Uploads
Contact
/
Login
Upload
Search Results for 'Shuffle Adversary'
Analyzing Anonymity Protocols
luanne-stotts
1. SHUFFLE – ALLEY – SHUFFLE
faustina-dinatale
ON THE EXPRESSIVE POWER OF SHUFFLE PRODUCT
liane-varnes
15 Nov 2012
yoshiko-marsland
Line Backer Drills
cheryl-pisano
Inter-process Communication in
calandra-battersby
Line Backer Drills W K LB Stance & Fundamentals
lois-ondreau
CS1952 L Spring 2019
alida-meadow
From Theory to Practice:
stefany-barnette
How to Encipher Messages on a Small Domain
olivia-moreira
ZygOS : Achieving Low Tail Latency for Microsecond-scale Networked Tasks
trish-goza
Group theory in the classroom
liane-varnes
A Logic of Secure Systems with Tunable Adversary Models
faustina-dinatale
B FORM ADVERSARY PROCEEDING COVER SHEET ADVERSARY PR
myesha-ticknor
Penguin
conchita-marotz
Leakage-Resilient
tatyana-admore
Leakage-Resilient
min-jolicoeur
A shuffle argument secure in the generic model
conchita-marotz
Efficient Zero-Knowledge Argument for Correctness of a Shuffle
marina-yarberry
Users Get Routed: Traffic Correlation on Tor by Realistic A
phoebe-click
Forgiveness
tatiana-dople
One-Time Computable
mitsue-stanley
Track Me If You Can: On the Effectiveness of Context-based
lois-ondreau
Lower Bounds
faustina-dinatale
1
2
3
4
5
6