Bob Alice - Academia.edu (original) (raw)
Related Authors
Galgotias College of Engineering and Technology Greater Noida
Uploads
Papers by Bob Alice
IEEE INFOCOM 2018 - IEEE Conference on Computer Communications
Ensuring confidentiality of communication is fundamental to securing the operation of a wireless ... more Ensuring confidentiality of communication is fundamental to securing the operation of a wireless system, where eavesdropping is easily facilitated by the broadcast nature of the wireless medium. By applying distributed beamforming among a coalition, we show that a new approach for assuring physical layer secrecy, without requiring any knowledge about the eavesdropper or injecting any additional cover noise, is possible if the transmitters frequently perturb their phases around the proper alignment phase while transmitting messages. This approach is readily applied to amplitude-based modulation schemes, such as PAM or QAM. We present our secrecy mechanisms, prove several important secrecy properties, and develop a practical secret communication system design. We further implement and deploy a prototype that consists of 16 distributed transmitters using USRP N210s in a 20 × 20 × 3 m 3 area. By sending more than 160M bits over our system to the receiver, depending on system parameter settings, we measure that the eavesdroppers failed to decode 30% − 60% of the bits cross multiple locations while the intended receiver has an estimated bit error ratio of 3 × 10 −6 .
2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2017
This paper contributes a systematic account of transaction anonymization techniques that do not r... more This paper contributes a systematic account of transaction anonymization techniques that do not require trust in a single entity and support the existing cryptographic currency Bitcoin. It surveys and compares four known techniques, proposes tailored metrics to identify the use of each technique (but not necessarily its users), and presents longitudinal measurements indicating adoption trends and teething troubles. There is a tradeoff between the choice of users' preferred protection mechanisms and the risk that pertaining transactions can be singled out, which hurts privacy due to smaller anonymity sets unless a critical mass adopts the mechanism.
A new game form termed games with incomplete awareness is defined. This game form captures unawar... more A new game form termed games with incomplete awareness is defined. This game form captures unawareness as to other players' actions, as well as unawareness of the existence of some players. It also captures interactive unawareness: the awareness of players as to what other players are aware of, and so on. The Nash equilibrium solution is extended to this game form and it is shown that every game with incomplete awareness possesses an extended Nash equilibrium.
IEEE INFOCOM 2018 - IEEE Conference on Computer Communications
Ensuring confidentiality of communication is fundamental to securing the operation of a wireless ... more Ensuring confidentiality of communication is fundamental to securing the operation of a wireless system, where eavesdropping is easily facilitated by the broadcast nature of the wireless medium. By applying distributed beamforming among a coalition, we show that a new approach for assuring physical layer secrecy, without requiring any knowledge about the eavesdropper or injecting any additional cover noise, is possible if the transmitters frequently perturb their phases around the proper alignment phase while transmitting messages. This approach is readily applied to amplitude-based modulation schemes, such as PAM or QAM. We present our secrecy mechanisms, prove several important secrecy properties, and develop a practical secret communication system design. We further implement and deploy a prototype that consists of 16 distributed transmitters using USRP N210s in a 20 × 20 × 3 m 3 area. By sending more than 160M bits over our system to the receiver, depending on system parameter settings, we measure that the eavesdroppers failed to decode 30% − 60% of the bits cross multiple locations while the intended receiver has an estimated bit error ratio of 3 × 10 −6 .
2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2017
This paper contributes a systematic account of transaction anonymization techniques that do not r... more This paper contributes a systematic account of transaction anonymization techniques that do not require trust in a single entity and support the existing cryptographic currency Bitcoin. It surveys and compares four known techniques, proposes tailored metrics to identify the use of each technique (but not necessarily its users), and presents longitudinal measurements indicating adoption trends and teething troubles. There is a tradeoff between the choice of users' preferred protection mechanisms and the risk that pertaining transactions can be singled out, which hurts privacy due to smaller anonymity sets unless a critical mass adopts the mechanism.
A new game form termed games with incomplete awareness is defined. This game form captures unawar... more A new game form termed games with incomplete awareness is defined. This game form captures unawareness as to other players' actions, as well as unawareness of the existence of some players. It also captures interactive unawareness: the awareness of players as to what other players are aware of, and so on. The Nash equilibrium solution is extended to this game form and it is shown that every game with incomplete awareness possesses an extended Nash equilibrium.