WorldCat Identities

Hopper, Nicholas J.

Overview
Works: 9 works in 22 publications in 1 language and 758 library holdings
Genres: Conference proceedings 
Roles: Author, Editor
Classifications: QA76.9.A25, 005.8
Publication Timeline
.
Most widely held works by Nicholas J Hopper
Privacy enhancing technologies 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings by Mikhail J Atallah( )
10 editions published in 2010 in English and held by 412 WorldCat member libraries worldwide
Annotation
Privacy enhancing technologies 11th international symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011 : proceedings by Simone Fischer-Hübner( )
4 editions published in 2011 in English and held by 338 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the 10th International Symposium, PETS 2011, held in Waterloo, Canada, in July 2011. The 15 revised full papers were carefully reviewed and selected from 61 submissions. The papers address design and realization of privacy services for the Internet, other data systems and communication networks. Presenting novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems the volume also features novel technical contributions from other communities such as law, business, and data protection authorities, that present their perspectives on technological issues
Combining theory generation and model checking for security protocol analysis by Nicholas J Hopper( Book )
2 editions published in 2000 in English and held by 2 WorldCat member libraries worldwide
Abstract: "This paper reviews two relatively new tools for automated formal analysis of security protocols. One applies the formal methods technique of model checking to the task of protocol analysis, while the other utilizes the method of theory generation, which borrows from both model checking and automated theorem proving. For purposes of comparison, the tools are both applied to a suite of sample protocols with known flaws, including the protocol used in an earlier study to provide a baseline. We then suggest a heuristic for combining the two approaches to provide a more complete analysis than either approach can provide alone."
Provably secure steganography by Nicholas J Hopper( Book )
1 edition published in 2002 in English and held by 1 WorldCat member library worldwide
Abstract: "Informally, steganography is the process of sending a secret message from Alice to Bob in such a way that an eavesdropper (who listens to all communications) cannot even tell that a secret message is being sent. In this work, we initiate the study of steganography from a complexity-theoretic point of view. We introduce definitions based on computational indistinguishability and we prove that the existence of one-way functions implies the existence of secure steganographic protocols."
Toward a theory of Steganography ( )
1 edition published in 2004 in English and held by 1 WorldCat member library worldwide
Informally, steganography refers to the practice of hiding secret messages in communications over a public channel so that an eavesdropper (who listens to all communications) cannot even tell that a secret message is being sent. In contrast to the active literature proposing new concrete steganographic protocols and analysing flaws in existing protocols, there has been very little work on formalizing steganographic notions of security, and none giving complete, rigorous proofs of security in a satisfying model. My thesis initiates the study of steganography from a cryptographic point of view. We give a precise model of a communication channel and a rigorous definition of steganographic security, and prove that relative to a channel oracle, secure steganography exists if and only if one-way functions exist. We give tightly matching upper and lower bounds on the maximum rate of any secure stegosystem. We introduce the concept of steganographic key exchange and public-key steganography, and show that provably secure protocols for these objectives exist under a variety of standard number-theoretic assumptions. We consider several notions of active attacks against steganography, show how to achieve each under standard assumptions, and consider the relationships between these notions. Finally, we extend the concept of steganography as covert communication to include the more general concept of covert computation
Toward a theory of steganography by Nicholas J Hopper( Book )
1 edition published in 2004 in English and held by 1 WorldCat member library worldwide
Abstract: "Informally, steganography refers to the practice of hiding secret messages in communications over a public channel so that an eavesdropper (who listens to all communications) cannot even tell that a secret message is being sent. In contrast to the active literature proposing new concrete steganographic protocols and analysing flaws in existing protocols, there has been very little work on formalizing steganographic notions of security, and none giving complete, rigorous proofs of security in a satisfying model. My thesis initiates the study of steganography from a cryptographic point of view. We give a precise model of a communication channel and a rigorous definition of steganographic security, and prove that relative to a channel oracle, secure steganography exists if and only if one-way functions exist. We give tightly matching upper and lower bounds on the maximum rate of any secure stegosystem. We introduce the concept of steganographic key exchange and public-key steganography, and show that provably secure protocols for these objectives exist under a variety of standard number-theoretic assumptions. We consider several notions of active attacks against steganography, show how to achieve each under standard assumptions, and consider the relationships between these notions. Finally, we extend the concept of steganography as covert communication to include the more general concept of covert computation."
A Secure Human-Computer Authentication Scheme ( )
1 edition published in 2000 in English and held by 1 WorldCat member library worldwide
We introduce a protocol for authentication between a human and a computer, where the human is able to use no special hardware other than a dumb terminal. Authentication is based on a shared secret which can be reused polynomially often with no danger of exposure, assuming the conjectured uniform hardness of learning parity functions in the presence of noise. Under this conjecture, the protocol is secure against a polynomially-bounded passive adversary and also some forms of active adversary, although it is not secure against arbitrary active adversaries
Privacy enhancing technologies 11th international symposium ; proceedings ( Book )
1 edition published in 2011 in English and held by 1 WorldCat member library worldwide
A secure human-computer authentication scheme by Nicholas J Hopper( Book )
1 edition published in 2000 in English and held by 1 WorldCat member library worldwide
Abstract: "We introduce a protocol for authentication between a human and a computer, where the human is able to use no special hardware other than a dumb terminal. Authentication is based on a shared secret which can be reused polynomially often with no danger of exposure, assuming the conjectured uniform hardness of learning parity functions in the presence of noise. Under this conjecture, the protocol is secure against a polynomially-bounded passive adversary and also some forms of active adversary, although it is not secure against arbitrary active adversaries."
 
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.70 (from 0.00 for Toward a t ... to 0.70 for Privacy en ...)
Languages
English (22)
Covers