Institutions
Anonymous Communication
-
Recent Posts
Meta
Category Archives: Information
The Paper “50 Bucks Attack on Tor” has been accepted
The paper “50 Bucks Attack on Tor“, submitted as short paper to NordSec, has been accepted. In the paper, we look on Tor’s attacker model from a more practical side and assume a local network administrator as a potential adversary. … Continue reading
Posted in Information
Comments Off on The Paper “50 Bucks Attack on Tor” has been accepted
Analyzing the Gold Star Scheme in a Split Tor Network
Last week I presented the work Analyzing the Gold Star Scheme in a Split Tor Network at SecureComm in London: Tor is an anonymity network and two challenges in Tor are (i) to overcome the scalability problems of Tor’s current … Continue reading
Posted in Information
Comments Off on Analyzing the Gold Star Scheme in a Split Tor Network
Capture The Flag Contest – How it works
At the NISNET workshop in Trondheim, I arranged a Capture the Flag contest based on a UCSB CTF from 2005, i.e., Spam 2005. The introduction slides are now available for download.
Posted in Information
Comments Off on Capture The Flag Contest – How it works
2nd NISNET Student Workshop
In June Asgeir Steine and I arrange a Workshop for (PhD,Master) students in Norway who focus on information security in their studies. The workshop will be held in Trondheim. More information about the workshop can be found here
Posted in Information
Comments Off on 2nd NISNET Student Workshop
Preproceedings Version of “Malice vs. AN.ON” is online
The preproceedings version of the paper Malice vs. AN.ON is online. The presentation will be given at the conference Financial Cryptography and Data Security. The final version of the paper will be published by Springer.
Posted in Information, Paper, Paper online
Comments Off on Preproceedings Version of “Malice vs. AN.ON” is online
Paper accepted at Financial Cryptography 2011
The paper “Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection” has been accepted for publication at the Financial Cryptography and Data Security conference. The conference will be held in February 2011 in St. Lucia. The paper is … Continue reading
Posted in Information, Paper accepted
Comments Off on Paper accepted at Financial Cryptography 2011
Best Poster Award
The poster “Splitting the Tor Network: Potential Challenges considering the Gold Star Scheme” of Pern Hui Chia and myself was selected as best poster at the NordSec 2010 conference in Helsinki, Finnland.
Posted in Award, Information, Poster
Comments Off on Best Poster Award
Poster Accepted: Splitting the Tor Network
The Poster with the title “Splitting the Tor Network: Potential Challenges Considering the Gold Star Approach” was accepted at NordSec 2010.
Posted in Information
Comments Off on Poster Accepted: Splitting the Tor Network
Comparison of the Power Consumption of the 2nd Round SHA-3 Candidates was accepted
My paper Comparison of the Power Consumption of the 2nd Round SHA-3 Candidates was accepted at ICT Innovations 2010 in Ohrid. The paper is co-authered by Danilo Gligorski and Svein Knapskog.
Posted in Information, Paper accepted
Comments Off on Comparison of the Power Consumption of the 2nd Round SHA-3 Candidates was accepted