Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Ian Miers"'
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030939434
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::512da86846b712fe1e8d324777808f0d
https://doi.org/10.1007/978-3-030-93944-1_17
https://doi.org/10.1007/978-3-030-93944-1_17
Publikováno v:
CCS
Many privacy-preserving protocols employ a primitive that allows a sender to "flag" a message to a recipient's public key, such that only the recipient (who possesses the corresponding secret key) can detect that the message is intended for their use
Publikováno v:
Sustainable and Resilient Infrastructure. 4:36-49
Hospital cybersecurity has become a growing concern with an increasing number of cyberattacks against hospitals and health care facilities. We aim to tackle this issue by developing a model to capt...
Publikováno v:
CCS
Messaging systems are used to spread misinformation and other malicious content, often with dire consequences. End-to-end encryption improves privacy but hinders content-based moderation and, in particular, obfuscates the original source of malicious
Publikováno v:
CCS
We present a new primitive supporting file replication in distributed storage networks (DSNs) called a Public Incompressible Encoding (PIE). PIEs operate in the challenging public DSN setting where files must be encoded and decoded with public random
Publikováno v:
AFT
The growing adoption of digital assets---including but not limited to cryptocurrencies, tokens, and even identities---calls for secure and robust digital assets custody. A common way to distribute the ownership of a digital asset is (M, N)-threshold
Publikováno v:
Advances in Cryptology – CRYPTO 2019 ISBN: 9783030269531
CRYPTO (3)
CRYPTO (3)
Content moderation is crucial for stopping abusive and harassing messages in online platforms. Existing moderation mechanisms, such as message franking, require platform providers to be able to associate user identifiers to encrypted messages. These
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6462a29d2a2c858034b09d089c7af713
https://doi.org/10.1007/978-3-030-26954-8_8
https://doi.org/10.1007/978-3-030-26954-8_8
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783030321000
Financial Cryptography
Financial Cryptography
Cryptocurrencies record transactions between parties in a blockchain maintained by a peer-to-peer network. In most cryptocurrencies, transactions explicitly identify the previous transaction providing the funds they are spending, revealing the amount
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3a4b46d59a8aaab07fd55bdd545a1f9a
https://doi.org/10.1007/978-3-030-32101-7_12
https://doi.org/10.1007/978-3-030-32101-7_12
Publikováno v:
NDSS
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319968773
CRYPTO (3)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – CRYPTO 2018
Advances in Cryptology – CRYPTO 2018-38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III
CRYPTO (3)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – CRYPTO 2018
Advances in Cryptology – CRYPTO 2018-38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III
By design, existing (pre-processing) zk-SNARKs embed a secret trapdoor in a relation-dependent common reference strings (CRS). The trapdoor is exploited by a (hypothetical) simulator to prove the scheme is zero knowledge, and the secret-dependent str
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4dfc13729ae59ca5beeb15db5f9ac39e
https://doi.org/10.1007/978-3-319-96878-0_24
https://doi.org/10.1007/978-3-319-96878-0_24