Private Resource Allocators and Their Applications

Private Resource Allocators and Their Applications

IEEE Symposium on Security and Privacy via YouTube Direct link

Our paper also describes

16 of 16

16 of 16

Our paper also describes

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Private Resource Allocators and Their Applications

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 When an application consumes resources...
  3. 3 Attack on anonymous messengers [WPES '18]
  4. 4 Other examples of resource allocation
  5. 5 Allocation indistinguishability
  6. 6 Avoiding trivial allocators
  7. 7 Easy to distinguish FIFO allocator
  8. 8 Easy to distinguish Random allocator
  9. 9 Giving up work conservation is not enough
  10. 10 It is impossible for an allocator to be private and live unless the number of processes is bounded a priori
  11. 11 Slot-based allocator (bounded universe)
  12. 12 Random w/ dummies (bounded active proc.)
  13. 13 In many settings it is hard to bound #active processes due to, e.g., sybils
  14. 14 Diff. private allocator (bounded active honest)
  15. 15 Comparison of PRA efficiency
  16. 16 Our paper also describes

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.