Category Archives: Information
The paper “50 Bucks Attack on Tor“, submitted as short paper to NordSec, has been accepted. In the paper, we look on Tor’s attacker model from a more practical side and assume a local network administrator as a potential adversary. … Continue reading
Last week I presented the work Analyzing the Gold Star Scheme in a Split Tor Network at SecureComm in London: Tor is an anonymity network and two challenges in Tor are (i) to overcome the scalability problems of Tor’s current … Continue reading
At the NISNET workshop in Trondheim, I arranged a Capture the Flag contest based on a UCSB CTF from 2005, i.e., Spam 2005. The introduction slides are now available for download.
In June Asgeir Steine and I arrange a Workshop for (PhD,Master) students in Norway who focus on information security in their studies. The workshop will be held in Trondheim. More information about the workshop can be found here
The preproceedings version of the paper Malice vs. AN.ON is online. The presentation will be given at the conference Financial Cryptography and Data Security. The final version of the paper will be published by Springer.
The paper “Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection” has been accepted for publication at the Financial Cryptography and Data Security conference. The conference will be held in February 2011 in St. Lucia. The paper is … Continue reading
The poster “Splitting the Tor Network: Potential Challenges considering the Gold Star Scheme” of Pern Hui Chia and myself was selected as best poster at the NordSec 2010 conference in Helsinki, Finnland.
The Poster with the title “Splitting the Tor Network: Potential Challenges Considering the Gold Star Approach” was accepted at NordSec 2010.
My paper Comparison of the Power Consumption of the 2nd Round SHA-3 Candidates was accepted at ICT Innovations 2010 in Ohrid. The paper is co-authered by Danilo Gligorski and Svein Knapskog.