CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds K Nikitin, E Kokoris-Kogias, P Jovanovic, N Gailly, L Gasser, I Khoffi, ... 26th USENIX Security Symposium (USENIX Security 17), 1271-1287, 2017 | 175 | 2017 |
Replicated state machines without replicated execution J Lee, K Nikitin, S Setty IEEE Symposium on Security and Privacy, 2020 | 41 | 2020 |
Axiom: DTLS-based secure IoT group communication M Tiloca, K Nikitin, S Raza ACM Transactions on Embedded Computing Systems (TECS) 16 (3), 1-29, 2017 | 40 | 2017 |
Authenticated private information retrieval S Colombo, K Nikitin, H Corrigan-Gibbs, DJ Wu, B Ford 32nd USENIX security symposium (USENIX Security 23), 3835-3851, 2023 | 18 | 2023 |
Reducing metadata leakage from encrypted files and communication with PURBs K Nikitin, L Barman, W Lueks, M Underwood, JP Hubaux, B Ford Proceedings on Privacy Enhancing Technologies 2019 (4), 6-33, 2019 | 12 | 2019 |
Crux: Locality-Preserving Distributed Services C Basescu, MF Nowlan, K Nikitin, JM Faleiro, B Ford arXiv preprint arXiv:1405.0637, 2014 | 6 | 2014 |
Secure Two-Way DTLS-Based Group Communication in the IoT, draft-tilocadice-secure-groupcomm-00 (work in progress) M Tiloca, S Raza, K Nikitin, S Kumar Internet Engineering Task Force, 2015 | 5 | 2015 |
DTLS adaptation for efficient secure group communication K Nikitin | 2 | 2015 |
Integrity and Metadata Protection in Data Retrieval K Nikitin EPFL, 2021 | | 2021 |