WorldCat Identities

Hopper, Nicholas J.

Overview
Works: 6 works in 30 publications in 1 language and 901 library holdings
Genres: Conference papers and proceedings 
Roles: Editor, Author
Classifications: QA76.9.A25, 005.8
Publication Timeline
.
Most widely held works by Nicholas J Hopper
Privacy enhancing technologies : 7th international symposium, PET 2007, Ottawa, Canada, June 20-22, 2007 : revised selected papers by Ian Goldberg( )

10 editions published in 2010 in English and held by 53 WorldCat member libraries worldwide

Annotation
Privacy enhancing technologies : 13th international symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013 : proceedings by Emiliano De Cristofaro( Book )

11 editions published in 2011 in English and Undetermined and held by 22 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 13th International Symposium on Privacy Enhancing Technologies, PET 2013, held in Bloomington, IN, USA, in July 2013. The 13 full papers presented were carefully selected from 69 submissions. Topics addressed include data privacy, privacy-oriented cryptography, location privacy, performance of the Tor network, censorship evasion, traffc analysis, and user-related privacy perspectives
Combining Theory Generation and Model Checking for Security Protocol Analysis by Nicholas J Hopper( Book )

3 editions published in 2000 in English and held by 2 WorldCat member libraries worldwide

This paper reviews two relatively new tools for automated formal analysis of security protocols. One applies the formal methods technique of model checking to the task of protocol analysis, while the other utilizes the method of theory generation. which borrows from both model checking and automated theorem proving. For purposes of comparison. the tools are both applied to a suite of sampIe protocols with known laws. including the protocol used in an earlier study to provide a baseline. We then suggest a heuristic for combining the two approaches to provide a more complete analysis than either approach can provide alone
A Secure Human-Computer Authentication Scheme by Nicholas J Hopper( Book )

3 editions published in 2000 in English and held by 2 WorldCat member libraries worldwide

We introduce a protocol for authentication between a human and a computer, where the human is able to use no special hardware other than a dumb terminal. Authentication is based on a shared secret which can be reused polynomially often with no danger of exposure, assuming the conjectured uniform hardness of learning parity functions in the presence of noise. Under this conjecture, the protocol is secure against a polynomially-bounded passive adversary and also some forms of active adversary, although it is not secure against arbitrary active adversaries
Provably secure steganography by Nicholas J Hopper( Book )

1 edition published in 2002 in English and held by 1 WorldCat member library worldwide

Abstract: "Informally, steganography is the process of sending a secret message from Alice to Bob in such a way that an eavesdropper (who listens to all communications) cannot even tell that a secret message is being sent. In this work, we initiate the study of steganography from a complexity-theoretic point of view. We introduce definitions based on computational indistinguishability and we prove that the existence of one-way functions implies the existence of secure steganographic protocols."
Toward a theory of steganography by Nicholas J Hopper( Book )

2 editions published in 2004 in English and held by 1 WorldCat member library worldwide

Abstract: "Informally, steganography refers to the practice of hiding secret messages in communications over a public channel so that an eavesdropper (who listens to all communications) cannot even tell that a secret message is being sent. In contrast to the active literature proposing new concrete steganographic protocols and analysing flaws in existing protocols, there has been very little work on formalizing steganographic notions of security, and none giving complete, rigorous proofs of security in a satisfying model. My thesis initiates the study of steganography from a cryptographic point of view. We give a precise model of a communication channel and a rigorous definition of steganographic security, and prove that relative to a channel oracle, secure steganography exists if and only if one-way functions exist. We give tightly matching upper and lower bounds on the maximum rate of any secure stegosystem. We introduce the concept of steganographic key exchange and public-key steganography, and show that provably secure protocols for these objectives exist under a variety of standard number-theoretic assumptions. We consider several notions of active attacks against steganography, show how to achieve each under standard assumptions, and consider the relationships between these notions. Finally, we extend the concept of steganography as covert communication to include the more general concept of covert computation."
 
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.53 (from 0.49 for Privacy en ... to 0.80 for Combining ...)

Privacy enhancing technologies : 7th international symposium, PET 2007, Ottawa, Canada, June 20-22, 2007 : revised selected papers
Languages
English (29)

Covers
Privacy enhancing technologies : 13th international symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013 : proceedings