Author image not provided
 Aaron Johnson

 homepage
 aaron.m.johnsonatnrl.navy.mil

  Affiliation history
Bibliometrics: publication history
Average citations per article8.42
Citation Count101
Publication count12
Publication years2007-2017
Available for download8
Average downloads per article496.13
Downloads (cumulative)3,969
Downloads (12 Months)680
Downloads (6 Weeks)51
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


12 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 12 of 12
Sort by:

1 published by ACM
October 2017 CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 11,   Downloads (12 Months): 56,   Downloads (Overall): 56

Full text available: PDFPDF
This paper introduces a cryptographic protocol for efficiently aggregating a count of unique items across a set of data parties privately - that is, without exposing any information other than the count. Our protocol allows for more secure and useful statistics gathering in privacy-preserving distributed systems such as anonymity networks; ...
Keywords: privacy-preserving measurement, secure computation

2 published by ACM
October 2016 CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 8,   Downloads (12 Months): 270,   Downloads (Overall): 396

Full text available: PDFPDF
Tor is a popular network for anonymous communication. The usage and operation of Tor is not well-understood, however, because its privacy goals make common measurement approaches ineffective or risky. We present PrivCount, a system for measuring the Tor network designed with user privacy as a primary goal. PrivCount securely aggregates ...
Keywords: Tor, anonymous communication, network measurement, anonymity, differential privacy, secure aggregation

3 published by ACM
November 2013 CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Publisher: ACM
Bibliometrics:
Citation Count: 23
Downloads (6 Weeks): 7,   Downloads (12 Months): 128,   Downloads (Overall): 689

Full text available: PDFPDF
We present the first analysis of the popular Tor anonymity network that indicates the security of typical users against reasonably realistic adversaries in the Tor network or in the underlying Internet. Our results show that Tor users are far more susceptible to compromise than indicated by prior work. Specific contributions ...
Keywords: onion routing, metrics, anonymity

4 published by ACM
August 2013 KDD '13: Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Publisher: ACM
Bibliometrics:
Citation Count: 11
Downloads (6 Weeks): 13,   Downloads (12 Months): 119,   Downloads (Overall): 871

Full text available: PDFPDF
Genome-wide association studies (GWAS) have become a popular method for analyzing sets of DNA sequences in order to discover the genetic basis of disease. Unfortunately, statistics published as the result of GWAS can be used to identify individuals participating in the study. To prevent privacy breaches, even previously published results ...
Keywords: differential privacy, genome-wide association studies

5 published by ACM
November 2012 ACM Transactions on Information and System Security (TISSEC): Volume 15 Issue 3, November 2012
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 5,   Downloads (12 Months): 36,   Downloads (Overall): 447

Full text available: PDFPDF
We perform a probabilistic analysis of onion routing. The analysis is presented in a black-box model of anonymous communication in the Universally Composable (UC) framework that abstracts the essential properties of onion routing in the presence of an active adversary who controls a portion of the network and knows all ...
Keywords: Anonymous communication, Tor, onion routing

6 published by ACM
October 2011 CCS '11: Proceedings of the 18th ACM conference on Computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 10
Downloads (6 Weeks): 4,   Downloads (12 Months): 36,   Downloads (Overall): 584

Full text available: PDFPDF
We introduce a novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network. We focus on anonymous communication, and in particular onion routing, although we expect the approach to apply more broadly. This paper provides two main contributions. ...
Keywords: anonymous communication, onion routing, privacy, trust

7
July 2010 PETS'10: Proceedings of the 10th international conference on Privacy enhancing technologies
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 6

Low-latency anonymous communication protocols in general, and the popular onion-routing protocol in particular, are broken against simple timing attacks. While there have been few proposed solutions to this problem when the adversary is active, several padding schemes have been proposed to defend against a passive adversary that just observes timing ...

8
July 2009 CSF '09: Proceedings of the 2009 22nd IEEE Computer Security Foundations Symposium
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 5

We consider using trust information to improve the anonymity provided byonion-routing networks. In particular, we introduce a model of trustin network nodes and use it to design path-selection strategies thatminimize the probability that the adversary can successfully control the entrance to and exit from the network.This minimizes the chance that ...
Keywords: onion routing, anonymous communication, trust, minimax

9
December 2008 WINE '08: Proceedings of the 4th International Workshop on Internet and Network Economics
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Completely automated electronic securities exchanges and algorithms for trading in these exchanges have become very important for modern finance. In [4], Kakade <em>et</em> <em>al</em> . introduced the limit order market model, which is a prevalent paradigm in electronic markets. In this paper, we consider both online and offline algorithms for ...

10 published by ACM
October 2007 WPES '07: Proceedings of the 2007 ACM workshop on Privacy in electronic society
Publisher: ACM
Bibliometrics:
Citation Count: 23
Downloads (6 Weeks): 3,   Downloads (12 Months): 23,   Downloads (Overall): 645

Full text available: PDFPDF
Web search is currently a source of growing concern about personal privacy. It is an essential and central part of most users' activity online and therefore one through which a significant amount of personal information may be revealed.To help users protect their privacy, we have designed and implemented Private WebSearch ...
Keywords: PWS, tor, anonymity, firefox, privacy, web search

11 published by ACM
October 2007 WPES '07: Proceedings of the 2007 ACM workshop on Privacy in electronic society
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 1,   Downloads (12 Months): 13,   Downloads (Overall): 282

Full text available: PDFPDF
We perform a probabilistic analysis of onion routing. The analysis is presented in a black-box model of anonymous communication that abstracts the essential properties of onion routing in the presence of an active adversary that controls a portion of the network and knows all a priori distributions on user choices ...
Keywords: anonmity, onion routing, tor

12
February 2007 FC'07/USEC'07: Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 10

Onion routing is a scheme for anonymous communication that is designed for practical use. Until now, however, it has had no formal model and therefore no rigorous analysis of its anonymity guarantees. We give an IO-automata model of an onion-routing protocol and, under possibilistic definitions, characterize the situations in which ...
Keywords: anonymity, onion routing, privacy, security



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us