Cs-Cr
Privacy Preserving Social Network Publication Against Mutual Friend Attacks
A highly optimized flow-correlation attack
The Unreasonable Fundamental Incertitudes Behind Bitcoin Mining
Message Authentication Code over a Wiretap Channel
Some Efficient Solutions to Yaos Millionaire Problem
All Your Location are Belong to Us: Breaking Mobile Social Networks for Automated User Location Tracking
Security policies for distributed systems
Quantum computation of discrete logarithms in semigroups
Efficient Modular Arithmetic for SIMD Devices
Fingerprinting Internet DNS Amplification DDoS Activities
The Cryptanalysis of Lees Chaotic Maps-Based Authentication and Key Agreement Scheme using Smart card for Telecare Medicine Information Systems
Physical-Layer Cryptography Through Massive MIMO
Polynomial-Time Algorithms for Quadratic Isomorphism of Polynomials: The Regular Case
A Secure Distributed Authentication scheme based on CRT-VSS and Trusted Computing in MANET
A Case of Collusion: A Study of the Interface Between Ad Libraries and their Apps
Linking Correlated Network Flows through Packet Timing: a Game-Theoretic Approach
Machine-Readable Privacy Certificates for Services
On Modeling the Costs of Censorship
Demonstrating topoS: Theorem-Prover-Based Synthesis of Secure Network Configurations
More Flexible Differential Privacy: The Application of Piecewise Mixture Distributions in Query Release
PriMaL: A Privacy-Preserving Machine Learning Method for Event Detection in Distributed Sensor Networks
A New Signature Scheme Based on Punctured Reed--Muller Code With Random Insertion