Dandelion++ lightweight cryptocurrency networking with formal anonymity guarantees
Recent work has demonstrated significant anonymity vulnerabilities in Bitcoin's networking
stack. In particular, the current mechanism for broadcasting Bitcoin transactions allows third …
stack. In particular, the current mechanism for broadcasting Bitcoin transactions allows third …
Atom: Horizontally scaling strong anonymity
Atom is an anonymous messaging system that protects against traffic-analysis attacks.
Unlike many prior systems, each Atom server touches only a small fraction of the total …
Unlike many prior systems, each Atom server touches only a small fraction of the total …
ARID: Anonymous remote identification of unmanned aerial vehicles
To enable enhanced accountability of Unmanned Aerial Vehicles (UAVs) operations, the US-
based Federal Avionics Administration (FAA) recently published a new dedicated regulation …
based Federal Avionics Administration (FAA) recently published a new dedicated regulation …
A privacy-preserving approach to prevent feature disclosure in an IoT scenario
In this paper, we propose a privacy-preserving approach to prevent feature disclosure in a
multiple IoT scenario, ie, a scenario where objects can be organized in (partially …
multiple IoT scenario, ie, a scenario where objects can be organized in (partially …
Research trends in collaborative drones
The last decade has seen an explosion of interest in drones—introducing new networking
technologies, such as 5G wireless connectivity and cloud computing. The resulting …
technologies, such as 5G wireless connectivity and cloud computing. The resulting …
Secure anonymous broadcast
In anonymous broadcast, one or more parties want to anonymously send messages to all
parties. This problem is increasingly important as a black-box in many privacy-preserving …
parties. This problem is increasingly important as a black-box in many privacy-preserving …
E-cclesia: universally composable self-tallying elections
The technological advancements of the digital era paved the way for the facilitation of
electronic voting (e-voting) in the promise of efficiency and enhanced security. In standard e …
electronic voting (e-voting) in the promise of efficiency and enhanced security. In standard e …
Security and privacy issues in internet of skies: Advanced solutions for drones and UAVs for critical infrastructures protection
P Tedeschi - 2021 - search.proquest.com
Abstract Unmanned Aerial Vehicles (UAVs) are widely considered the next breakthrough in
the ongoing Industry 4.0 revolution, thanks to their high mobility, on-demand deployment …
the ongoing Industry 4.0 revolution, thanks to their high mobility, on-demand deployment …
Kadupul: Livin'on the Edge with Virtual Currencies and Time-Locked Puzzles
M Skjegstad, A Madhavapeddy… - Proceedings of the 2015 …, 2015 - dl.acm.org
Devices connected to the Internet today have a wide range of local communication channels
available, such as wireless Wifi, Bluetooth or NFC, as well as wired backhaul. In densely …
available, such as wireless Wifi, Bluetooth or NFC, as well as wired backhaul. In densely …
Secure location sharing
M Zamani, M Movahedi - Proceedings of the 10th ACM international …, 2014 - dl.acm.org
In the last decade, the number of location-aware mobile devices has mushroomed. Just as
location-based services grow fast, they lay out many questions and challenges when it …
location-based services grow fast, they lay out many questions and challenges when it …