Travis Mayberry

According to our database1, Travis Mayberry authored at least 30 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Blind My - An Improved Cryptographic Protocol to Prevent Stalking in Apple's Find My Network.
Proc. Priv. Enhancing Technol., January, 2023

2021
Three Years Later: A Study of MAC Address Randomization In Mobile Devices And When It Succeeds.
Proc. Priv. Enhancing Technol., 2021

Iterative Oblivious Pseudo-Random Functions and Applications.
IACR Cryptol. ePrint Arch., 2021

Who Tracks the Trackers?: Circumventing Apple's Anti-Tracking Alerts in the Find My Network.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021

2019
Handoff All Your Privacy - A Review of Apple's Bluetooth Low Energy Continuity Protocol.
Proc. Priv. Enhancing Technol., 2019

Handoff All Your Privacy: A Review of Apple's Bluetooth Low Energy Implementation.
CoRR, 2019

rORAM: Efficient Range ORAM with O(log2 N) Locality.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Exploiting TLS Client Authentication for Widespread User Tracking.
Proc. Priv. Enhancing Technol., 2018

Efficient Range ORAM with 핆(log<sup>2</sup>N) Locality.
IACR Cryptol. ePrint Arch., 2018

2017
A Study of MAC Address Randomization in Mobile Devices and When it Fails.
Proc. Priv. Enhancing Technol., 2017

Deterministic, Stash-Free Write-Only ORAM.
IACR Cryptol. ePrint Arch., 2017

How Much Privacy Does $3, 165 Buy You?
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

A graph-theoretic approach to virtual access point correlation.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Multi-client Oblivious RAM Secure Against Malicious Servers.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
ObliviSync: Practical Oblivious File Backup and Synchronization.
IACR Cryptol. ePrint Arch., 2016

2015
Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists.
Proc. Priv. Enhancing Technol., 2015

Constant Communication Oblivious RAM.
IACR Cryptol. ePrint Arch., 2015

Constant Communication ORAM without Encryption.
IACR Cryptol. ePrint Arch., 2015

Multi-User Oblivious RAM Secure Against Malicious Servers.
IACR Cryptol. ePrint Arch., 2015

Resizable Tree-Based Oblivious RAM.
Proceedings of the Financial Cryptography and Data Security, 2015

Constant Communication ORAM with Small Blocksize.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Resizable Tree-Based Oblivious RAM.
IACR Cryptol. ePrint Arch., 2014

Toward Robust Hidden Volumes using Write-Only Oblivious RAM.
IACR Cryptol. ePrint Arch., 2014

Efficient Private File Retrieval by Combining ORAM and PIR.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Path-PIR: Lower Worst-Case Bounds by Combining ORAM and PIR.
IACR Cryptol. ePrint Arch., 2013

Practical Privacy-Preserving Range and Sort Queries with Update-Oblivious Linked Lists.
IACR Cryptol. ePrint Arch., 2013

2012
PIRMAP: Efficient Private Information Retrieval for MapReduce.
IACR Cryptol. ePrint Arch., 2012

2011
Dedicated vs. distributed: A study of mission survivability metrics.
Proceedings of the MILCOM 2011, 2011

2010
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy.
Proceedings of the 19th USENIX Security Symposium, 2010



  Loading...