adequate-intake 发表于 2025-3-26 23:08:17
http://reply.papertrans.cn/87/8635/863415/863415_31.pngAnticlimax 发表于 2025-3-27 05:11:49
Accountable Privacy (Transcript of Discussion), of us wanted to be on the privacy side. So instead I’ll talk for a while about this apparent conflict between privacy on the one hand and accountability on the other. We’ll look at a number of existing technologies, some open questions, and although I guess there’s no new research in the paper now,Asseverate 发表于 2025-3-27 08:50:28
Toward a Broader View of Security Protocols,ugh insecurity here to keep all of us fully occupied for the foreseeable future, this narrow view of our domain may actually be contributing to the very problems that we are trying to solve. We miss important insights from, and opportunities to make contributions to, a larger world that has been gra细颈瓶 发表于 2025-3-27 10:23:54
Privacy, Control and Internet Mobility,ation, and the serviced accessed that is necessarily or unnecessarily revealed observers, including the access network, intermediaries within the Internet, and the peer endpoints. In particular, we are interested in data that can be collected from packet headers and signaling messages and exploitedAviary 发表于 2025-3-27 16:50:41
http://reply.papertrans.cn/87/8635/863415/863415_35.pngforeign 发表于 2025-3-27 21:14:14
http://reply.papertrans.cn/87/8635/863415/863415_36.png沙漠 发表于 2025-3-27 23:43:16
Controlling Who Tracks Me (Transcript of Discussion),network, but things that are in everyday life. For instance, you may forget to buy milk; that’s an information processing problem. If your car gets a flat tyre, that’s probably not an information processing problem, but there may be information processing that can assist you..One basic idea is to trendarterectomy 发表于 2025-3-28 04:58:45
BLIND: A Complete Identity Protection Framework for End-Points,ased on a two-round-trip authenticated Diffie-Hellman key exchange protocol that identifies the end-points to each other and creates a security association between the peers. The protocol hides the public key based identifiers from attackers and eavesdroppers by blinding the identifiers. We complete调整 发表于 2025-3-28 09:42:56
BLIND: A Complete Identity Protection Framework for End-Points (Transcript of Discussion),parties in the presence of an active attack is that someone has to reveal their identity first, unless you know something about each other that’s secret in advance. Assuming certificates and so on is themeans for identification, someone has to identify first, you can’t say, I’ll only tell you who I委屈 发表于 2025-3-28 10:31:11
0302-9743 e you to think at least one heretical thought. Please write or e-mail and share it with us. Our theme this workshop was “Authentic Privacy.” Traditionally we have based authentication upon a rather strong notion of identity, and have then built other security services on top of authentication. Perha