Search For:

Displaying 1-9 out of 9 total
What happened to the crypto dream?, Part 2
Found in: IEEE Security & Privacy
By Arvind Narayanan
Issue Date:May 2013
pp. 68-71
Despite privacy-preserving cryptography technologies' potential, they've largely failed to find commercial adoption. Reasons include people's unawareness of privacy-preserving cryptography, developers' lack of expertise, the field's complexity, economic co...
 
What Happened to the Crypto Dream?, Part 1
Found in: IEEE Security & Privacy
By Arvind Narayanan
Issue Date:March 2013
pp. 75-76
One way to use cryptography for privacy is to tweak various systems to be privacy-preserving. But the more radical cypherpunk movement sought to wield crypto as a weapon of freedom, autonomy, and privacy that would fundamentally and inexorably reshape soci...
 
De-anonymizing Social Networks
Found in: Security and Privacy, IEEE Symposium on
By Joseph A. Calandrino, Ann Kilzer, Arvind Narayanan, Edward W. Felten, Vitaly Shmatikov
Issue Date:May 2011
pp. 231-246
Many commercial websites use recommender systems to help customers locate products and content. Modern recommenders are based on collaborative filtering: they use patterns learned from users' behavior to make recommendations, usually in the form of related...
 
De-anonymizing Social Networks
Found in: Security and Privacy, IEEE Symposium on
By Arvind Narayanan, Vitaly Shmatikov
Issue Date:May 2009
pp. 173-187
Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and data-mining researchers. Privacy is typically protected by anonymization, i.e.,...
 
Robust De-anonymization of Large Sparse Datasets
Found in: Security and Privacy, IEEE Symposium on
By Arvind Narayanan, Vitaly Shmatikov
Issue Date:May 2008
pp. 111-125
We present a new class of statistical de-anonymization attacks against high-dimensional micro-data, such as individual preferences, recommendations, transaction records and so on. Our techniques are robust to perturbation in the data and tolerate some mist...
 
Why software engineering courses should include ethics coverage
Found in: Communications of the ACM
By Arvind Narayanan, Shannon Vallor
Issue Date:March 2014
pp. 23-25
Encouraging students to become comfortable exercising ethical discernment in a professional context with their peers.
     
Myths and fallacies of "personally identifiable information"
Found in: Communications of the ACM
By Arvind Narayanan, Vitaly Shmatikov
Issue Date:June 2010
pp. 120-ff
Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about individuals increase exponentially.
     
Fast dictionary attacks on passwords using time-space tradeoff
Found in: Proceedings of the 12th ACM conference on Computer and communications security (CCS '05)
By Arvind Narayanan, Vitaly Shmatikov
Issue Date:November 2005
pp. 364-372
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to brute-force dictionary attacks, many organizations enforce complicated password-creation rules and require that passwords include numerals and special ...
     
Obfuscated databases and group privacy
Found in: Proceedings of the 12th ACM conference on Computer and communications security (CCS '05)
By Arvind Narayanan, Vitaly Shmatikov
Issue Date:November 2005
pp. 102-111
We investigate whether it is possible to encrypt a database and then give it away in such a form that users can still access it, but only in a restricted way. In contrast to conventional privacy mechanisms that aim to prevent any access to individual recor...
     
 1