How to generate cryptographically strong sequences of pseudo-random bits
SIAM Journal on Computing
Improved algorithms for synchronizing computer network clocks
IEEE/ACM Transactions on Networking (TON)
Secure audit logs to support computer forensics
ACM Transactions on Information and System Security (TISSEC)
Security Weaknesses in Bluetooth
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
PlanetLab: an overlay testbed for broad-coverage services
ACM SIGCOMM Computer Communication Review
Vivaldi: a decentralized network coordinate system
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Remote Physical Device Fingerprinting
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
OpenDHT: a public DHT service and its uses
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
Constraint-based geolocation of internet hosts
IEEE/ACM Transactions on Networking (TON)
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Forward-security in private-key cryptography
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
The security and performance of the galois/counter mode (GCM) of operation
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Future consumer mobile phone security: A case study using the data-centric security model
Information Security Tech. Report
SMILE: encounter-based trust for mobile social services
Proceedings of the 16th ACM conference on Computer and communications security
Vanish: increasing data privacy with self-destructing data
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Laptop theft: a case study on the effectiveness of security mechanisms in open organizations
Proceedings of the 17th ACM conference on Computer and communications security
Effectiveness of Physical, Social and Digital Mechanisms against Laptop Theft in Open Organizations
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Keypad: an auditing file system for theft-prone devices
Proceedings of the sixth conference on Computer systems
Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems
User Modeling and User-Adapted Interaction
Sense-And-Trace: a privacy preserving distributed geolocation tracking system
SP'12 Proceedings of the 20th international conference on Security Protocols
ZQL: a compiler for privacy-preserving data processing
SEC'13 Proceedings of the 22nd USENIX conference on Security
Hi-index | 0.00 |
We tackle the problem of building privacy-preserving device-tracking systems--or private methods to assist in the recovery of lost or stolen Internet-connected mobile devices. The main goals of such systems are seemingly contradictory: to hide the device's legitimately-visited locations from third-party services and other parties (location privacy) while simultaneously using those same services to help recover the device's location(s) after it goes missing (device-tracking). We propose a system, named Adeona, that nevertheless meets both goals. It provides strong guarantees of location privacy while preserving the ability to efficiently track missing devices. We build a version of Adeona that uses OpenDHT as the third party service, resulting in an immediately deployable system that does not rely on any single trusted third party. We describe numerous extensions for the basic design that increase Adeona's suitability for particular deployment environments.