Dandelion++ lightweight cryptocurrency networking with formal anonymity guarantees

G Fanti, SB Venkatakrishnan, S Bakshi… - Proceedings of the …, 2018 - dl.acm.org
Recent work has demonstrated significant anonymity vulnerabilities in Bitcoin's networking
stack. In particular, the current mechanism for broadcasting Bitcoin transactions allows third …

Atom: Horizontally scaling strong anonymity

A Kwon, H Corrigan-Gibbs, S Devadas… - Proceedings of the 26th …, 2017 - dl.acm.org
Atom is an anonymous messaging system that protects against traffic-analysis attacks.
Unlike many prior systems, each Atom server touches only a small fraction of the total …

ARID: Anonymous remote identification of unmanned aerial vehicles

P Tedeschi, S Sciancalepore, R Di Pietro - Proceedings of the 37th …, 2021 - dl.acm.org
To enable enhanced accountability of Unmanned Aerial Vehicles (UAVs) operations, the US-
based Federal Avionics Administration (FAA) recently published a new dedicated regulation …

A privacy-preserving approach to prevent feature disclosure in an IoT scenario

S Nicolazzo, A Nocera, D Ursino, L Virgili - Future Generation Computer …, 2020 - Elsevier
In this paper, we propose a privacy-preserving approach to prevent feature disclosure in a
multiple IoT scenario, ie, a scenario where objects can be organized in (partially …

Research trends in collaborative drones

M Barbeau, J Garcia-Alfaro, E Kranakis - Sensors, 2022 - mdpi.com
The last decade has seen an explosion of interest in drones—introducing new networking
technologies, such as 5G wireless connectivity and cloud computing. The resulting …

Secure anonymous broadcast

M Movahedi, J Saia, M Zamani - arXiv preprint arXiv:1405.5326, 2014 - arxiv.org
In anonymous broadcast, one or more parties want to anonymously send messages to all
parties. This problem is increasingly important as a black-box in many privacy-preserving …

E-cclesia: universally composable self-tallying elections

M Arapinis, N Lamprou, L Mareková… - Cryptology ePrint …, 2020 - eprint.iacr.org
The technological advancements of the digital era paved the way for the facilitation of
electronic voting (e-voting) in the promise of efficiency and enhanced security. In standard e …

Security and privacy issues in internet of skies: Advanced solutions for drones and UAVs for critical infrastructures protection

P Tedeschi - 2021 - search.proquest.com
Abstract Unmanned Aerial Vehicles (UAVs) are widely considered the next breakthrough in
the ongoing Industry 4.0 revolution, thanks to their high mobility, on-demand deployment …

Kadupul: Livin'on the Edge with Virtual Currencies and Time-Locked Puzzles

M Skjegstad, A Madhavapeddy… - Proceedings of the 2015 …, 2015 - dl.acm.org
Devices connected to the Internet today have a wide range of local communication channels
available, such as wireless Wifi, Bluetooth or NFC, as well as wired backhaul. In densely …

Secure location sharing

M Zamani, M Movahedi - Proceedings of the 10th ACM international …, 2014 - dl.acm.org
In the last decade, the number of location-aware mobile devices has mushroomed. Just as
location-based services grow fast, they lay out many questions and challenges when it …