2011 Proceedings IEEE INFOCOM 2011
DOI: 10.1109/infcom.2011.5935168
|View full text |Cite
|
Sign up to set email alerts
|

Privacy analysis of user association logs in a large-scale wireless LAN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…We also built a system that uses the highresolution data captured by DIST to help the computing service at Dartmouth to diagnose malfunctions, and detect any abnormal behaviors. Furthermore, we studied the obstacles and tradeoffs in sanitizing network traces [7].…”
Section: Discussionmentioning
confidence: 99%
“…We also built a system that uses the highresolution data captured by DIST to help the computing service at Dartmouth to diagnose malfunctions, and detect any abnormal behaviors. Furthermore, we studied the obstacles and tradeoffs in sanitizing network traces [7].…”
Section: Discussionmentioning
confidence: 99%
“…Assuming that 1*=ui,1. Computes the code‐word ((yi,1*)1=f(x1*)1(idi,ui,1),,(yi,r*)1=f(xr*)1(idi,ui,1). Tests if BFi,ui,1 contains 1's in all r locations denoted by (yi,1*)1,,(yi,r*)1. If so, computes sumsum+2ui,1 and checks if sum ≥ ϕ , If the inequality holds, outputs 1; otherwise, uses other trapdoor values to follow steps‐ [7‐11]. If all the positions do not contain 1's in the Bloom filter in step [9], derives level‐ui,1 partial PRFs …”
Section: Mining Over Encrypted Wireless Datamentioning
confidence: 99%
“…If the inequality holds, outputs 1; otherwise, uses other trapdoor values to follow steps‐ [7‐11]. If all the positions do not contain 1's in the Bloom filter in step [9], derives level‐ui,1 partial PRFs (x1*)1,,(xr*)1 by using PRG G .…”
Section: Mining Over Encrypted Wireless Datamentioning
confidence: 99%
See 1 more Smart Citation
“…It takes great effort and care to correctly sanitize traces; from our own experience, and from other examples in the literature, researchers can make mistakes when sanitizing traces: they may not understand a tool's capabilities, be forced to write their own tools, or miss subtle ways in which information can leak from a trace. Many recent papers [18,2,6,11] demonstrate methods to extract private information from traces thought to be suitably sanitized. Ma et al [14] show, through analysis of wireless-network traces, that even a small amount of external information is enough for an adversary to infer a victim's true identity in a set of anonymized mobility traces from CRAWDAD.…”
Section: Introductionmentioning
confidence: 99%