Aniket Kate
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2019
- [i33]Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup. IACR Cryptology ePrint Archive 2019: 63 (2019) - 2018
- [j9]Pedro Moreno-Sanchez, Uzair Mahmood, Aniket Kate:
ClearChart: Ensuring integrity of consumer ratings in online marketplaces. Computers & Security 78: 90-102 (2018) - [j8]Ryan Henry, Amir Herzberg, Aniket Kate:
Blockchain Access Privacy: Challenges and Directions. IEEE Security & Privacy 16(4): 38-45 (2018) - [c41]Sze Yiu Chau, Bincheng Wang, Jianxiong Wang, Omar Chowdhury, Aniket Kate, Ninghui Li:
Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps. ACSAC 2018: 236-251 - [c40]Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, Ian Goldberg:
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. NDSS 2018 - [c39]Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two. IEEE Symposium on Security and Privacy 2018: 108-126 - [c38]Pedro Moreno-Sanchez, Navin Modi, Raghuvir Songhela, Aniket Kate, Sonia Fahmy:
Mind Your Credit: Assessing the Health of the Ripple Credit Network. WWW 2018: 329-338 - [i32]Venkat Arun, Aniket Kate, Deepak Garg, Peter Druschel, Bobby Bhattacharjee:
SATE: Robust and Private Allegation Escrows. CoRR abs/1810.10123 (2018) - [i31]Duc Viet Le, Mahimna Kelkar, Aniket Kate:
Flexible Signatures: Towards Making Authentication Suitable for Real-Time Environments. IACR Cryptology ePrint Archive 2018: 343 (2018) - [i30]Mohsen Minaei, Pedro Moreno-Sanchez, Aniket Kate:
R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies. IACR Cryptology ePrint Archive 2018: 454 (2018) - [i29]Giulio Malavolta, Pedro Moreno-Sanchez, Clara Schneidewind, Aniket Kate, Matteo Maffei:
Multi-Hop Locks for Secure, Privacy-Preserving and Interoperable Payment-Channel Networks. IACR Cryptology ePrint Archive 2018: 472 (2018) - [i28]Easwar Vivek Mangipudi, Krutarth Rao, Jeremy Clark, Aniket Kate:
Automated Penalization of Data Breaches using Crypto-augmented Smart Contracts. IACR Cryptology ePrint Archive 2018: 1050 (2018) - 2017
- [j7]Mainack Mondal, Johnnatan Messias, Saptarshi Ghosh, Krishna P. Gummadi, Aniket Kate:
Longitudinal Privacy Management in Social Media: The Need for Better Controls. IEEE Internet Computing 21(3): 48-55 (2017) - [j6]Pedro Moreno-Sanchez, Tim Ruffing, Aniket Kate:
PathShuffle: Credit Mixing and Anonymous Payments for Ripple. PoPETs 2017(3): 110 (2017) - [c37]David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman:
cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations. ACNS 2017: 557-578 - [c36]Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi:
Concurrency and Privacy with Payment-Channel Networks. ACM Conference on Computer and Communications Security 2017: 455-471 - [c35]Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks. NDSS 2017 - [c34]Tim Ruffing, Pedro Moreno-Sanchez, Aniket Kate:
P2P Mixing and Unlinkable Bitcoin Transactions. NDSS 2017 - [c33]Sze Yiu Chau, Omar Chowdhury, Md. Endadul Hoque, Huangyi Ge, Aniket Kate, Cristina Nita-Rotaru, Ninghui Li:
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations. IEEE Symposium on Security and Privacy 2017: 503-520 - [i27]Pedro Moreno-Sanchez, Navin Modi, Raghuvir Songhela, Aniket Kate, Sonia Fahmy:
Mind Your Credit: Assessing the Health of the Ripple Credit Network. CoRR abs/1706.02358 (2017) - [i26]Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, Ian Goldberg:
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. CoRR abs/1709.05748 (2017) - [i25]Mohsen Minaei, Mainack Mondal, Patrick Loiseau, Krishna P. Gummadi, Aniket Kate:
Forgetting the Forgotten with Letheia, Concealing Content Deletion from Persistent Observers. CoRR abs/1710.11271 (2017) - [i24]Sanjit Chatterjee, Deepak Garg, Aniket Kate, Tobias Theobald:
Encrypting Messages for Incomplete Chains of Certificates. IACR Cryptology ePrint Archive 2017: 777 (2017) - [i23]Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi:
Concurrency and Privacy with Payment-Channel Networks. IACR Cryptology ePrint Archive 2017: 820 (2017) - [i22]Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two. IACR Cryptology ePrint Archive 2017: 954 (2017) - 2016
- [j5]Pedro Moreno-Sanchez, Muhammad Bilal Zafar, Aniket Kate:
Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network. PoPETs 2016(4): 436-453 (2016) - [j4]Michael Backes, Niklas Grimm, Aniket Kate:
Data Lineage in Malicious Environments. IEEE Trans. Dependable Sec. Comput. 13(2): 178-191 (2016) - [c32]Aniket Kate:
Introduction to Credit Networks: Security, Privacy, and Applications. ACM Conference on Computer and Communications Security 2016: 1859-1860 - [c31]
- [c30]Mainack Mondal, Johnnatan Messias, Saptarshi Ghosh, Krishna P. Gummadi, Aniket Kate:
Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data. SOUPS 2016: 287-299 - [i21]David Chaum, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman:
cMix: Anonymization byHigh-Performance Scalable Mixing. IACR Cryptology ePrint Archive 2016: 8 (2016) - [i20]Michael Backes, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Anonymous RAM. IACR Cryptology ePrint Archive 2016: 678 (2016) - [i19]Tim Ruffing, Pedro Moreno-Sanchez, Aniket Kate:
P2P Mixing and Unlinkable Bitcoin Transactions. IACR Cryptology ePrint Archive 2016: 824 (2016) - [i18]Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks. IACR Cryptology ePrint Archive 2016: 1054 (2016) - 2015
- [c29]Satrajit Ghosh, Aniket Kate:
Post-Quantum Forward-Secure Onion Routing - (Future Anonymity in Today's Budget). ACNS 2015: 263-286 - [c28]Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing:
Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources. ACNS 2015: 675-695 - [c27]Tim Ruffing, Aniket Kate, Dominique Schröder:
Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins. ACM Conference on Computer and Communications Security 2015: 219-230 - [c26]Bimal Viswanath, Muhammad Ahmad Bashir, Muhammad Bilal Zafar, Simon Bouget, Saikat Guha, Krishna P. Gummadi, Aniket Kate, Alan Mislove:
Strength in Numbers: Robust Tamper Detection in Crowd Computations. COSN 2015: 113-124 - [c25]Daniel Porto, João Leitão, Cheng Li, Allen Clement, Aniket Kate, Flavio Paiva Junqueira, Rodrigo Rodrigues:
Visigoth fault tolerance. EuroSys 2015: 8:1-8:14 - [c24]Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Kim Pecina:
Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces. NDSS 2015 - [i17]Satrajit Ghosh, Aniket Kate:
Post-Quantum Secure Onion Routing (Future Anonymity in Today's Budget). IACR Cryptology ePrint Archive 2015: 8 (2015) - 2014
- [c23]Michael Backes, Jeremy Clark, Aniket Kate, Milivoj Simeonovski, Peter Druschel:
BackRef: Accountability in Anonymous Communication Networks. ACNS 2014: 380-400 - [c22]Fabienne Eigner, Matteo Maffei, Ivan Pryvalov, Francesca Pampaloni, Aniket Kate:
Differentially private data aggregation with optimal utility. ACSAC 2014: 316-325 - [c21]Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi:
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection. ACM Conference on Computer and Communications Security 2014: 513-524 - [c20]Tim Ruffing, Pedro Moreno-Sanchez, Aniket Kate:
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin. ESORICS (2) 2014: 345-364 - [c19]Michael Backes, Fabian Bendun, Ashish Choudhury, Aniket Kate:
Asynchronous MPC with a strict honest majority using non-equivocation. PODC 2014: 10-19 - [c18]Michael Backes, Niklas Grimm, Aniket Kate:
Lime: Data Lineage in the Malicious Environment. STM 2014: 183-187 - [i16]Michael Backes, Niklas Grimm, Aniket Kate:
Lime: Data Lineage in the Malicious Environment. CoRR abs/1408.1076 (2014) - [i15]Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, Esfandiar Mohammadi:
AnoA: A Framework For Analyzing Anonymous Communication Protocols. IACR Cryptology ePrint Archive 2014: 87 (2014) - [i14]Ivan Pryvalov, Aniket Kate:
Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange. IACR Cryptology ePrint Archive 2014: 247 (2014) - [i13]Fabienne Eigner, Aniket Kate, Matteo Maffei, Francesca Pampaloni, Ivan Pryvalov:
Privacy-preserving Data Aggregation with Optimal Utility. IACR Cryptology ePrint Archive 2014: 482 (2014) - [i12]Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi:
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection. IACR Cryptology ePrint Archive 2014: 621 (2014) - 2013
- [j3]Maxwell Young, Aniket Kate, Ian Goldberg, Martin Karsten:
Towards Practical Communication in Byzantine-Resistant DHTs. IEEE/ACM Trans. Netw. 21(1): 190-203 (2013) - [c17]Tim Ruffing, Jonas Schneider, Aniket Kate:
Identity-based steganography and its applications to censorship resistance. ACM Conference on Computer and Communications Security 2013: 1461-1464 - [c16]Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, Esfandiar Mohammadi:
AnoA: A Framework for Analyzing Anonymous Communication Protocols. CSF 2013: 163-178 - [c15]Michael Backes, Amit Datta, Aniket Kate:
Asynchronous Computational VSS with Reduced Communication Complexity. CT-RSA 2013: 259-276 - [i11]Michael Backes, Jeremy Clark, Peter Druschel, Aniket Kate, Milivoj Simeonovski:
Introducing Accountability to Anonymity Networks. CoRR abs/1311.3151 (2013) - [i10]Michael Backes, Fabian Bendun, Ashish Choudhury, Aniket Kate:
Asynchronous MPC with t<n/2 Using Non-equivocation. IACR Cryptology ePrint Archive 2013: 745 (2013) - [i9]Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing:
Differential Indistinguishability for Cryptographic Primitives with Imperfect Randomness. IACR Cryptology ePrint Archive 2013: 808 (2013) - 2012
- [c14]Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft:
Adding query privacy to robust DHTs. AsiaCCS 2012: 30-31 - [c13]Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi:
Provably Secure and Practical Onion Routing. CSF 2012: 369-385 - [c12]Michael Backes, Fabian Bendun, Aniket Kate:
Brief announcement: distributed cryptography using trinc. PODC 2012: 91-92 - [c11]Allen Clement, Flavio Junqueira, Aniket Kate, Rodrigo Rodrigues:
On the (limited) power of non-equivocation. PODC 2012: 301-308 - [c10]Michael Backes, Aniket Kate, Matteo Maffei, Kim Pecina:
ObliviAd: Provably Secure and Practical Online Behavioral Advertising. IEEE Symposium on Security and Privacy 2012: 257-271 - [c9]Michael Backes, Aniket Kate, Esfandiar Mohammadi:
Ace: an efficient key-exchange protocol for onion routing. WPES 2012: 55-64 - [i8]Aniket Kate, Yizhou Huang, Ian Goldberg:
Distributed Key Generation in the Wild. IACR Cryptology ePrint Archive 2012: 377 (2012) - [i7]Michael Backes, Amit Datta, Aniket Kate:
Asynchronous Computational VSS with Reduced Communication Complexity. IACR Cryptology ePrint Archive 2012: 619 (2012) - 2011
- [j2]Aniket Kate, Ian Goldberg:
Generalizing cryptosystems based on the subset sum problem. Int. J. Inf. Sec. 10(3): 189-199 (2011) - [c8]Michael Backes, Aniket Kate, Arpita Patra:
Computational Verifiable Secret Sharing Revisited. ASIACRYPT 2011: 590-609 - [i6]Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft:
Adding Query Privacy to Robust DHTs. CoRR abs/1107.1072 (2011) - [i5]Michael Backes, Aniket Kate, Arpita Patra:
Computational Verifiable Secret Sharing Revisited. IACR Cryptology ePrint Archive 2011: 281 (2011) - [i4]Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi:
Provably Secure and Practical Onion Routing. IACR Cryptology ePrint Archive 2011: 308 (2011) - 2010
- [b1]Aniket Kate:
Distributed Key Generation and Its Applications. University of Waterloo, Ontario, Canada 2010 - [j1]Aniket Kate, Gregory M. Zaverucha, Ian Goldberg:
Pairing-Based Onion Routing with Improved Forward Secrecy. ACM Trans. Inf. Syst. Secur. 13(4): 29:1-29:32 (2010) - [c7]Aniket Kate, Gregory M. Zaverucha, Ian Goldberg:
Constant-Size Commitments to Polynomials and Their Applications. ASIACRYPT 2010: 177-194 - [c6]Aniket Kate, Ian Goldberg:
Using Sphinx to Improve Onion Routing Circuit Construction. Financial Cryptography 2010: 359-366 - [c5]Maxwell Young, Aniket Kate, Ian Goldberg, Martin Karsten:
Practical Robust Communication in DHTs Tolerating a Byzantine Adversary. ICDCS 2010: 263-272 - [c4]Aniket Kate, Ian Goldberg:
Distributed Private-Key Generators for Identity-Based Cryptography. SCN 2010: 436-453
2000 – 2009
- 2009
- [c3]
- [i3]Aniket Kate, Ian Goldberg:
Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography. IACR Cryptology ePrint Archive 2009: 355 (2009) - [i2]Aniket Kate, Ian Goldberg:
Using Sphinx to Improve Onion Routing Circuit Construction. IACR Cryptology ePrint Archive 2009: 628 (2009) - 2008
- [i1]Aniket Kate, Gregory M. Zaverucha, Ian Goldberg:
Pairing-Based Onion Routing with Improved Forward Secrecy. IACR Cryptology ePrint Archive 2008: 80 (2008) - 2007
- [c2]Aniket Kate, Gregory M. Zaverucha, Ian Goldberg:
Pairing-Based Onion Routing. Privacy Enhancing Technologies 2007: 95-112 - [c1]Aniket Kate, Gregory M. Zaverucha, Urs Hengartner:
Anonymity and security in delay tolerant networks. SecureComm 2007: 504-513
Coauthor Index
last updated on 2019-02-14 22:09 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint