Back to Results
First PageMeta Content
Cryptographic protocols / File sharing networks / Secure multi-party computation / Peer-to-peer / Communications protocol / Information theory / Scalability / Time complexity / Internet privacy / Theoretical computer science / Information / Data


SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos ETH Zurich, Switzerland {burkhart, strasser, dmany, fontas}@tik.ee
Add to Reading List

Document Date: 2011-01-06 04:06:22


Open Document

File Size: 500,98 KB

Share Result on Facebook

Company

Skype / SWITCH / /

/

Event

FDA Phase / /

Facility

Port Histogram / SEPIA library / Port Entropy / /

IndustryTerm

Internet-wide Experiments In / software algorithms / event correlation protocol / addition protocol / online processing / vector addition protocol / individual networks / privacy-preserving protocols / traffic analysis applications / entropy protocol / distinct count protocols / border routers / real-time ranges / binary search algorithm / real-world applications / much more practical protocols / network statistics protocols / network monitoring protocols / medium-sized backbone operator / possible solution / bit-decomposition protocol / online generation / round protocols / distinct count protocol / working in real-time ranges / /

NaturalFeature

Shannon / /

Organization

e.g. / U.S. Securities and Exchange Commission / /

Person

Mario Strasser / Martin Burkhart / /

Position

Private Information Aggregation / player / adversary model for privacy peers / straight-forward / dealer / /

Product

Tsallis / SEPIA / /

ProvinceOrState

Oregon / Manitoba / /

Technology

detailed algorithm / LAN / privacy-preserving protocols / MPC protocol / distinct count protocol / peer-to-peer / MPC protocols / public overall item count S. The entropy protocol / distinct count protocols / PKI / 4 SEPIA Protocols / LSB protocol / binary search algorithm / UDP / SSL / addition protocol / bit-decomposition protocol / TCP/IP / network statistics protocols / round protocols / firewall / event correlation protocol / network monitoring protocols / 26 The protocol / entropy protocol / IPv4 / requiring software algorithms / five border routers / corresponding SEPIA protocol / vector addition protocol / aggregated using the addition protocol / /

SocialTag