Cryptologia
Foundations of statistical natural language processing
Foundations of statistical natural language processing
Hiding the Hidden: A software system for concealing ciphertext as innocuous text
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Pricing via Processing or Combatting Junk Mail
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Enhancing the privacy of web-based communication
WWW '05 Special interest tracks and posters of the 14th international conference on World Wide Web
Translation-based steganography
Journal of Computer Security - Best papers of the Sec Track at the 2006 ACM Symposium
Translation-based steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
Hi-index | 0.02 |
We define message privacy against a profiling adversary, whose goal is to classify a population of users into categories according to the messages they exchange. This adversary models the most common privacy threat against email communication. We propose a protocol that protects senders and receivers of email messages from profiling attacks.