Useful Privacy Enhancing Technologies

Presentations

At MITACS Events

Investigators:

  • D. Stinson. "Error Decodable Secret Sharing and One-Round Perfectly Secure Message Transmission for General Adversary Structures". MITACS Network Security and Cryptography Workshop. June 2010.
  • I. Goldberg. "Sphinx: A Compact and Provably Secure Mix Format". MITACS 2009 Annual Conference. June 2009.
  • I. Goldberg. "Off-the-Record Messaging: Useful Security and Privacy for IM". 1st Canada-France MITACS Workshop on Foundations & Practice of Security. May 2008.

Students:

  • M. A. Tuhin. "Efficient Rate-Optimal Perfectly Secure Message Transmission". MITACS International Focus Period: Advances in Network Analysis & its Applications, June 2010
  • N. A. Safa. "Authentication of Mobile Devices from User Behavior". MITACS International Focus Period: Advances in Network Analysis & its Applications, June 2010
  • R. Henry. "Making a Nymbler Nymble using VERBS". First place. MITACS/CORS 2010 Annual Conference Poster Competition. May 2010.
  • S. Narayan. "A Privacy Preserving EHR System using Attribute-based Infrastructure". MITACS/CORS 2010 Annual Conference Poster Competition. May 2010.
  • M. Jafari. "Enforcing Purpose of Access in Privacy Policies". MITACS/CORS 2010 Annual Conference Poster Competition. May 2010.
  • M. Jafari. "A DRM Approach for Securing Electronic Health Records". MITACS 2009 Annual Conference. June 2009.
  • M. Sramka. "Utility vs Privacy as Anti-Utility Using Data Mining". MITACS 2009 Annual Conference. June 2009.
  • A. Kate. "Anonymous Key Agreement". MITACS 2009 Annual Conference. June 2009.
  • M. Sramka. "Privacy-preserving Database Publication for Data Mining". 1st Canada-France MITACS Workshop on Foundations & Practice of Security. May 2008.

International

Investigators:

  • R. Safavi-Naini. "Using Digital Rights Management for Securing Data in a Medical Research Environment". 10th ACM Workshop on Digital Rights Management (ACM-DRM'10), October 2010.
  • I. Goldberg. "An Improved Algorithm for Tor Circuit Scheduling". 17th ACM Conference on Computer and Communications Security. October 2010.
  • I. Goldberg. "Private Information Retrieval". International Olympiad in Informatics Evening Lecture Series. August 2010.
  • R. Safavi-Naini. "Securing Medical Research Data with a Rights Management System". 1st USENIX Workshop on Health Security and Privacy (HealthSec'10), August 2010.
  • I. Goldberg. "Achieving Efficient Query Privacy for Location Based Services". Pitney Bowes Sixth Annual Conference on Information Security and Communication. July 2010.
  • I. Goldberg. "Sphinx: A Compact and Provably Secure Mix Format". University of Illinois at Urbana-Champaign Information Trust Institute Trust and Security Seminar. September 2009.
  • I. Goldberg. "Sphinx: A Compact and Provably Secure Mix Format". Purdue University CERIAS Security Seminar. August 2009.
  • I. Goldberg. "Sphinx: A Compact and Provably Secure Mix Format". 2009 IEEE Symposium on Security and Privacy. May 2009.
  • I. Goldberg. "Internet Security and Privacy for the Rest of Us". Third Age Learning Speaker Series on "Privacy and Security in Your World". February 2009.
  • R. Safavi-Naini. "Unconditionally Secure Conference Key Distribution: Security Definitions and Their Relations". Forty-Sixth Annual Allerton Conference on Communication, Control, and Computing (invited talk). September 2008.
  • I. Goldberg, A. Menezes, D. Stinson. "Introduction to Classical Cryptography and Information Security". Information Security in a Quantum World Conference. August 2008.
  • R. Safavi-Naini. "Data Sanitization & Data Mining". Palo Alto Research Center. July 2008.
  • I. Goldberg. "Off-the-Record Messaging: Useful Security and Privacy for IM". Pitney Bowes Fourth Annual Conference on Information Security and Communication. June 2008.
  • I. Goldberg. "Cryptography, Security, and Privacy on the Internet". CEMC Lyons Invited Speaker. June 2008.
  • I. Goldberg. "Improving the Robustness of Private Information Retrieval". University of California, Berkeley TRUST Seminar. April 2008.
  • R. Safavi-Naini. "Non-interactive Conference Key Distributions and their Applications". ACM Symposium on Information, Computer and Communications Security (ASIACCS'08). March 2008.

Students:

  • M. Askari, "A General Information Theoretic Privacy and Utility Measure for Data Sanitization Mechanisms", ACM Conference on Data and Application Security and Privacy (CODASPY'12), February 2012.
  • M. Askari, "A Rights Management Approach to Protection of Privacy in a Cloud of Electronic Health Records". ACM Workshop on Digital Rights Management (ACM DRM 2011), October 2011.
  • Rob Smits. "BridgeSPA: Improving Tor Bridges with Single Packet Authorization". 2011 Workshop on Privacy in the Electronic Society. October 2011.
  • Ryan Henry. "Practical PIR for Electronic Commerce". 18th ACM Conference on Computer and Communications Security. October 2011.
  • Mashael AlSabah. "DefenestraTor: Throwing out Windows in Tor". 11th Privacy Enhancing Technologies Symposium. July 2011.
  • Ryan Henry. "Formalizing Anonymous Blacklisting Systems". 32nd IEEE Symposium on Security and Privacy. May 2011.
  • Ryan Henry. "Extending Nymble-like Systems". 32nd IEEE Symposium on Security and Privacy. May 2011.
  • M. A. Alam Tuhin, "Message Transmission Protocols with Flexible Parameters". ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), Hong Kong, China, March 2011.
  • M. A. Alam Tuhin, "Optimal One Round Almost Perfectly Secure Message Transmission". International Conference on Financial Cryptography and Data Security (FC 2011), St. Lucia, February 2011.
  • Femi Olumofin. "Revisiting the Computational Practicality of Private Information Retrieval". Fifteenth International Conference on Financial Cryptography and Data Security. Feburary 2011.
  • Martin Gagne. "Threshold Attribute-based Signcryption". Presented at Universit√© Joseph Fourier, France. September 2010
  • Martin Gagne. "Threshold attribute based signcryption". 7th International Conference on Security and Cryptography for Networks (SCN'10), September 2010
  • A. Kate. "Distributed Private-Key Generators for Identity-Based Cryptography". 7th Conference on Security and Cryptography for Networks. September 2010.
  • Martin Gagne. "A Crash Course on the Random Oracle Model". Presented at Universit√© Joseph Fourier, France. June 2010
  • S. Narayan "A Privacy Preserving EHR System using Attribute-based Infrastructure". Poster Presented at 2010 Annual MITACS/CORS Conference, 2010.
  • R. Henry. "Making a Nymbler Nymble using VERBS". 10th Privacy Enhancing Technologies Symposium. July 2010.
  • F. Olumofin. "Privacy-preserving Queries over Relational Databases". 10th Privacy Enhancing Technologies Symposium. July 2010.
  • A. Kate. "Using Sphinx to Improve Onion Routing Circuit Construction". Financial Cryptography and Data Security 2010. January 2010.
  • C. Alexander. "Plinko: Polling with a Physical Implementation of a Noisy Channel". 2009 Workshop on Privacy in the Electronic Society. November 2009.
  • J. Reardon. "Improving Tor Using a TCP-over-DTLS Tunnel". 18th USENIX Security Symposium. August 2009.
  • A. Kate. "Distributed Key Generation for the Internet". 29th International Conference on Distributed Computing Systems. June 2009.
  • A. Mashatan. "A New Message Recognition Protocol With Self-Recoverability for Ad Hoc Pervasive Networks". 7th International Conference on Applied Cryptography and Network Security. June 2009.
  • M. Sramka. "Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data". The Sixth Annual Conference on Privacy, Security and Trust (PST 2008). October 2008.
  • R. Stedman. "A User Study of Off-the-Record Messaging". 2008 Symposium On Usable Privacy and Security. July 2008.