The recent literature has hailed the benefits of content-oriented network architectures. However, such designs pose a threat to privacy by revealing a user’s content requests. In this paper, we study how to ameliorate privacy in such designs. We present an approach that does not require any special infrastructure or shared secrets between the publishers and consumers of content. In lieu of any informational asymmetry, the approach leverages computational asymmetry by forcing the adversary to perform sizable computations to reconstruct each request. This approach does not provide ideal privacy, but makes it hard for an adversary to effectively monitor the content requests of a large number of users
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...
Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from und...
ABSTRACT 1 A proper security architecture is an essential part of implementing robust and reliable n...
As the Internet struggles to cope with scalability, mobility, and security issues, new network archi...
By suggesting radical changes to the current Internet, approaches to clean-slate architectures run t...
Today's Internet is aging. Connections are point-to-point and increasingly protected by end-to-end e...
[[abstract]]The privacy issue of online social networks (OSNs) has been getting attention from the p...
International audienceAs the Internet struggles to cope with scalability, mobility, and security iss...
The peer-assisted CDN is a new content distribution paradigm supported by CDNs (e.g., Akamai), which...
Opportunistic networks have recently received considerable attention from both industry and research...
Opportunistic networks have recently received considerable attention from both industry and research...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...
Indiana University-Purdue University Indianapolis (IUPUI)Following the trend of online data sharing ...
The third-party enterprises, such as sociologists and commercial companies, are mining data publishe...
In the recent years, we have witnessed an explosive growth of content on the Internet (storage, retr...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...
Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from und...
ABSTRACT 1 A proper security architecture is an essential part of implementing robust and reliable n...
As the Internet struggles to cope with scalability, mobility, and security issues, new network archi...
By suggesting radical changes to the current Internet, approaches to clean-slate architectures run t...
Today's Internet is aging. Connections are point-to-point and increasingly protected by end-to-end e...
[[abstract]]The privacy issue of online social networks (OSNs) has been getting attention from the p...
International audienceAs the Internet struggles to cope with scalability, mobility, and security iss...
The peer-assisted CDN is a new content distribution paradigm supported by CDNs (e.g., Akamai), which...
Opportunistic networks have recently received considerable attention from both industry and research...
Opportunistic networks have recently received considerable attention from both industry and research...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...
Indiana University-Purdue University Indianapolis (IUPUI)Following the trend of online data sharing ...
The third-party enterprises, such as sociologists and commercial companies, are mining data publishe...
In the recent years, we have witnessed an explosive growth of content on the Internet (storage, retr...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...
Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from und...
ABSTRACT 1 A proper security architecture is an essential part of implementing robust and reliable n...