduction; Discriminant analysis; Manifold learning; Graph learning; Adjacency factor
Source
Expert Systems with Applications
Volume
175
ISSN
1873-6793
0957-4174
DOI
https://doi.org/10.1016/j.eswa.2021.114790

Robust PCA Using Adaptive Probability Weighting

Author(s)
Gao, Yunlong, Luo, Si-Zhe, Pan, Jin-Yan, Chen, Bai-Hua, Zhang, Yi-Song
Type
Scientific Article ref.
Year of publication
2021
Principle component analysis (PCA); weighted principal component analysis (WPCA); dimensionality reduction; robustness
Source
Acta Automatica Sinica, S. 825 - 838
Volume
47
Issue/Journal number
4
ISSN
0254-4156
DOI
https://doi.org/10.16383/j.aas.c180743

Analyzing PeerFlow - A Bandwidth Estimation System for Untrustworthy Environments

Author(s)
Mitseva, Asya, Engel, Thomas, Panchenko, Andriy
Editor(s)
Reinhardt, Delphine, Langweg, Hanno, Witt, Bernhard C., Fischer, Mathias
Type
Conference Proceeding refering
Year of publication
2020
Publisher name
Bonn : Gesellschaft für Informatik
Source
Sicherheit 2020 : Sicherheit, Schutz und Zuverlässigkeit ; Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) ; 17.- 20. März 2020 in Göttingen, S. 29 - 40
ISBN
978-3-88579-695-4
DOI
https://doi.org/10.18420/sicherheit2020_02
GI-Edition / Proceedings ; Volume P-301
Lecture notes in informatics

Security and Performance Implications of BGP Rerouting-resistant Guard Selection Algorithms for Tor

Author(s)
Mitseva, Asya, Aleksandrova, Marharyta, Engel, Thomas, Panchenko, Andriy
Type
Conference Proceeding refering
Year of publication
2020
Publisher name
Cham : Springer
Source
ICT Systems Security and Privacy Protection : 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21–23, 2020, S. 219 - 233
ISBN
978-3-030-58201-2
978-3-030-58200-5
DOI
https://doi.org/10.1007/978-3-030-58201-2_15
IFIP Advances in Information and Communication Technology book series IFIPAICT ; volume 580

TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting

Author(s)
De la Cadena, Wladimir, Mitseva, Asya, Hiller, Jens, Pennekamp, Jan, Reuter, Sebastian, Filter, Julian, Engel, Thomas, Wehrle, Klaus, Panchenko, Andriy
Type
Conference Proceeding refering
Year of publication
2020
Publisher name
New York : Association for Computing Machinery
Traffic Analysis; Website Fingerprinting; Privacy; Anonymous Communication; Onion Routing; Web Privacy
Source
CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, October 2020, S. 1971 - 1985
ISBN
978-1-4503-7089-9
DOI
https://doi.org/10.1145/3372297.3423351

Out-of-the-box Multipath TCP as a Tor Transport Protocol: Performance and Privacy Implications

Author(s)
De la Cadena, Wladimir, Kaiser, Daniel, Panchenko, Andriy, Engel, Thomas
Type
Conference Proceeding refering
Year of publication
2020
Source
2020 IEEE 19th International Symposium on Network Computing and Applications (NCA), 24-27 Nov. 2020, Cambridge, MA, USA
ISBN
978-1-7281-8326-8
978-1-7281-8327-5
DOI
https://doi.org/10.1109/NCA51143.2020.9306702

Local Neighborhood Reliability Weighted Support Vector Machine

Author(s)
Gao, Yunlong, Zhang, Yisong, Chen, Baihua, Xiong, Yuhui
Type
conference publication
Year of publication
2020
Publisher name
IEEE
SVM; margin; local neighbor; adjacency factor; outlier
Source
2020 2nd International Conference on Industrial Artificial Intelligence (IAI), S. 1 - 6
ISBN
978-1-7281-8216-2
978-1-7281-8217-9
DOI
https://doi.org/10.1109/IAI50351.2020.9262215

Terrorist Video Detection System Based on Faster R-CNN and LightGBM

Author(s)
Yi, Chao, Wu, Shunxiang, Xi, Bin, Ming, Daodong, Zhang, Yisong, Zhou, Zhenwen
Type
Conference Proceeding refering
Year of publication
2020
Source
CSAE '20: Proceedings of the 4th International Conference on Computer Science and Application Engineering, S. 1 - 8
ISBN
978-1-4503-7772-0
URL
https://dl.acm.org/doi/abs/10.1145/3424978.3425121
DOI
https://doi.org/10.1145/3424978.3425121

Analysis of Multi-path Onion Routing-based Anonymization Networks

Author(s)
De la Cadena, Wladimir, Kaiser, Daniel, Mitseva, Asya, Panchenko, Andriy, Engel, Thomas
Editor(s)
Foley, Simon N.
Type
Conference Proceeding refering
Year of publication
2019
Publisher name
Frankfurt am Main : Springer
Source
Data and Applications Security and Privacy XXXIII : 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15–17, 2019, Proceedings, S. 240 - 258
ISBN
978-3-030-22478-3
978-3-030-22479-0
URL
https://link.springer.com/book/10.1007%2F978-3-030-22479-0
DOI
https://doi.org/10.1007/978-3-030-22479-0_13
Lecture Notes in Computer Science book series ; volume 11559

Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing

Author(s)
Pennekamp, Jan, Hiller, Jens, Reuter, Sebastian, De la Cadena, Wladimir, Mitseva, Asya, Henze, Martin, Engel, Thomas, Wehrle, Klaus, Panchenko, Andriy
Type
Conference Proceeding refering
Year of publication
2019
Publisher name
IEEE Press
Source
Proceedings of the 27th annual IEEE International Conference on Network Protocols (Poster) (IEEE ICNP 2019), Chicago, Illinois, USA, October 2019
ISBN
978-1-7281-2700-2
978-1-7281-2701-9
URL
https://ieeexplore.ieee.org/document/8888029
DOI
https://doi.org/10.1109/ICNP.2019.8888029

Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup.

Author(s)
Backes, Michael, Hanzlik, Lucjan, Herzberg, Amir, Kate, Aniket, Pryvalov, Ivan
Editor(s)
Lin, Dongdai
Type
Conference Proceeding refering
Year of publication
2019
Publisher name
Springer
Source
Public-Key Cryptography – PKC 2019 : 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, S. 286 - 313
URL
https://link.springer.com/chapter/10.1007/978-3-030-17253-4_10#Abs1
DOI
https://doi.org/10.1007/978-3-030-17253-4_10

Hi Doppelgänger: Towards Detecting Manipulation in News Comments

Author(s)
Pennekamp, Jan, Henze, Martin, Hohlfeld, Oliver, Panchenko, Andriy
Type
Conference Proceeding refering
Year of publication
2019
Publisher name
New York : ACM
Source
Companion Proceedings of the 2019 World Wide Web Conference (WWW '19 Companion), 4th Workshop on Computational Methods in Online Misbehavior (CyberSafety '19), May 13–17, 2019, San Francisco, CA, USA, S. 197 - 205
ISBN
978-1-4503-6675-5
DOI
https://doi.org/10.1145/3308560.3316496

Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments

Author(s)
Hiller, Jens, Pennekamp, Jan, Dahlmanns, Markus, Henze, Martin, Panchenko, Andriy, Wehrle, Klaus
Type
Conference Proceeding refering
Year of publication
2019
Publisher name
IEEE Press
Routing, Internet of Things, Protocols, Cryptography, Servers
Source
Proceedings of the 27th annual IEEE International Conference on Network Protocols (IEEE ICNP 2019), Chicago, Illinois, USA, October 2019
ISBN
978-1-7281-2700-2
978-1-7281-2701-9
URL
https://ieeexplore.ieee.org/document/8888033
DOI
https://doi.org/10.1109/ICNP.2019.8888033

POSTER: Traffic Splitting to Counter Website Fingerprinting

Author(s)
De La Cadena, Wladimir, Mitseva, Asya, Pennekamp, Jan, Hiller, Jens, Lanze, Fabian, Engel, Thomas, Wehrle, Klaus, Panchenko, Andriy
Type
Conference Proceeding refering
Year of publication
2019
Publisher name
New York : ACM Press
Source
CCS '19 Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK, November 11 - 15, 2019., S. 2533 - 2535
ISBN
978-1-4503-6747-9
URL
https://dl.acm.org/citation.cfm?doid=3319535.3363249
DOI
https://doi.org/10.1145/3319535.3363249

The state of affairs in BGP security: A survey of attacks and defenses

Author(s)
Mitseva, Asya, Panchenko, Andriy, Engel, Thomas
Type
Scientific Article ref.
Year of publication
2018
Source
Computer Communications, S. 45 - 60
Volume
124
ISSN
0140-3664
DOI
https://doi.org/10.1016/j.comcom.2018.04.013

Analysis of Fingerprinting Techniques for Tor Hidden Services

Author(s)
Panchenko, Andriy, Mitseva, Asya, Henze, Martin, Lanze, Fabian, Engel, Thomas, Wehrle, Klaus
Type
conference publication
Year of publication
2017
Publisher name
New York, NY : ACM
Source
WPES '17 Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, Texas, USA, October 2017, S. 165 - 175
ISBN
978-1-4503-5175-1
DOI
https://doi.org/10.1145/3139550.3139564

Dynamic RPL for multi-hop routing in IoT applications

Author(s)
Kharrufa, Harith, Al-Kashoash, Hayder, Al-Nidawi, Yaarob, Quezada Mosquera, Maria Fernanda, Kemp, Andrew H.
Type
Conference Proceeding refering
Year of publication
2017
Publisher name
IEEE
Linear programming; Protocols; Mobile nodes; Measurement; Routing; Wireless sensor networks
Source
13th Annual Conference on Wireless On-demand Network Systems and Services (WONS)
ISBN
978-3-901882-88-3
978-1-5090-4377-4
DOI
https://doi.org/10.1109/WONS.2017.7888753

POSTER: Fingerprinting Tor Hidden Services

Author(s)
Mitseva, Asya, Panchenko, Andriy, Lanze, Fabian, Henze, Martin, Engel, Thomas, Wehrle, Klaus
Type
Conference Proceeding refering
Year of publication
2016
Publisher name
New York : ACM
Source
In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16). Association for Computing Machinery, New York, NY, USA, S. 1766 - 1768
ISBN
978-1-4503-4139-4
DOI
https://doi.org/10.1145/2976749.2989054

Website Fingerprinting at Internet Scale

Author(s)
Panchenko, Andriy, Lanze, Fabian, Zinnen, Andreas, Henze, Martin, Pennekamp, Jan, Engel, Thomas, Wehrle, Klaus
Type
conference publication
Year of publication
2016
Publisher name
Reston, VA : Internet Society
Source
Proceedings of the 23rd Internet Society (ISOC) Network and Distributed System Security Symposium (NDSS 2016), San Diego, USA, February 2016
ISBN
1-891562-41-X

Differentially private data aggregation with optimal utility

Author(s)
Backes, Michael, Herzberg, Amir, Kate, Aniket, Pryvalov, Ivan
Type
Conference Proceeding refering
Year of publication
2016
Publisher name
Springer
Anonymity; Access privacy; Oblivious RAM; Out-sourced data; (Universal) Re-randomizable encryption; Oblivious PRF
Source
Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, December 8-12, 2014, S. 316 - 325
URL
https://link.springer.com/chapter/10.1007/978-3-319-45744-4_17
DOI
https://doi.org/10.1145/2664243.2664263

Sistema de Generación de Aplicaciones Interactivas para TV Digital para la evaluación de servicios masivos

Author(s)
Cabezas, Gissela, Quezada Mosquera, Maria Fernanda, Bernal, Ivan
Type
Scientific Article ref.
Year of publication
2013
Digital Terrestrial Television; DTT; ISDB-Tb; Ginga-NCL; return channel
Source
Revista Politécnica, S. 11 - 22
Volume
32
Issue/Journal number
2
URL
https://revistapolitecnica.epn.edu.ec/ojs2/index.php/revista_politecnica2/article/view/35/pdf