88 results on '"Kate, Aniket"'
Search Results
2. Reparo: Publicly Verifiable Layer to Repair Blockchains
3. EESMR
4. FlexiRand: Output Private (Distributed) VRFs and Application to Blockchains
5. Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets
6. Pepal: Penalizing multimedia breaches and partial leakages
7. DLSAG: Non-interactive Refund Transactions for Interoperable Payment Channels in Monero
8. Oracle Agreement: From an Honest Super Majority to Simple Majority
9. SIM: Secure Interval Membership Testing and Applications to Secure Comparison
10. Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup
11. Flexible Signatures: Making Authentication Suitable for Real-Time Environments
12. RPM: Robust Anonymity at Scale
13. OptRand: Optimistically Responsive Reconfigurable Distributed Randomness
14. Breaking and Fixing Virtual Channels: Domino Attack and Donner
15. Last Mile of Blockchains: RPC and Node-as-a-service
16. cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations
17. OrgAn: Organizational Anonymity with Low Latency
18. Anonymous RAM
19. hbACSS: How to Robustly Share Many Secrets
20. Polymath: Low-Latency MPC via Secure Polynomial Evaluations and Its Applications
21. RandPiper Reconfiguration-Friendly Random Beacons with Quadratic Communication
22. OpenSquare: Decentralized Repeated Modular Squaring Service
23. Post-Quantum Forward-Secure Onion Routing
24. Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources
25. HACCLE: metaprogramming for secure multi-party computation
26. Toward Privacy-Aware Traceability for Automotive Supply Chains
27. Blockchains + Network Privacy = A Nightmare
28. BackRef: Accountability in Anonymous Communication Networks
29. Lime: Data Lineage in the Malicious Environment
30. CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin
31. Asynchronous Computational VSS with Reduced Communication Complexity
32. Computational Verifiable Secret Sharing Revisited
33. Distributed Private-Key Generators for Identity-Based Cryptography
34. Using Sphinx to Improve Onion Routing Circuit Construction
35. Constant-Size Commitments to Polynomials and Their Applications
36. Deceptive Deletions for Protecting Withdrawn Posts on Social Media Platforms
37. Verifiable Timed Signatures Made Practical
38. Comprehensive Anonymity Trilemma: User Coordination is not enough
39. MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies
40. A Tale of Two Trees: One Writes, and Other Reads
41. Finding Safety in Numbers with Secure Allegation Escrows
42. HoneyBadgerMPC and AsynchroMix
43. Towards Automatically Penalizing Multimedia Breaches (Extended Abstract)
44. Reducing Automotive Counterfeiting Using Blockchain: Benefits and Challenges
45. Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability
46. Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification
47. Lethe: Conceal Content Deletion from Persistent Observers
48. Why Johnny Can't Make Money With His Contents
49. ClearChart: Ensuring integrity of consumer ratings in online marketplaces
50. Blockchain Access Privacy: Challenges and Directions
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.