1,010 research outputs found

    PALPAS - PAsswordLess PAssword Synchronization

    Full text link
    Tools that synchronize passwords over several user devices typically store the encrypted passwords in a central online database. For encryption, a low-entropy, password-based key is used. Such a database may be subject to unauthorized access which can lead to the disclosure of all passwords by an offline brute-force attack. In this paper, we present PALPAS, a secure and user-friendly tool that synchronizes passwords between user devices without storing information about them centrally. The idea of PALPAS is to generate a password from a high entropy secret shared by all devices and a random salt value for each service. Only the salt values are stored on a server but not the secret. The salt enables the user devices to generate the same password but is statistically independent of the password. In order for PALPAS to generate passwords according to different password policies, we also present a mechanism that automatically retrieves and processes the password requirements of services. PALPAS users need to only memorize a single password and the setup of PALPAS on a further device demands only a one-time transfer of few static data.Comment: An extended abstract of this work appears in the proceedings of ARES 201

    Privacy-preserving techniques for computer and network forensics

    Get PDF
    Clients, administrators, and law enforcement personnel have many privacy concerns when it comes to network forensics. Clients would like to use network services in a freedom-friendly environment that protects their privacy and personal data. Administrators would like to monitor their network, and audit its behavior and functionality for debugging and statistical purposes (which could involve invading the privacy of its network users). Finally, members of law enforcement would like to track and identify any type of digital crimes that occur on the network, and charge the suspects with the appropriate crimes. Members of law enforcement could use some security back doors made available by network administrators, or other forensic tools, that could potentially invade the privacy of network users. In my dissertation, I will be identifying and implementing techniques that each of these entities could use to achieve their goals while preserving the privacy of users on the network. I will show a privacy-preserving implementation of network flow recording that can allow administrators to monitor and audit their network behavior and functionality for debugging and statistical purposes without having this data contain any private information about its users. This implementation is based on identity-based encryption and differential privacy. I will also be showing how law enforcement could use timing channel techniques to fingerprint anonymous servers that are running websites with illegal content and services. Finally I will show the results from a thought experiment about how network administrators can identify pattern-like software that is running on clients\u27 machines remotely without any administrative privileges. The goal of my work is to understand what privileges administrators or law enforcement need to achieve their goals, and the privacy issues inherent in this, and to develop technologies that help administrators and law enforcement achieve their goals while preserving the privacy of network users

    Issues in Esahie Nominal Morphology: From Inflection to Word-formation

    Get PDF
    The present study is a documentation-oriented research which aims at exploring the nominal morphology of Esahie, an otherwise unexplored cross-border Kwa language. Essentially, it examines pertinent inflectional and word formation issues in the nominal domain of Esahie such as noun class system, agreement, syncretism, nominalization, and compounding. The overall goal of this thesis is to investigate and provide a comprehensive account of the attested types, structure, formation, and the lexical semantics of nouns and nominalizations in Esahie. This thesis also seeks to understand what the facts about the structure and formation of nouns and nominalizations in Esahie reveal about the nature of the interface between morphology, phonology, syntax, and semantics, and about the architecture of the grammar in general. In interpreting the Esahie data, we ultimately hope to contribute to current theoretical debates by presenting empirical arguments in support of an abstractive, rather than a constructive view of morphology, by arguing that adopting the formalism of Construction Morphology (CxM, see Booij 2010a-d), as an abstractive model, comes with many advantages. We show that the formalism espoused in CxM is able to deal adequately with all the inflectional and word formation issues discussed in this thesis, including the irregular (non-canonical) patterns which are characterized either by cumulative exponence or extra-compositionality. With regards to compounding, this study confirms the view (cf. Appah 2013; 2015; Akrofi-Ansah 2012b; Lawer 2017) that, in Kwa, notwithstanding the word class of the input elements, the output of a compounding operation is always a nominal. This characterization points to a fascinating (mutual) interplay between the word-formation phenomena of compounding and nominalization, since the former operation invariably feeds into the latter. Overall, this thesis shows that nominalization is a prominent word-formation operation in Kwa grammar. Data used in this thesis emanates from several fieldtrips carried out in some Esahie speaking communities in the Western-North region of Ghana, as well as other secondary sources

    Faculty Publications & Presentations, 2008-2009

    Get PDF
    • …
    corecore