We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. RFID Security

    Living reference work entry 2024
  2. Protocol

    Living reference work entry 2024
  3. Vulnerability Metrics

    Living reference work entry 2024
  4. Threshold Signature

    Living reference work entry 2024
  5. Metrics of Software Security

    Guido Salvaneschi, Paolo Salvaneschi in Encyclopedia of Cryptography, Security and Privacy
    Living reference work entry 2024
  6. Theorem Proving and Security

    Living reference work entry 2024
  7. Oblivious RAM (ORAM)

    Alessandro Barenghi, Gerardo Pelosi in Encyclopedia of Cryptography, Security and Privacy
    Living reference work entry 2024
  8. Byzantine Agreement

    Living reference work entry 2024
  9. Complexity-Approximation Trade-Offs in Exchange Mechanisms: AMMs vs. LOBs

    This paper presents a general framework for the design and analysis of exchange mechanisms between two assets that unifies and enables comparisons...
    Jason Milionis, Ciamac C. Moallemi, Tim Roughgarden in Financial Cryptography and Data Security
    Conference paper 2024
  10. Eagle: Efficient Privacy Preserving Smart Contracts

    The proliferation of Decentralised Finance (DeFi) and Decentralised Autonomous Organisations (DAO), which in current form are exposed to...
    Carsten Baum, James Hsin-yu Chiang, ... Tore Kasper Frederiksen in Financial Cryptography and Data Security
    Conference paper 2024
  11. Provably Avoiding Geographic Regions for Tor’s Onion Services

    Tor, a peer-to-peer anonymous communication system, is one of the most effective tools in providing free and open communication online. Many of the...
    Arushi Arora, Raj Karra, ... Christina Garman in Financial Cryptography and Data Security
    Conference paper 2024
  12. Smart Noise Detection for Statistical Disclosure Attacks

    While anonymization systems like mix networks can provide privacy to their users by, e.g., hiding their communication relationships, several traffic...
    Marc Roßberger, Doğan Kesdoğan in Secure IT Systems
    Conference paper 2024
  13. Synchronous Perfectly Secure Message Transmission with Optimal Asynchronous Fallback Guarantees

    Secure message transmission (SMT) constitutes a fundamental network-layer building block for distributed protocols over incomplete networks. More...
    Giovanni Deligios, Chen-Da Liu-Zhang in Financial Cryptography and Data Security
    Conference paper 2024
  14. To Possess or Not to Possess - WhatsApp for Android Revisited with a Focus on Stickers

    WhatsApp stickers are a popular hybrid of images and emoticons that can contain user-created content. Stickers are mostly sent for legitimate...
    Samantha Klier, Harald Baier in Secure IT Systems
    Conference paper 2024
  15. On the Correlation Complexity of MPC with Cheater Identification

    Composable protocols for Multi-Party Computation that provide security with Identifiable Abort against a dishonest majority require some form of...
    Nicholas Brandt, Sven Maier, ... Jörn Müller-Quade in Financial Cryptography and Data Security
    Conference paper 2024
Did you find what you were looking for? Share feedback.