Tryst: The Case for Confidential Service Discovery.

作者: Jeffrey Pang , Ben Greenstein , Srinivasan Seshan , David Wetherall , None

DOI:

关键词:

摘要: Local service discovery exposes sensitive information about identity, location, and relationships. We present empirical evidence that suggests the release of this in wireless environments poses a real danger to our privacy. then discuss challenges design Tryst, an architecture enhances confidentiality existing mechanisms.

参考文章(18)
Dan Boneh, Brent Waters, Adam Barth, Privacy in Encrypted Content Distribution Using Private Broadcast Encryption Financial Cryptography and Data Security. pp. 52- 64 ,(2006) , 10.1007/11889663_4
Antonio Nicolosi, Michael J. Freedman, Efficient Private Techniques for Verifying Social Proximity. international workshop on peer-to-peer systems. ,(2007)
Ramakrishna Gummadi, David Wetherall, Jeffrey Pang, Srinivasan Seshan, Mike Y. Chen, Tadayoshi Kohno, Ben Greenstein, Can Ferris Bueller still have his day off? protecting privacy in the wireless era HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems. pp. 10- ,(2007)
Venkat Padmanabhan, Ratul Mahajan, Ranveer Chandra, Ming Zhang, CRAWDAD dataset microsoft/osdi2006 (v.2007-05-23) CRAWDAD wireless network data archive. ,(2007) , 10.15783/C79887
Steven E. Czerwinski, Ben Y. Zhao, Todd D. Hodes, Anthony D. Joseph, Randy H. Katz, An architecture for a secure service discovery service acm/ieee international conference on mobile computing and networking. pp. 24- 35 ,(1999) , 10.1145/313451.313462
S.L. Garfinkel, A. Juels, R. Pappu, RFID privacy: an overview of problems and proposed solutions ieee symposium on security and privacy. ,vol. 3, pp. 34- 43 ,(2005) , 10.1109/MSP.2005.78
Marco Gruteser, Dirk Grunwald, Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis Mobile Networks and Applications. ,vol. 10, pp. 315- 325 ,(2005) , 10.1007/S11036-005-6425-1
A. Acquisti, J. Grossklags, Privacy and rationality in individual decision making ieee symposium on security and privacy. ,vol. 3, pp. 26- 33 ,(2005) , 10.1109/MSP.2005.22
Jani Suomalainen, Jukka Valkonen, N. Asokan, Security associations in personal networks: a comparative analysis security of ad hoc and sensor networks. pp. 43- 57 ,(2007) , 10.1007/978-3-540-73275-4_4
Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi, Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions international cryptology conference. ,vol. 3621, pp. 205- 222 ,(2005) , 10.1007/11535218_13