Number of items: 48.
Conference or Workshop Item (A Paper)
Thyagarajan, Sri Aravinda Krishnan and Bhat, Adithya and Malavolta, Giulio and Nico, Döttling and Kate, Aniket and Schröder, Dominique
(2020)
Verifiable Timed Signatures Made Practical.
Backes, Michael and Hanzlik, Lucjan and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2019)
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup.
(In Press)
Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket
(2017)
P2P Mixing and Unlinkable Bitcoin Transactions.
Malavolta, Giulio and Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo
(2017)
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks.
Malavolta, Giulio and Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo and Ravi, Srivatsan
(2017)
Concurrency and Privacy with Payment-Channel Networks.
Backes, Michael and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2016)
Anonymous RAM.
Mondal, Mainack and Messias, Johnnatan and Ghosh, Saptarshi and Gummadi, Krishna P. and Kate, Aniket
(2016)
Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data.
Kate, Aniket
(2016)
Introduction to Credit Networks: Security, Privacy, and Applications.
Ruffing, Tim and Kate, Aniket and Schröder, Dominique
(2015)
Liar, Liar, Coins on Fire! — Penalizing Equivocation By Loss of Bitcoins.
Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo and Pecina, Kim
(2015)
Privacy Preserving Payments in Credit Networks.
Backes, Michael and Kate, Aniket and Meiser, Sebastian and Ruffing, Tim
(2015)
Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources.
Viswanath, Bimal and Bashir, Muhammad Ahmad and Zafar, Muhammad Bilal and Bouget, Simon and Guha, Saikat and Gummadi, Krishna P. and Kate, Aniket and Mislove, Alan
(2015)
Strength in Numbers: Robust Tamper Detection in Crowd Computations.
Ghosh, Satrajit and Kate, Aniket
(2015)
Post-Quantum Forward-Secure Onion Routing - (Future Anonymity in Today's Budget).
Porto, Daniel and Leitão, João and Li, Cheng and Clement, Allen and Kate, Aniket and Junqueira, Flavio Paiva and Rodrigues, Rodrigo
(2015)
Visigoth fault tolerance.
Backes, Michael and Kate, Aniket and Meiser, Sebastian and Mohammadi, Esfandiar
(2014)
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection.
Backes, Michael and Grimm, Niklas and Kate, Aniket
(2014)
Lime: Data Lineage in the Malicious Environment.
Backes, Michael and Bendun, Fabian and Choudhury, Ashish and Kate, Aniket
(2014)
Asynchronous MPC with a Strict Honest Majority Using Non-equivocation.
Backes, Michael and Clark, Jeremy and Kate, Aniket and Simeonovski, Milivoj and Druschel, Peter
(2014)
BackRef: Accountability in Anonymous Communication Networks.
Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket
(2014)
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin.
Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket
(2014)
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin.
Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014)
Differentially Private Data Aggregation with Optimal Utility.
Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014)
Privacy-preserving Data Aggregation with Optimal Utility Using Arithmetic SMC -- Extended Abstract.
Backes, Michael and Kate, Aniket and Manoharan, Praveen and Meiser, Sebastian and Mohammadi, Esfandiar
(2013)
AnoA: A Framework For Analyzing Anonymous Communication Protocols.
Backes, Michael and Kate, Aniket and Manoharan, Praveen and Meiser, Sebastian and Mohammadi, Esfandiar
(2013)
AnoA: A Framework for Analyzing Anonymous Communication Protocols.
Backes, Michael and Datta, Amit and Kate, Aniket
(2013)
Asynchronous Computational VSS with Reduced Communication Complexity.
Ruffing, Tim and Schneider, Jonas and Kate, Aniket
(2013)
Identity-Based Steganography and Its Applications to Censorship Resistance.
Ruffing, Tim and Schneider, Jonas and Kate, Aniket
(2013)
Poster: Identity-Based Steganography and Its Applications to Censorship Resistance.
Backes, Michael and Kate, Aniket and Mohammadi, Esfandiar
(2012)
Ace: An Efficient Key-Exchange Protocol for Onion Routing.
Backes, Michael and Bendun, Fabian and Kate, Aniket
(2012)
Brief announcement: distributed cryptography using trinc.
Backes, Michael and Kate, Aniket and Maffei, Matteo and Pecina, Kim
(2012)
ObliviAd: Provably Secure and Practical Online Behavioral Advertising.
Backes, Michael and Goldberg, Ian and Kate, Aniket and Toft, Tomas
(2012)
Adding query privacy to robust DHTs.
Clement, Allen and Junqueira, Flavio and Kate, Aniket and Rodrigues, Rodrigo
(2012)
On the (limited) power of non-equivocation.
Backes, Michael and Kate, Aniket and Goldberg, Ian and Mohammadi, Esfandiar
(2012)
Provably Secure and Practical Onion Routing.
Backes, Michael and Kate, Aniket and Patra, Arpita
(2011)
Computational Verifiable Secret Sharing Revisited.
Kate, Aniket and Zaverucha, Gregory M. and Goldberg, Ian
(2010)
Constant-Size Commitments to Polynomials and Their Applications.
Kate, Aniket and Goldberg, Ian
(2010)
Distributed Private-Key Generators for Identity-Based Cryptography.
Kate, Aniket and Goldberg, Ian
(2010)
Using Sphinx to Improve Onion Routing Circuit Construction.
Article
Minaei, Mohsen and Mondal, Mainack and Loiseau, Patrick and Gummadi, Krishna P. and Kate, Aniket
(2017)
Forgetting the Forgotten with Letheia, Concealing Content Deletion from Persistent Observers.
CoRR, abs/17.
Mondal, Mainack and Messias, Johnnatan and Ghosh, Saptarshi and Gummadi, Krishna P. and Kate, Aniket
(2017)
Longitudinal Privacy Management in Social Media: The Need for Better Controls.
IEEE Internet Computing, 21 (3).
48–55.
Moreno-Sanchez, Pedro and Zafar, Muhammad Bilal and Kate, Aniket
(2016)
Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network.
Proceedings on Privacy Enhancing Technologies, 2016 (4).
436–453.
ISSN 2299-0984
Backes, Michael and Grimm, Niklas and Kate, Aniket
(2015)
Data Lineage in Malicious Environments.
IEEE Transactions on Dependable and Secure Computing, 13 (2).
178 - 191.
ISSN 1545-5971
Pryvalov, Ivan and Kate, Aniket
(2014)
Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange.
IACR Cryptology ePrint Archive, 2014.
p. 247.
Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014)
Privacy-preserving Data Aggregation with Optimal Utility.
IACR Cryptology ePrint Archive, 2014.
p. 482.
Young, Maxwell and Kate, Aniket and Goldberg, Ian and Karsten, Martin
(2013)
Towards Practical Communication in Byzantine-Resistant DHTs.
Networking, IEEE/ACM Transactions on, 21 (1).
pp. 190-203.
Backes, Michael and Clark, Jeremy and Druschel, Peter and Kate, Aniket and Simeonovski, Milivoj
(2013)
Introducing Accountability to Anonymity Networks.
CoRR, abs/13.
Kate, Aniket and Huang, Yizhou and Goldberg, Ian
(2012)
Distributed Key Generation in the Wild.
IACR Cryptology ePrint Archive, 2012.
p. 377.
Book Section
Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2015)
Achieving Optimal Utility for Distributed Differential Privacy Using SMPC.
In:
UNSPECIFIED
Cryptology and Information Security Series, 13
.
IOS Press, 81 - 105.
Other
Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014)
Differentially Private Data Aggregation with Optimal Utility.
This list was generated on Thu Nov 21 02:27:10 2024 CET.