Theo dõi
Aniket Kate
Aniket Kate
Purdue University / Supra Research
Email được xác minh tại purdue.edu - Trang chủ
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
Constant-size commitments to polynomials and their applications
A Kate, G Zaverucha, I Goldberg
Advances in Cryptology-ASIACRYPT 2010, 177-194, 2010
8512010
CoinShuffle: Practical decentralized coin mixing for Bitcoin
T Ruffing, P Moreno-Sanchez, A Kate
European Symposium on Research in Computer Security (ESORICS) 2014, 2014
6132014
Anonymous multi-hop locks for blockchain scalability and interoperability
G Malavolta, P Moreno-Sanchez, C Schneidewind, A Kate, M Maffei
Cryptology ePrint Archive, 2018
3632018
Concurrency and privacy with payment-channel networks
G Malavolta, P Moreno-Sanchez, A Kate, M Maffei, S Ravi
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
3562017
Blockchain access privacy: Challenges and directions
R Henry, A Herzberg, A Kate
IEEE Security & Privacy 16 (4), 38-45, 2018
3452018
Settling payments fast and private: Efficient decentralized routing for path-based transactions
S Roos, P Moreno-Sanchez, A Kate, I Goldberg
NDSS, 2018
2842018
Anonymity and security in delay tolerant networks
A Kate, GM Zaverucha, U Hengartner
SecureComm 2007. Third International Conference on Security and Privacy in …, 2007
2162007
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks
G Malavolta, P Moreno-Sanchez, A Kate, M Maffei
NDSS, 2017
2112017
Distributed Key Generation in the Wild
A Kate, Y Huang, I Goldberg
IACR Cryptology ePrint Archive, 2012: 377, 2012, 2012
195*2012
Obliviad: Provably secure and practical online behavioral advertising
M Backes, A Kate, M Maffei, K Pecina
2012 IEEE Symposium on Security and Privacy, 257-271, 2012
1802012
P2P mixing and unlinkable Bitcoin transactions
T Ruffing, P Moreno-Sanchez, A Kate
NDSS 17, 2017
1792017
Data lineage in malicious environments
M Backes, N Grimm, A Kate
IEEE Transactions on Dependable and Secure Computing 13 (2), 178-191, 2015
1772015
Distributed private-key generators for identity-based cryptography
A Kate, I Goldberg
Security and Cryptography for Networks, 436-453, 2010
143*2010
AnoA: A Framework for Analyzing Anonymous Communication Protocols
M Backes, A Kate, P Manoharan, S Meiser, E Mohammadi
Journal of Privacy and Confidentiality 7 (2), 79-125, 2016
1412016
cMix: Mixing with minimal real-time asymmetric cryptographic operations
D Chaum, D Das, F Javani, A Kate, A Krasnova, J De Ruiter, AT Sherman
Applied Cryptography and Network Security: 15th International Conference …, 2017
130*2017
Anonymity trilemma: Strong anonymity, low bandwidth overhead, low latency-choose two
D Das, S Meiser, E Mohammadi, A Kate
2018 IEEE Symposium on Security and Privacy (SP), 108-126, 2018
1252018
Honeybadgermpc and asynchromix: Practical asynchronous mpc and its application to anonymous communication
D Lu, T Yurek, S Kulshreshtha, R Govind, A Kate, A Miller
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1222019
Pairing-based onion routing
A Kate, G Zaverucha, I Goldberg
Privacy Enhancing Technologies: 7th International Symposium, PET 2007 Ottawa …, 2007
1142007
Computational verifiable secret sharing revisited
M Backes, A Kate, A Patra
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
1092011
Liar, liar, coins on fire! Penalizing equivocation by loss of bitcoins
T Ruffing, A Kate, D Schröder
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1042015
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20