Items where Author is "Kate, Aniket"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 47.

Article

Backes, Michael and Hanzlik, Lucjan and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2019) Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup.
Proceedings of the 22nd edition of the International Conference on Practice and Theory of Public Key Cryptography (PKC 2019).
(In Press)

Minaei, Mohsen and Mondal, Mainack and Loiseau, Patrick and Gummadi, Krishna P. and Kate, Aniket
(2017) Forgetting the Forgotten with Letheia, Concealing Content Deletion from Persistent Observers.
CoRR, abs/17.

Mondal, Mainack and Messias, Johnnatan and Ghosh, Saptarshi and Gummadi, Krishna P. and Kate, Aniket
(2017) Longitudinal Privacy Management in Social Media: The Need for Better Controls.
IEEE Internet Computing, 21 (3). 48–55.

Moreno-Sanchez, Pedro and Zafar, Muhammad Bilal and Kate, Aniket
(2016) Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network.
Proceedings on Privacy Enhancing Technologies, 2016 (4). 436–453. ISSN 2299-0984

Backes, Michael and Grimm, Niklas and Kate, Aniket
(2015) Data Lineage in Malicious Environments.
IEEE Transactions on Dependable and Secure Computing, 13 (2). 178 - 191. ISSN 1545-5971

Pryvalov, Ivan and Kate, Aniket
(2014) Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange.
IACR Cryptology ePrint Archive, 2014. p. 247.

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014) Privacy-preserving Data Aggregation with Optimal Utility.
IACR Cryptology ePrint Archive, 2014. p. 482.

Young, Maxwell and Kate, Aniket and Goldberg, Ian and Karsten, Martin
(2013) Towards Practical Communication in Byzantine-Resistant DHTs.
Networking, IEEE/ACM Transactions on, 21 (1). pp. 190-203.

Backes, Michael and Clark, Jeremy and Druschel, Peter and Kate, Aniket and Simeonovski, Milivoj
(2013) Introducing Accountability to Anonymity Networks.
CoRR, abs/13.

Kate, Aniket and Huang, Yizhou and Goldberg, Ian
(2012) Distributed Key Generation in the Wild.
IACR Cryptology ePrint Archive, 2012. p. 377.

Book Section

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2015) Achieving Optimal Utility for Distributed Differential Privacy Using SMPC.
In: UNSPECIFIED Cryptology and Information Security Series, 13 . IOS Press, 81 - 105.

Conference or Workshop Item

Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket
(2017) P2P Mixing and Unlinkable Bitcoin Transactions.
In: Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17).
Conference: NDSS - Network and Distributed System Security Symposium

Malavolta, Giulio and Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo
(2017) SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks.
In: Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17).
Conference: NDSS - Network and Distributed System Security Symposium

Malavolta, Giulio and Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo and Ravi, Srivatsan
(2017) Concurrency and Privacy with Payment-Channel Networks.
In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017.
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2016) Anonymous RAM.
In: 21st European Symposium on Research in Computer Security (ESORICS).
Conference: ESORICS - European Symposium On Research In Computer Security

Mondal, Mainack and Messias, Johnnatan and Ghosh, Saptarshi and Gummadi, Krishna P. and Kate, Aniket
(2016) Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data.
In: 12th Symposium on Usable Privacy and Security (SOUPS'16).
Conference: None | Not Set

Kate, Aniket
(2016) Introduction to Credit Networks: Security, Privacy, and Applications.
In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016.
Conference: CCS - ACM Conference on Computer and Communications Security

Ruffing, Tim and Kate, Aniket and Schröder, Dominique
(2015) Liar, Liar, Coins on Fire! — Penalizing Equivocation By Loss of Bitcoins.
In: Proceedings of the 22nd ACM conference on Computer and communications security (ACM CCS '15).
Conference: CCS - ACM Conference on Computer and Communications Security

Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo and Pecina, Kim
(2015) Privacy Preserving Payments in Credit Networks.
In: Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS '15).
Conference: NDSS - Network and Distributed System Security Symposium

Backes, Michael and Kate, Aniket and Meiser, Sebastian and Ruffing, Tim
(2015) Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources.
In: Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS'15).
Conference: None | Not Set

Viswanath, Bimal and Bashir, Muhammad Ahmad and Zafar, Muhammad Bilal and Bouget, Simon and Guha, Saikat and Gummadi, Krishna P. and Kate, Aniket and Mislove, Alan
(2015) Strength in Numbers: Robust Tamper Detection in Crowd Computations.
In: Proceedings of the 2015 ACM on Conference on Online Social Networks, COSN 2015, Palo Alto, California, USA, November 2-3, 2015.
Conference: None | Not Set

Ghosh, Satrajit and Kate, Aniket
(2015) Post-Quantum Forward-Secure Onion Routing - (Future Anonymity in Today's Budget).
In: Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers.
Conference: None | Not Set

Porto, Daniel and Leitão, João and Li, Cheng and Clement, Allen and Kate, Aniket and Junqueira, Flavio Paiva and Rodrigues, Rodrigo
(2015) Visigoth fault tolerance.
In: Proceedings of the Tenth European Conference on Computer Systems, EuroSys 2015, Bordeaux, France, April 21-24, 2015.
Conference: EuroSys - Eurosys Conference

Backes, Michael and Kate, Aniket and Meiser, Sebastian and Mohammadi, Esfandiar
(2014) (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection.
In: Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Grimm, Niklas and Kate, Aniket
(2014) Lime: Data Lineage in the Malicious Environment.
In: Proceedings of 10th International Workshopon Security and Trust Management (STM).
Conference: None | Not Set

Backes, Michael and Bendun, Fabian and Choudhury, Ashish and Kate, Aniket
(2014) Asynchronous MPC with a Strict Honest Majority Using Non-equivocation.
In: ACM Symposium on Principles of Distributed Computing 2014.
Conference: PODC - ACM Symposium on Principles of Distributed Computing

Backes, Michael and Clark, Jeremy and Kate, Aniket and Simeonovski, Milivoj and Druschel, Peter
(2014) BackRef: Accountability in Anonymous Communication Networks.
In: Applied Cryptography and Network Security.
Conference: None | Not Set

Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket
(2014) CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin.
In: Proc. of the 19th European Symposium on Research in Computer Security (ESORICS 2014).

Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket
(2014) CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin.
In: 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).
Conference: None | Not Set

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014) Differentially Private Data Aggregation with Optimal Utility.
In: 30th Annual Computer Security Applications Conference (ACSAC).
Conference: ACSAC - Annual Computer Security Applications Conference

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014) Privacy-preserving Data Aggregation with Optimal Utility Using Arithmetic SMC -- Extended Abstract.
In: Workshop on Usable and Efficient Secure Multiparty Computation -- Satellite Event of ESORICS.
Conference: None | Not Set

Backes, Michael and Kate, Aniket and Manoharan, Praveen and Meiser, Sebastian and Mohammadi, Esfandiar
(2013) AnoA: A Framework For Analyzing Anonymous Communication Protocols.
In: Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF '13).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Kate, Aniket and Manoharan, Praveen and Meiser, Sebastian and Mohammadi, Esfandiar
(2013) AnoA: A Framework for Analyzing Anonymous Communication Protocols.
In: 6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).
Conference: None | Not Set

Backes, Michael and Datta, Amit and Kate, Aniket
(2013) Asynchronous Computational VSS with Reduced Communication Complexity.
In: Proc. of the 2013 Cryptographers' Track at the RSA Conference (CT-RSA 2013).
Conference: None | Not Set

Ruffing, Tim and Schneider, Jonas and Kate, Aniket
(2013) Identity-Based Steganography and Its Applications to Censorship Resistance.
In: 6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2013).
Conference: None | Not Set

Ruffing, Tim and Schneider, Jonas and Kate, Aniket
(2013) Poster: Identity-Based Steganography and Its Applications to Censorship Resistance.
In: Proceedings of the 20th ACM Conference on Computer and Communication Security (CCS '13).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Kate, Aniket and Mohammadi, Esfandiar
(2012) Ace: An Efficient Key-Exchange Protocol for Onion Routing.
In: Proceedings of the 11th ACM Workshop on Privacy in the Electronic Society (WPES).
Conference: None | Not Set

Backes, Michael and Bendun, Fabian and Kate, Aniket
(2012) Brief announcement: distributed cryptography using trinc.
In: ACM Symposium on Principles of Distributed Computing 2012.
Conference: PODC - ACM Symposium on Principles of Distributed Computing

Backes, Michael and Kate, Aniket and Maffei, Matteo and Pecina, Kim
(2012) ObliviAd: Provably Secure and Practical Online Behavioral Advertising.
In: Proceedings of the 33rd IEEE Symposium on Security and Privacy 2012 (Oakland 2012).
Conference: S&P - IEEE Symposium on Security and Privacy

Backes, Michael and Goldberg, Ian and Kate, Aniket and Toft, Tomas
(2012) Adding query privacy to robust DHTs.
In: Proc. of the 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012).
Conference: None | Not Set

Clement, Allen and Junqueira, Flavio and Kate, Aniket and Rodrigues, Rodrigo
(2012) On the (limited) power of non-equivocation.
In: Proc. of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2012).

Backes, Michael and Kate, Aniket and Goldberg, Ian and Mohammadi, Esfandiar
(2012) Provably Secure and Practical Onion Routing.
In: Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Kate, Aniket and Patra, Arpita
(2011) Computational Verifiable Secret Sharing Revisited.
In: Proc. 17th International Conference on the Theory and Application of Cryptology (ASIACRYPT 2011).
Conference: ASIACRYPT - International Conference on the Theory and Application of Cryptology and Information Security

Kate, Aniket and Zaverucha, Gregory M. and Goldberg, Ian
(2010) Constant-Size Commitments to Polynomials and Their Applications.
In: Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings.
Conference: ASIACRYPT - International Conference on the Theory and Application of Cryptology and Information Security

Kate, Aniket and Goldberg, Ian
(2010) Distributed Private-Key Generators for Identity-Based Cryptography.
In: Security and Cryptography for Networks, 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings.
Conference: None | Not Set

Kate, Aniket and Goldberg, Ian
(2010) Using Sphinx to Improve Onion Routing Circuit Construction.
In: Financial Cryptography and Data Security, 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers.
Conference: None | Not Set

Other

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014) Differentially Private Data Aggregation with Optimal Utility.
UNSPECIFIED
.

This list was generated on Mon Apr 22 00:03:18 2019 CEST.