scispace - formally typeset
Search or ask a question
Institution

University of Luxembourg

EducationLuxembourg, Luxembourg
About: University of Luxembourg is a education organization based out in Luxembourg, Luxembourg. It is known for research contribution in the topics: Context (language use) & Computer science. The organization has 4744 authors who have published 22175 publications receiving 381824 citations.


Papers
More filters
Proceedings ArticleDOI
03 Nov 2014
TL;DR: In this paper, the authors present an efficient method to deanonymize Bitcoin users, which allows to link user pseudonyms to the IP addresses where the transactions are generated, and also show that a natural countermeasure of using Tor or other anonymity services can be cut-off by abusing anti-DoS countermeasures of the Bitcoin network.
Abstract: Bitcoin is a digital currency which relies on a distributed set of miners to mint coins and on a peer-to-peer network to broadcast transactions. The identities of Bitcoin users are hidden behind pseudonyms (public keys) which are recommended to be changed frequently in order to increase transaction unlinkability. We present an efficient method to deanonymize Bitcoin users, which allows to link user pseudonyms to the IP addresses where the transactions are generated. Our techniques work for the most common and the most challenging scenario when users are behind NATs or firewalls of their ISPs. They allow to link transactions of a user behind a NAT and to distinguish connections and transactions of different users behind the same NAT. We also show that a natural countermeasure of using Tor or other anonymity services can be cut-off by abusing anti-DoS countermeasures of the Bitcoin network. Our attacks require only a few machines and have been experimentally verified. The estimated success rate is between 11% and 60% depending on how stealthy an attacker wants to be. We propose several countermeasures to mitigate these new attacks.

357 citations

Journal ArticleDOI
TL;DR: This correspondence studies cooperative jamming to increase the physical layer security of a wiretap fading channel via distributed relays and shows that the optimization problem can be solved using a combination of convex optimization and a one-dimensional search.
Abstract: This correspondence studies cooperative jamming (CJ) to increase the physical layer security of a wiretap fading channel via distributed relays. We first provide the feasible conditions on the positiveness of the secrecy rate and then show that the optimization problem can be solved using a combination of convex optimization and a one-dimensional search. Distributed implementation to realize the CJ solution and extension to deal with per group relays' power constraints are discussed.

356 citations

Journal ArticleDOI
TL;DR: The proposed self-protection scheme eliminates the need for external helpers and provides system robustness and the optimal jamming covariance matrix is rank-1, and can be found via an efficient 1-D search.
Abstract: This paper studies secrecy rate optimization in a wireless network with a single-antenna source, a multi-antenna destination and a multi-antenna eavesdropper. This is an unfavorable scenario for secrecy performance as the system is interference-limited. In the literature, assuming that the receiver operates in half duplex (HD) mode, the aforementioned problem has been addressed via use of cooperating nodes who act as jammers to confound the eavesdropper. This paper investigates an alternative solution, which assumes the availability of a full duplex (FD) receiver. In particular, while receiving data, the receiver transmits jamming noise to degrade the eavesdropper channel. The proposed self-protection scheme eliminates the need for external helpers and provides system robustness. For the case in which global channel state information is available, we aim to design the optimal jamming covariance matrix that maximizes the secrecy rate and mitigates loop interference associated with the FD operation. We consider both fixed and optimal linear receiver design at the destination, and show that the optimal jamming covariance matrix is rank-1, and can be found via an efficient 1-D search. For the case in which only statistical information on the eavesdropper channel is available, the optimal power allocation is studied in terms of ergodic and outage secrecy rates. Simulation results verify the analysis and demonstrate substantial performance gain over conventional HD operation at the destination.

354 citations

Journal ArticleDOI
TL;DR: In order to study the polarization induced by Abeta, microglia was stimulated with different forms of the peptide and found that the oligomeric Abeta is a stronger M1-inductor than the fibrillar form.

354 citations

Journal ArticleDOI
TL;DR: In this article, a three-dimensional, extrinsically enriched meshfree method for initiation, branching, growth and coalescence of an arbitrary number of cracks in non-linear solids including large deformations, for statics and dynamics is presented.

352 citations


Authors

Showing all 4893 results

NameH-indexPapersCitations
Jun Wang1661093141621
Leroy Hood158853128452
Andreas Heinz108107845002
Philippe Dubois101109848086
John W. Berry9735152470
Michael Müller9133326237
Bart Preneel8284425572
Bjorn Ottersten81105828359
Sander Kersten7924623985
Alexandre Tkatchenko7727126863
Rudi Balling7523819529
Lionel C. Briand7538024519
Min Wang7271619197
Stephen H. Friend7018453422
Ekhard K. H. Salje7058119938
Network Information
Related Institutions (5)
Royal Institute of Technology
68.4K papers, 1.9M citations

90% related

University of York
56.9K papers, 2.4M citations

90% related

ETH Zurich
122.4K papers, 5.1M citations

90% related

Carnegie Mellon University
104.3K papers, 5.9M citations

90% related

École Polytechnique Fédérale de Lausanne
98.2K papers, 4.3M citations

90% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202360
2022250
20211,671
20201,776
20191,710
20181,663