Seguir
Aniket Kate
Aniket Kate
Purdue University / Supra Research
Dirección de correo verificada de purdue.edu - Página principal
Título
Citado por
Citado por
Año
Constant-size commitments to polynomials and their applications
A Kate, G Zaverucha, I Goldberg
Advances in Cryptology-ASIACRYPT 2010, 177-194, 2010
6022010
CoinShuffle: Practical decentralized coin mixing for Bitcoin
T Ruffing, P Moreno-Sanchez, A Kate
European Symposium on Research in Computer Security (ESORICS) 2014, 2014
5572014
Concurrency and privacy with payment-channel networks
G Malavolta, P Moreno-Sanchez, A Kate, M Maffei, S Ravi
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
3092017
Blockchain access privacy: Challenges and directions
R Henry, A Herzberg, A Kate
IEEE Security & Privacy 16 (4), 38-45, 2018
3072018
Anonymous multi-hop locks for blockchain scalability and interoperability
G Malavolta, P Moreno-Sanchez, C Schneidewind, A Kate, M Maffei
Cryptology ePrint Archive, 2018
2832018
Settling payments fast and private: Efficient decentralized routing for path-based transactions
S Roos, P Moreno-Sanchez, A Kate, I Goldberg
NDSS, 2018
2452018
Anonymity and security in delay tolerant networks
A Kate, GM Zaverucha, U Hengartner
SecureComm 2007. Third International Conference on Security and Privacy in …, 2007
2102007
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks
G Malavolta, P Moreno-Sanchez, A Kate, M Maffei
NDSS, 2017
1842017
P2P mixing and unlinkable Bitcoin transactions
T Ruffing, P Moreno-Sanchez, A Kate
NDSS 17, 2017
1662017
Obliviad: Provably secure and practical online behavioral advertising
M Backes, A Kate, M Maffei, K Pecina
2012 IEEE Symposium on Security and Privacy, 257-271, 2012
1652012
Data lineage in malicious environments
M Backes, N Grimm, A Kate
IEEE Transactions on Dependable and Secure Computing 13 (2), 178-191, 2015
1602015
AnoA: A Framework for Analyzing Anonymous Communication Protocols
M Backes, A Kate, P Manoharan, S Meiser, E Mohammadi
Journal of Privacy and Confidentiality 7 (2), 79-125, 2016
1382016
Distributed private-key generators for identity-based cryptography
A Kate, I Goldberg
Security and Cryptography for Networks, 436-453, 2010
131*2010
cMix: Mixing with minimal real-time asymmetric cryptographic operations
D Chaum, D Das, F Javani, A Kate, A Krasnova, J De Ruiter, AT Sherman
Applied Cryptography and Network Security: 15th International Conference …, 2017
113*2017
Distributed key generation for the internet
A Kate, I Goldberg
2009 29th IEEE International Conference on Distributed Computing Systems …, 2009
1102009
Pairing-based onion routing
A Kate, G Zaverucha, I Goldberg
Privacy Enhancing Technologies: 7th International Symposium, PET 2007 Ottawa …, 2007
1082007
Anonymity trilemma: Strong anonymity, low bandwidth overhead, low latency-choose two
D Das, S Meiser, E Mohammadi, A Kate
2018 IEEE Symposium on Security and Privacy (SP), 108-126, 2018
1052018
Liar, liar, coins on fire! Penalizing equivocation by loss of bitcoins
T Ruffing, A Kate, D Schröder
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
992015
Computational verifiable secret sharing revisited
M Backes, A Kate, A Patra
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
952011
Honeybadgermpc and asynchromix: Practical asynchronous mpc and its application to anonymous communication
D Lu, T Yurek, S Kulshreshtha, R Govind, A Kate, A Miller
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
922019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20