Inferring Sensitive Information in Cryptocurrency Off-Chain Networks Using Probing and Timing Attacks.
Utz NisslmuellerKlaus-Tycho FoersterStefan SchmidChristian DeckerPublished in: ICISSP (Revised Selected Papers) (2020)
Keyphrases
- sensitive information
- third party
- malicious users
- information leakage
- privacy preserving
- privacy preservation
- original data
- private information
- data privacy
- privacy preserving data publishing
- private data
- data publishing
- sensitive data
- privacy protection
- confidential information
- protect sensitive
- medical records
- privacy issues
- data sets
- data security
- watermarking scheme
- nearest neighbor
- social networks