Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security 2019
DOI: 10.1145/3319535.3354204
|View full text |Cite
|
Sign up to set email alerts
|

PrivDPI

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…sexual or drug-related. However the technology used tends to be more highly related to the corporate network monitoring methods-we found many papers for which the technical scheme was self-described for use in both settings [54,55,108,150,182,215,216,226,274,336,336].…”
Section: B1 On the Inclusion Of Privacy-preserving Deep Packet Inspec...mentioning
confidence: 99%
See 2 more Smart Citations
“…sexual or drug-related. However the technology used tends to be more highly related to the corporate network monitoring methods-we found many papers for which the technical scheme was self-described for use in both settings [54,55,108,150,182,215,216,226,274,336,336].…”
Section: B1 On the Inclusion Of Privacy-preserving Deep Packet Inspec...mentioning
confidence: 99%
“…MPC or Searchable Encryption [8,36,54,55,59,94,107,108,150,153,182,199,215,216,225,226,228,246,273,274,295,309,311,336,382] (total: 25) Trusted Execution Environment [78,104,157,158,213,271,294,295,328,339,356,357,369,380] (total: 14) Other [137,295,310,337,387] (total: 5)…”
Section: Corporate Network Monitoringmentioning
confidence: 99%
See 1 more Smart Citation
“…The solutions using middlebox searchable encryption (Canard et al, 2017;Ning et al, 2019;Sherry et al, 2015) need an extra monitoring channel that is required for the inspection. Unfortunately, this is hard to be adopted in Internet servers due to the compatibility issue that we mentioned.…”
Section: Compatibilitymentioning
confidence: 99%
“…Another challenge of using Blind Box (Sherry et al, 2015) and PrivDPI (Ning et al, 2019) is validation. Those middlebox solutions require at least one party to be trusted and this trusted party must validate data to guarantee that the data packets transmitted in an encryption channel and a monitoring channel are the same.…”
Section: Validationmentioning
confidence: 99%