Search

Your search keyword '"Kate, Aniket"' showing total 25 results

Search Constraints

Start Over You searched for: Author "Kate, Aniket" Remove constraint Author: "Kate, Aniket" Publication Type Reports Remove constraint Publication Type: Reports
25 results on '"Kate, Aniket"'

Search Results

1. V3rified: Revelation vs Non-Revelation Mechanisms for Decentralized Verifiable Computation

2. Optimal Sharding for Scalable Blockchains with Deconstructed SMR

3. Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles

4. Front-running Attack in Sharded Blockchains and Fair Cross-shard Consensus

5. DORA: Distributed Oracle Agreement with Simple Majority

6. EESMR: Energy Efficient BFT-SMR for the masses

7. Order but Not Execute in Order

8. Last Mile of Blockchains: RPC and Node-as-a-service

9. The Danger of Small Anonymity Sets in Privacy-Preserving Payment Systems

10. More is Merrier: Relax the Non-Collusion Assumption in Multi-Server PIR

11. HACCLE: Metaprogramming for Secure Multi-Party Computation -- Extended Version

12. Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures

13. Towards Overcoming the Undercutting Problem

14. Deceptive Deletions for Protecting Withdrawn Posts on Social Platforms

15. Reparo: Publicly Verifiable Layer to Repair Blockchains

16. Concurrency and Privacy with Payment-Channel Networks

17. A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains

18. Brief Note: Asynchronous Verifiable Secret Sharing with Optimal Resilience and Linear Amortized Overhead

19. Finding Safety in Numbers with Secure Allegation Escrows

20. Forgetting the Forgotten with Letheia, Concealing Content Deletion from Persistent Observers

21. Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions

22. Mind Your Credit: Assessing the Health of the Ripple Credit Network

23. Lime: Data Lineage in the Malicious Environment

24. Introducing Accountability to Anonymity Networks

25. Adding Query Privacy to Robust DHTs

Catalog

Books, media, physical & digital resources