Institution
University of Luxembourg
Education•Luxembourg, Luxembourg•
About: University of Luxembourg is a education organization based out in Luxembourg, Luxembourg. It is known for research contribution in the topics: Context (language use) & Computer science. The organization has 4744 authors who have published 22175 publications receiving 381824 citations.
Papers published on a yearly basis
Papers
More filters
••
03 Nov 2014TL;DR: In this paper, the authors present an efficient method to deanonymize Bitcoin users, which allows to link user pseudonyms to the IP addresses where the transactions are generated, and also show that a natural countermeasure of using Tor or other anonymity services can be cut-off by abusing anti-DoS countermeasures of the Bitcoin network.
Abstract: Bitcoin is a digital currency which relies on a distributed set of miners to mint coins and on a peer-to-peer network to broadcast transactions. The identities of Bitcoin users are hidden behind pseudonyms (public keys) which are recommended to be changed frequently in order to increase transaction unlinkability. We present an efficient method to deanonymize Bitcoin users, which allows to link user pseudonyms to the IP addresses where the transactions are generated. Our techniques work for the most common and the most challenging scenario when users are behind NATs or firewalls of their ISPs. They allow to link transactions of a user behind a NAT and to distinguish connections and transactions of different users behind the same NAT. We also show that a natural countermeasure of using Tor or other anonymity services can be cut-off by abusing anti-DoS countermeasures of the Bitcoin network. Our attacks require only a few machines and have been experimentally verified. The estimated success rate is between 11% and 60% depending on how stealthy an attacker wants to be. We propose several countermeasures to mitigate these new attacks.
357 citations
••
TL;DR: This correspondence studies cooperative jamming to increase the physical layer security of a wiretap fading channel via distributed relays and shows that the optimization problem can be solved using a combination of convex optimization and a one-dimensional search.
Abstract: This correspondence studies cooperative jamming (CJ) to increase the physical layer security of a wiretap fading channel via distributed relays. We first provide the feasible conditions on the positiveness of the secrecy rate and then show that the optimization problem can be solved using a combination of convex optimization and a one-dimensional search. Distributed implementation to realize the CJ solution and extension to deal with per group relays' power constraints are discussed.
356 citations
••
TL;DR: The proposed self-protection scheme eliminates the need for external helpers and provides system robustness and the optimal jamming covariance matrix is rank-1, and can be found via an efficient 1-D search.
Abstract: This paper studies secrecy rate optimization in a wireless network with a single-antenna source, a multi-antenna destination and a multi-antenna eavesdropper. This is an unfavorable scenario for secrecy performance as the system is interference-limited. In the literature, assuming that the receiver operates in half duplex (HD) mode, the aforementioned problem has been addressed via use of cooperating nodes who act as jammers to confound the eavesdropper. This paper investigates an alternative solution, which assumes the availability of a full duplex (FD) receiver. In particular, while receiving data, the receiver transmits jamming noise to degrade the eavesdropper channel. The proposed self-protection scheme eliminates the need for external helpers and provides system robustness. For the case in which global channel state information is available, we aim to design the optimal jamming covariance matrix that maximizes the secrecy rate and mitigates loop interference associated with the FD operation. We consider both fixed and optimal linear receiver design at the destination, and show that the optimal jamming covariance matrix is rank-1, and can be found via an efficient 1-D search. For the case in which only statistical information on the eavesdropper channel is available, the optimal power allocation is studied in terms of ergodic and outage secrecy rates. Simulation results verify the analysis and demonstrate substantial performance gain over conventional HD operation at the destination.
354 citations
••
TL;DR: In order to study the polarization induced by Abeta, microglia was stimulated with different forms of the peptide and found that the oligomeric Abeta is a stronger M1-inductor than the fibrillar form.
354 citations
••
TL;DR: In this article, a three-dimensional, extrinsically enriched meshfree method for initiation, branching, growth and coalescence of an arbitrary number of cracks in non-linear solids including large deformations, for statics and dynamics is presented.
352 citations
Authors
Showing all 4893 results
Name | H-index | Papers | Citations |
---|---|---|---|
Jun Wang | 166 | 1093 | 141621 |
Leroy Hood | 158 | 853 | 128452 |
Andreas Heinz | 108 | 1078 | 45002 |
Philippe Dubois | 101 | 1098 | 48086 |
John W. Berry | 97 | 351 | 52470 |
Michael Müller | 91 | 333 | 26237 |
Bart Preneel | 82 | 844 | 25572 |
Bjorn Ottersten | 81 | 1058 | 28359 |
Sander Kersten | 79 | 246 | 23985 |
Alexandre Tkatchenko | 77 | 271 | 26863 |
Rudi Balling | 75 | 238 | 19529 |
Lionel C. Briand | 75 | 380 | 24519 |
Min Wang | 72 | 716 | 19197 |
Stephen H. Friend | 70 | 184 | 53422 |
Ekhard K. H. Salje | 70 | 581 | 19938 |