Files
consensus/pdf/sec.bib
T
2020-05-12 17:45:45 +02:00

7709 lines
257 KiB
BibTeX
Raw Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
%A
@inproceedings{abe00secure,
title={Provably secure partially blind signatures},
author={Abe, Masayuki and Okamoto, Tatsuaki},
booktitle={\bibconf[20th]{CRYPTO}{International Cryptology Conference}},
location = {Santa Barbara, CA},
mon = aug,
year=2000
}
@inproceedings{abe02one,
title={1-out-of-$n$ signatures from a variety of keys},
author={Abe, M. and Ohkubo, M. and Suzuki, K.},
booktitle={{ASIACRYPT}},
pages={639--645},
year={2002},
publisher={Springer}
}
@article{abraham16solidus,
author = {Ittai Abraham and
Dahlia Malkhi and
Kartik Nayak and
Ling Ren and
Alexander Spiegelman},
title = {\href{http://arxiv.org/abs/1612.02916}{Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless
Byzantine Consensus}},
journal = {CoRR},
volume = {abs/1612.02916},
year = {2016},
url = {http://arxiv.org/abs/1612.02916},
timestamp = {Sat, 11 Feb 2017 15:57:00 +0100},
biburl = {http://dblp.uni-trier.de/rec/bib/journals/corr/AbrahamMNRS16},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@techreport{ abraham17state,
author = {Ronald Abraham and Elizabeth S. Bennett and
Noopur Sen and Neil Buddy Shah},
title = {\href{https://stateofaadhaar.in/wp-content/uploads/State-of-Aadhaar-Full-Report-2016-17-IDinsight.pdf}{State of Aadhaar Report 2016-17}},
institution = {IDinsight},
month = may,
year = 2017,
}
@misc{ abraham17revisiting,
author = {Ittai Abraham and Guy Gueta and Dahlia Malkhi and
Lorenzo Alvisi and Rama Kotla and Jean-Philippe Martin},
title = {\href{https://arxiv.org/pdf/1712.01367.pdf}{Revisiting Fast Practical Byzantine Fault Tolerance}},
month = dec,
year = 2017,
}
@misc{ abraham18dfinity,
author = {Ittai Abraham and Dahlia Malkhi and Kartik Nayak and Ling Ren},
title = {\href{https://eprint.iacr.org/2018/1153}{Dfinity Consensus, Explored}},
howpublished = {Cryptology ePrint Archive, Report 2018/1153},
month = nov,
year = 2018,
}
@techreport{ abraham18state,
author = {Ronald Abraham and Elizabeth S. Bennett and
Rajesh Bhusal and Shreya Dubey and Qian (Sindy) Li and
Akash Pattanayak and Neil Buddy Shah},
title = {\href{https://stateofaadhaar.in/wp-content/uploads/State-of-Aadhaar-Report_2017-18.pdf}{State of Aadhaar Report 2017-18}},
institution = {IDinsight},
month = may,
year = 2018,
}
% obsoleted by conference paper: abraham19vaba
@article{abraham18vaba,
author = {Ittai Abraham and
Dahlia Malkhi and
Alexander Spiegelman},
title = {\href{https://arxiv.org/abs/1811.01332}{Validated Asynchronous Byzantine Agreement with Optimal Resilience and Asymptotically Optimal Time and Word Communication}},
journal = {CoRR},
volume = {abs/1811.01332},
year = {2018},
url = {https://arxiv.org/abs/1811.01332},
}
@inproceedings{ abraham19vaba,
author = {Ittai Abraham and Dahlia Malkhi and Alexander Spiegelman},
title = {\href{https://dahliamalkhi.files.wordpress.com/2019/06/vaba-podc2019-2.pdf}{Asymptotically Optimal Validated Asynchronous Byzantine Agreement}},
booktitle = {\bibconf{PODC}{ACM Symposium on Principles of Distributed Computing}},
month = jul,
year = 2019,
location = {Toronto, Ontario, Canada},
}
@misc{ abley10dnssec,
author = {Joe Abley and David Blacka and David Conrad and Richard Lamb and Matt Larson and Fredrik Ljunggren and David Knight and Tomofumi Okubo and Jakob Schlyter},
title = {\href{http://www.root-dnssec.org/wp-content/uploads/2010/06/draft-icann-dnssec-arch-v1dot4.pdf}{DNSSEC Root Zone -- High Level Technical Architecture}},
month = jun,
year = 2010,
note = {Version 1.4},
}
@article{ ackerman15fbi,
author = {Spencer Ackerman},
title = {\href{http://www.theguardian.com/technology/2015/jul/08/fbi-chief-backdoor-access-encryption-isis}{FBI chief wants 'backdoor access' to encrypted communications to fight Isis}},
journal = {The Guardian},
month = jul,
year = 2015,
}
@article{adams01internet,
title={Internet {X}.509 Public Key Infrastructure Time Stamp Protocol {(TSP)}},
author={Adams, Carlisle and Pinkas, Denis},
year={2001}
}
@inproceedings{ adida08helios,
author = {Ben Adida},
title = {Helios: Web-based Open-Audit Voting},
booktitle={USENIX Security Symposium},
month = jul,
year = 2008,
location = {San Jose, CA},
}
@inproceedings{adleman83implementing,
title={Implementing an electronic notary public},
author={Adleman, Leonard M},
booktitle={Advances in Cryptology},
year={1983},
}
@inproceedings{adrian15imprefect,
title = {\href{https://weakdh.org/imperfect-forward-secrecy-ccs15.pdf}{Imperfect Forward Secrecy: {H}ow {D}iffie-{H}ellman Fails in Practice}},
author = {David Adrian and Karthikeyan Bhargavan and Zakir Durumeric
and Pierrick Gaudry and Matthew Green and J. Alex
Halderman and Nadia Heninger and Drew Springall and
Emmanuel Thom\'e and Luke Valenta and Benjamin
VanderSloot and Eric Wustrow and Santiago
Zanella-B\'eguelin and Paul Zimmermann},
booktitle = {ACM Conference on Computer and Communications Security},
month = oct,
year = 2015
}
@incollection{ aggarwal08general,
author = {Charu C. Aggarwal and Philip S. Yu},
title = {A General Survey of Privacy-Preserving Data Mining Models
and Algorithms},
booktitle = {Privacy-Preserving Data Mining: Models and Algorithms},
isbn = {978-0-387-70991-8},
publisher = {Springer},
year = 2008,
chapter = {2},
pages = {11-52},
}
@article{ akamai16akamai,
author = {Akamai Technologies, Inc.},
title = {\href{https://www.akamai.com/}{Akamai: Content Delivery Network (CDN) \& Cloud Computing
}},
month = may,
year = 2016,
}
@article{al19lazyledger,
title={LazyLedger: A Distributed Data Availability Ledger With Client-Side Smart Contracts},
author={Al-Bassam, Mustafa},
journal={arXiv preprint arXiv:1905.09274},
year={2019}
}
@inproceedings{ alhamed13opensource,
author = {Alhamed, Khalid and Silaghi, Marius C. and Hussien, Ihsan and
Yang, Yi},
title =
{\href{http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.381.4290&rep=rep1&type=pdf}
{Security by Decentralized Certification of Automatic-Updates for Open Source
Software controlled by Volunteers}},
booktitle = {Workshop on Decentralized Coordination},
year = {2013}
}
@inproceedings{ alhamed13stacking,
author = {Alhamed, Khalid and Silaghi, Marius C. and Hussien, Ihsan and
Stansifer, Ryan and Yang, Yi},
title = {\href{http://dx.doi.org/10.1109/WI-IAT.2013.123}{"Stacking the Deck"
Attack on Software Updates: Solution by Distributed Recommendation of
Testers}},
booktitle = {Proceedings of the 2013 IEEE/WIC/ACM International Joint
Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)
- Volume 02},
series = {WI-IAT '13},
year = {2013},
pages = {293--300},
numpages = {8},
publisher = {IEEE Computer Society},
}
@inproceedings{al18chainspace,
author = {Mustafa Al{-}Bassam and Alberto Sonnino and Shehar Bano and
Dave Hrycyszyn and George Danezis},
title = {\href{https://arxiv.org/pdf/1708.03778.pdf}{Chainspace: {A} Sharded Smart Contracts Platform}},
booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS}
2018, San Diego, California, USA, February 18-21, 2018},
year = {2018},
}
@inproceedings{ali16blockstack,
author = {Muneeb Ali and Jude Nelson and Ryan Shea and Michael J. Freedman},
title = {\href{https://www.usenix.org/conference/atc16/technical-sessions/presentation/ali}{Blockstack: A Global Naming and Storage System Secured by Blockchains}},
booktitle = {2016 USENIX Annual Technical Conference (USENIX ATC 16)},
year = {2016},
month = Jun,
isbn = {978-1-931971-30-0},
address = {Denver, CO},
pages = {181--194},
publisher = {USENIX Association},
}
@inproceedings{ alicherry09doublecheck,
author = {Mansoor Alicherry and Angelos D. Keromytis},
title = {{DoubleCheck}: Multi-path Verification Against
Man-in-the-Middle Attacks},
booktitle = {\bibconf[14th]{ISCC}{IEEE Symposium on
Computers and Communications}},
month = jul,
year = 2009,
}
@misc{ allen18evoting,
author = {Jeff R. Allen},
title = {\href{https://blog.dedis.ch/post/evoting/}{E-voting at EPFL}},
howpublished = {\href{https://blog.dedis.ch}{DEDIS laboratory blog}},
month = jul,
year = 2018,
}
@inproceedings{ ambrosin14updaticator,
author={Ambrosin, Moreno and Busold, Christoph
and Conti, Mauro and Sadeghi, Ahmad-Reza and Schunter, Matthias},
editor={Kuty{\l}owski, Miros{\l}aw and Vaidya, Jaideep},
title={\href{http://www.schunter.org/blog/wp-content/uploads/2014/09/main.pdf}
{Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure
Software Update Distribution over Untrusted Cache-enabled Networks}},
booktitle={Computer Security - ESORICS 2014: 19th European Symposium on
Research in Computer Security, Proceedings, Part I},
year= {2014}
}
@article{amroudi17verifiable,
title={\href{https://link.springer.com/article/10.1007/s11277-017-4245-9}{A Verifiable (k, n, m)-Threshold Multi-secret Sharing Scheme Based on NTRU Cryptosystem}},
author={Amroudi, Ali Nakhaei and Zaghain, Ali and Sajadieh, Mahdi},
journal={Wireless Personal Communications},
volume={96},
number={1},
pages={1393--1405},
year={2017},
publisher={Springer}
}
@misc{ andresen16classic,
author = {Gavin Andresen},
title = {\href{http://gavinandresen.ninja/classic-unlimited-xt-core}{{Classic? Unlimited? XT? Core?}}},
month = jan,
year = 2016,
url = {http://gavinandresen.ninja/classic-unlimited-xt-core},
}
@inproceedings{andrychowicz14secure,
title={\href{https://ieeexplore.ieee.org/abstract/document/6956580}{Secure multiparty computations on bitcoin}},
author={Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, Lukasz},
booktitle={Security and Privacy (SP), 2014 IEEE Symposium on},
pages={443--458},
year={2014},
organization={IEEE}
}
@inproceedings{androulaki08reputation,
author = {Elli Androulaki and
Seung Geol Choi and
Steven M. Bellovin and
Tal Malkin},
title = {Reputation systems for anonymous networks},
booktitle = {\bibconf[8th]{PETS}{Privacy Enhancing Technologies}},
location = {Leuven, Belgium},
month = jul,
year = 2008
}
@inproceedings{androulaki18hyperledger,
author = {Elli Androulaki and
Artem Barger and
Vita Bortnikov and
Christian Cachin and
Konstantinos Christidis and
Angelo De Caro and
David Enyeart and
Christopher Ferris and
Gennady Laventman and
Yacov Manevich and
others},
title = {\href{https://arxiv.org/pdf/1801.10228v1.pdf}{Hyperledger fabric: a distributed operating system for permissioned
blockchains}},
booktitle = {Proceedings of the Thirteenth EuroSys Conference, EuroSys 2018, Porto,
Portugal, April 23-26, 2018},
pages = {30:1--30:15},
year = {2018},
url = {http://doi.acm.org/10.1145/3190508.3190538},
doi = {10.1145/3190508.3190538},
timestamp = {Wed, 18 Apr 2018 10:45:31 +0200},
biburl = {https://dblp.org/rec/bib/conf/eurosys/AndroulakiBBCCC18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{androulaki18channels,
title={\href{https://link.springer.com/chapter/10.1007/978-3-319-99073-6_6}{Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains}},
author={Androulaki, Elli and Cachin, Christian and De Caro, Angelo and Kokoris-Kogias, Eleftherios},
booktitle={European Symposium on Research in Computer Security},
pages={111--131},
year={2018},
organization={Springer}
}
@article{ anderson13cell,
author = {Nate Anderson},
title = {\href{http://arstechnica.com/tech-policy/2013/08/how-cell-tower-dumps-caught-the-high-country-bandits-and-why-it-matters/}{How ``cell tower dumps'' caught the {High Country Bandits}---and why it matters}},
journal = {arstechnica},
month = aug # "~29,",
year = 2013,
day = 29,
}
@misc{ ansi16trusted,
author = {{American National Standards Institute}},
title = {\href{https://webstore.ansi.org/standards/ascx9/ansix9952016}{ANSI X9.95-2016: Trusted Time Stamp Management And Security}},
month = dec,
year = 2016,
}
@article{apostolaki16hijacking,
title={\href{http://arxiv.org/abs/1605.07524}{Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies}},
author={Apostolaki, Maria and Zohar, Aviv and Vanbever, Laurent},
journal = {38th IEEE Symposium on Security and Privacy},
month = may,
year = {2017},
location = {San Jose, CA},
}
@misc{ apple14icloud,
author = {Apple Support},
title = {\href{https://support.apple.com/en-us/HT204085}{Frequently asked questions about iCloud Keychain}},
month = may,
year = 2016,
}
@inproceedings{ ariyapperuma07security,
author = {Suranjith Ariyapperuma and Chris J. Mitchell},
title = {\href{https://repository.royalholloway.ac.uk/file/f209fcf0-4b82-e17c-656d-e832730b2037/10/svidad.pdf}{Security vulnerabilities in {DNS} and {DNSSEC}}},
booktitle = {\bibconf[2nd]{ARES}{International Conference on
Availability, Reliability and Security}},
month = apr,
year = 2007,
}
@article{ arthur11diginotar,
author = { Charles Arthur},
title = {\href{http://www.theguardian.com/technology/2011/sep/05/diginotar-certificate-hack-cyberwar}{DigiNotar SSL certificate hack amounts to cyberwar, says expert}},
journal = {The Guardian},
month = sep,
year = 2011,
day = 5,
}
@article{ateniese06improved,
title={\href{https://dl.acm.org/citation.cfm?id=1127346}{Improved proxy re-encryption schemes with applications to secure distributed storage}},
author={Ateniese, Giuseppe and Fu, Kevin and Green, Matthew and Hohenberger, Susan},
journal={ACM Transactions on Information and System Security (TISSEC)},
volume={9},
number={1},
pages={1--30},
year={2006},
publisher={ACM}
}
@article{arma14disable,
author = {Arma},
title = {\href{https://blog.torproject.org/blog/possible-upcoming-attempts-disable-tor-network}{Possible upcoming attempts to disable the Tor network}},
journal = {Tor Project Blog},
month = december,
year = 2014,
day = 19,
}
@inproceedings{ateniese00practical,
title={A practical and provably secure coalition-resistant group signature scheme},
author={Ateniese, Giuseppe and Camenisch, Jan and Joye, Marc and Tsudik, Gene},
booktitle={\bibconf[20th]{CRYPTO}{International Cryptology Conference}},
location = {Santa Barbara, CA},
mon = aug,
year=2000
}
@inproceedings{ateniese03quasi,
title={Quasi-efficient revocation of group signatures},
author={Ateniese, Giuseppe and Song, Dawn and Tsudik, Gene},
booktitle={\bibconf[7th]{FC}{Financial Cryptography Conference}},
location = {Guadeloupe, France},
month = jan,
year = 2003
}
@article{ attah19five,
author = {Elikem Attah},
title = {\href{https://cryptoslate.com/prolific-51-attacks-crypto-verge-ethereum-classic-bitcoin-gold-feathercoin-vertcoin/}{Five most prolific 51\% attacks in crypto: Verge, Ethereum Classic, Bitcoin Gold, Feathercoin, Vertcoin}},
journal = {Cryptoslate},
month = apr,
year = 2019,
}
@inproceedings{atzei17attacks,
author = {Atzei, Nicola and Bartoletti, Massimo and Cimoli, Tiziana},
title = {\href{https://doi.org/10.1007/978-3-662-54455-6_8}{A Survey of Attacks on Ethereum Smart Contracts SoK}},
booktitle = {Proceedings of the 6th International Conference on Principles of Security and Trust - Volume 10204},
year = {2017},
pages = {164--186},
publisher = {Springer-Verlag New York, Inc.},
}
@misc{ augur,
title = {\href{https://www.augur.net/}{Augur: A Decentralized Oracle \& Prediction Market
Protocol}},
}
@inproceedings{ aura06scanning,
author = {Aura, Tuomas and Kuhn, Thomas A. and Roe, Michael},
title = {Scanning electronic documents
for personally identifiable information},
booktitle = {\bibconf[5th]{WPES}{ACM workshop on Privacy in electronic society}},
year = {2006},
location = {Alexandria, Virginia, USA},
pages = {41--50},
publisher = {ACM},
address = {New York, NY, USA},
}
@inproceedings{au08practical,
author = {Man Ho Au and
Willy Susilo and
Yi Mu},
title={Practical anonymous divisible E-Cash from bounded accumulators},
booktitle={\bibconf[12th]{FC}{Financial Cryptography and Data Security}},
location = {Cozumel, Mexico},
month = jan,
year=2008
}
@inproceedings{au12blacr,
title={{BLACR}: {TTP}-Free Blacklistable Anonymous Credentials with Reputation},
author={Man H Au and
Apu Kapadia and
Willy Susilo},
booktitle={\bibconf[19th]{NDSS}{Annual Network \& Distributed System Security
Symposium}},
location = {San Diego, CA},
month = Feb,
year=2012
}
@misc{ aubort18epfl,
author = {Sarah Aubort},
title = {\href{https://actu.epfl.ch/news/epfl-uses-blockchain-technology-to-secure-e-voting/}{EPFL uses blockchain technology to secure e-voting systems}},
howpublished = {EPFL News},
month = jun,
year = 2018,
}
@inproceedings{azaria16medrec,
title={\href{https://ieeexplore.ieee.org/abstract/document/7573685/}{Medrec: Using blockchain for medical data access and permission management}},
author={Azaria, Asaph and Ekblaw, Ariel and Vieira, Thiago and Lippman, Andrew},
booktitle={Open and Big Data (OBD), International Conference on},
pages={25--30},
year={2016},
organization={IEEE}
}
%B
@inproceedings{backes14backref,
author = {Backes, Michael and Clark, Jeremy and Kate, Aniket and Simeonovski, Milivoj and Druschel, Peter},
title = {{BackRef}: Accountability in Anonymous Communication Networks},
booktitle = {\bibbrev{ACNS}{Applied Cryptography and Network Security}},
year = {2014},
}
@inproceedings{backstrom07wherefore,
author = {Lars Backstrom and
Cynthia Dwork and
Jon M. Kleinberg},
title = {Wherefore art thou r3579x?: anonymized social networks,
hidden patterns, and structural steganography},
booktitle = {\bibconf[16th]{WWW}{International Conference
on World Wide Web}},
month = may,
year = 2007,
location = {Canada}
}
@misc{ badertscher19ouroboros,
author = {Christian Badertscher and Peter Ga\u{z}i and Aggelos Kiayias and Alexander Russell and Vassilis Zikas},
title = {\href{https://eprint.iacr.org/2019/838}{Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake}},
howpublished = {Cryptology ePrint Archive, Report 2019/838},
year = {2019},
}
@inproceedings{ baek04identity,
author = {Joonsang Baek and Yuliang Zheng},
title = {\href{https://link.springer.com/chapter/10.1007/978-3-540-24632-9_19}{Identity-Based Threshold Decryption}},
booktitle = {\bibconf[7th]{PKC}{International Workshop on Theory and Practice in Public Key Cryptography}},
month = mar,
year = 2004,
location = {Singapore},
}
@inproceedings{ bagherzandi08multisignatures,
author = {Ali Bagherzandi and Jung Hee Cheon and Stanis\l{}aw Jarecki},
title = {Multisignatures Secure under the Discrete Logarithm Assumption and a Generalized Forking Lemma},
booktitle = {\bibconf[15th]{CCS}{ACM Conference on Computer and Communications Security}},
month = oct,
year = 2008,
}
@misc{baigneres15curve,
author = {Thomas Baign\`{e}res and C\'{e}cile Delerabl\'{e}e and Matthieu Finiasz and Louis Goubin and Tancr\`{e}de Lepoint and Matthieu Rivain},
title = {\href{http://eprint.iacr.org/2015/1249}{Trap Me If You Can -- Million Dollar Curve}},
howpublished = {Cryptology ePrint Archive, Report 2015/1249},
year = {2015},
}
@techreport{ baird16hashgraph,
author = {Leemon Baird},
title = {\href{http://www.swirlds.com/wp-content/uploads/2016/06/2016-05-31-Swirlds-Consensus-Algorithm-TR-2016-01.pdf}{Hashgraph Consensus: fair, fast, {Byzantine} fault tolerance}},
institution = {Swirlds},
number = {TR-2016-01},
month = may,
year = 2016,
}
@article{ ball13NSA,
author = { James Ball and Dominic Rushe},
title = {\href{http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data}{NSA Prism program taps in to user data of Apple, Google and others
}},
month = oct,
year = 2013,
}
@inproceedings{ballani2007hijacking,
title={\href{https://people.mpi-sws.org/~francis/sigcomm07-interception.pdf}
{A Study of Prefix Hijacking and Interception in the Internet}},
author={Ballani, Hitesh and Francis, Paul and Zhang, Xinyang},
booktitle={ACM SIGCOMM Computer Communication Review},
volume={37},
number={4},
year={2007},
organization={ACM}
}
@inproceedings{ bao09liveness,
author = {Wei Bao and Hong Li and Nan Li and Wei Jiang},
title = {\href{https://ieeexplore.ieee.org/document/5054589}{A Liveness Detection Method for Face Recognition Based on Optical Flow Field}},
booktitle = {International Conference on Image Analysis and Signal Processing},
month = apr,
year = 2009,
location = {Taizhou, China},
}
@misc{barme97great,
title = {\href{http://www.wired.com/1997/06/china-3/}{The Great Firewall of China}},
author = { GEREMIE R. BARME AND SANG YE. },
year={1997},
}
@inproceedings{ barrera14baton,
author = {Barrera, David and McCarney, Daniel and Clark, Jeremy and van
Oorschot, Paul C.},
title = {\href{http://doi.acm.org/10.1145/2627393.2627397}{Baton:
Certificate Agility for Android's Decentralized Signing Infrastructure}},
booktitle = {Proceedings of the 2014 ACM Conference on Security and Privacy
in Wireless \& Mobile Networks},
series = {WiSec '14},
year = {2014},
location = {Oxford, United Kingdom},
numpages = {12},
publisher = {ACM},
address = {New York, NY, USA},
}
@inproceedings{ barrera12meteor,
title={\href{http://www.enck.org/pubs/most12.pdf}{Meteor: Seeding a
Security-Enhancing Infrastructure for Multi-market Application Ecosystems}},
author={Barrera, David and Enck, William and van Oorschot, Paul C.},
booktitle={Mobile Security Technologies 2012},
year={2012},
organization={IEEE}
}
@article{ barret10OPM,
author = {Devlin Barret},
title = {\href{http://www.wsj.com/articles/u-s-suspects-hackers-in-china-behind-government-data-breach-sources-say-1433451888}{U.S. Suspects Hackers in China Breached About four (4) Million People's Records, Officials Say}},
month = jun,
year = 2015,
}
@inproceedings{ basin14arpki,
author = {David Basin and Cas Cremers and Tiffany Hyun-Jin Kim and
Adrian Perrig and Ralf Sasse and Pawel Szalachowski},
title = {\href{http://www.netsec.ethz.ch/research/arpki/}{{ARPKI}: Attack Resilient Public-Key Infrastructure}},
booktitle = {\bibconf{CCS}{ACM Conference on
Computer and Communications Security}},
year = 2014,
}
@inproceedings{ bates14forced,
author = {Adam Bates and Joe Pletcher and Tyler Nichols and
Braden Hollembaek and Kevin R. B. Butler},
title = {Forced Perspectives:
Evaluating an {SSL} Trust Enhancement at Scale},
booktitle = {\bibconf{IMC}{Internet Measurement Conference}},
month = nov,
year = 2014,
location = {Vancouver, BC, Canada},
}
@inproceedings{bauer03new,
title = {New covert channels in {HTTP}:
adding unwitting {Web} browsers to anonymity sets},
author = {Bauer, Matthias},
booktitle = {\bibconf[1st]{WPES}{ACM
Workshop on Privacy in the Electronic Society}},
pages = {72--78},
year = {2003},
}
% author = {Bauer, Kevin and McCoy, Damon and Grunwald, Dirk and Sicker, Douglas},
@inproceedings{bauer05bittorrent,
author = {Bauer, Kevin and others},
title = {BitBlender: light-weight anonymity for {BitTorrent}},
booktitle = {\bibbrev{AIPACa}{Workshop on Applications of private and anonymous communications}},
year = {2008},
}
@misc{beacon14reddit,
key={Reddit},
title = {Reddit: {NIST} {R}andomness {B}eacon},
howpublished = {\url{http://www.reddit.com/r/crypto/comments/21apkx/nist_randomness_beacon/}},
}
@misc{beacon14se,
key={StackExchenge},
title = {How useful is {NIST}'s {R}andomness {B}eacon for cryptographic use?},
howpublished = {\url{http://crypto.stackexchange.com/questions/15225/how-useful-is-nists-randomness-beacon-for-cryptographic-use}},
}
@inproceedings{ bellare93random,
title = {Random oracles are practical: A paradigm for designing efficient protocols},
author = {Bellare, Mihir and Rogaway, Phillip},
booktitle = {\bibconf[1st]{CCS}{ACM Conference on
Computer and Communications Security}},
pages = {62--73},
year = {1993},
}
@inproceedings{ bellare94optimal,
author = {Mihir Bellare and Phillip Rogaway},
title = {Optimal Asymmetric Encryption -- How to Encrypt with {RSA}},
booktitle = {Eurocrypt},
month = may,
year = 1994,
location = {Perugia, Italy},
}
@inproceedings{ bellare09hedged,
title = {Hedged public-key encryption: How to protect against bad randomness},
author = {Bellare, Mihir and Brakerski, Zvika and
Naor, Moni and Ristenpart, Thomas and Segev, Gil and Shacham, Hovav and Yilek, Scott},
booktitle = {{ASIACRYPT}},
pages = {232--249},
year = {2009},
publisher = {Springer}
}
@inproceedings{bellare06multi,
title={Multi-signatures in the plain public-key model and a general forking lemma},
author={Bellare, Mihir and Neven, Gregory},
booktitle = {\bibconf{CCS}{ACM Conference on
Computer and Communications Security}},
year={2006},
}
@inproceedings{ bellare09format,
title={\href{https://eprint.iacr.org/2009/251.pdf}{Format-preserving
encryption}},
author={Bellare, Mihir and Ristenpart, Thomas and Rogaway, Phillip and
Stegers, Till},
booktitle={International Workshop on Selected Areas in Cryptography},
pages={295--312},
month = aug,
year={2009}
}
@inproceedings{ bellissimo06secure,
author = {Anthony Bellissimo and John Burgess and Kevin Fu},
title = {\href{https://www.usenix.org/legacy/event/hotsec06/tech/full_papers/bellissimo/bellissimo.pdf}{Secure Software Updates: Disappointments and New Challenges}},
booktitle = {\bibconf[1st]{HotSec}{USENIX Workshop on Hot Topics in Security}},
month = jul,
year = 2006,
location = {Vancouver, BC, Canada},
}
@inproceedings{ bencsath12duqu,
title={\href{https://www.crysys.hu/publications/files/BencsathPBF12eurosec.pdf}{Duqu: Analysis, Detection, and Lessons Learned}},
author={Bencs{\'a}th, Boldizs{\'a}r and P{\'e}k, G{\'a}bor and Butty{\'a}n,
Levente and F{\'e}legyh{\'a}zi, M{\'a}rk},
booktitle={ACM European Workshop on System Security (EuroSec)},
year={2012}
}
@inproceedings{bendavid08fairplaymp,
title={{FairplayMP}: a system for secure multi-party computation},
author={Ben-David, Assaf and Nisan, Noam and Pinkas, Benny},
booktitle={{ACM} Conference on Computer and Communications Security},
month={October},
year={2008}
}
@inproceedings{bender06ring,
title={Ring signatures: Stronger definitions, and constructions without random oracles},
author={Bender, A. and Katz, J. and Morselli, R.},
booktitle={\bibconf[3rd]{TCC}{Theory of Cryptography Conference}},
pages={60--79},
year={2006},
publisher={Springer}
}
@article {bender09ring,
title = {Ring signatures: Stronger definitions, and constructions without random oracles},
journal = {Journal of Cryptology},
year = {2009},
author = {Bender,A. and Katz, Jonathan and Morselli,R.}
}
@misc{bentov16snow,
author = {Iddo Bentov and Rafael Pass and Elaine Shi},
title = {\href{http://eprint.iacr.org/2016/919}{Snow White: Provably Secure Proofs of Stake}},
howpublished = {Cryptology ePrint Archive, Report 2016/919},
year = {2016},
}
@article{ bernstein12highspeed,
author = {Daniel J. Bernstein and Niels Duif and Tanja Lange
and Peter Schwabe and Bo-Yin Yang},
title = {\href{http://link.springer.com/article/10.1007/s13389-012-0027-1}{High-speed high-security signatures}},
journal = {Journal of Cryptographic Engineering},
volume = 2,
number = 2,
pages = {77-89},
year = 2012,
url = {http://link.springer.com/article/10.1007/s13389-012-0027-1},
}
@inproceedings{ bernstein13elligator,
title={\href{https://elligator.cr.yp.to/elligator-20130828.pdf}{Elligator:
Elliptic-curve points indistinguishable from uniform random strings}},
author={Bernstein, Daniel J and Hamburg, Mike and Krasnova, Anna and
Lange, Tanja},
booktitle = {ACM CCS},
month = nov,
year = 2013
}
@misc{bernstein15dualec,
title = {\href{http://eprint.iacr.org/2015/767}{Dual {EC}: {A Standardized Back Door}}},
author = {{Bernstein}, Daniel J. and {Lange}, Tanja and {Niederhagen}, Ruben},
howpublished = {Cryptology ePrint Archive, Report 2015/767},
year = {2015},
}
@inproceedings{berthold00cascade,
title = {The disadvantages of free {MIX} routes and how to overcome them},
author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
booktitle = {Workshop on Design Issues in Anonymity and Unobservability},
year = {2000},
month = {July},
pages = {30--45},
}
@inproceedings{berthold00anonymity,
author = {Berthold, Oliver and Federrath, Hannes and K\"{o}hntopp, Marit},
title = {Project ``anonymity and unobservability in the Internet''},
booktitle = {\bibbrev{CFP}{Conference on Computers, freedom and privacy: challenging the assumptions}},
year = {2000},
month = {April}
}
@inproceedings{ berthold02dummy,
author = {Berthold, Oliver and Langos, Heinrich},
title = {Dummy traffic against long term intersection attacks},
booktitle = {\bibconf[2nd]{PET}{Workshop on Privacy Enhancing Technologies}},
year = {2002},
}
@inproceedings{bethencourt10signatures,
author = {John Bethencourt and
Elaine Shi and
Dawn Song},
title = {Signatures of Reputation},
booktitle = {\bibconf[14th]{FC}{Financial Cryptography and Data Security}},
location = {Canary Islands, Spain},
month = jan,
year = 2010
}
@inproceedings{bian2007off,
title={Off-the-record instant messaging for group conversation},
author={Bian, Jiang and Seker, Remzi and Topaloglu, Umit},
booktitle={Information Reuse and Integration, 2007. IRI 2007. IEEE International Conference on},
year={2007},
}
@article{ bier09rules,
author={Bier, E. and Chow, R. and Golle,
P. and King, T.H. and Staddon, J.},
journal={Security Privacy, IEEE},
title={The Rules of Redaction: Identify, Protect, Review (and Repeat)},
year={2009},
month={nov.-dec. },
volume={7},
number={6},
pages={46 -53},
}
@article{ bischoff18passports,
author = {Paul Bischoff},
title = {\href{https://www.comparitech.com/blog/vpn-privacy/passports-on-the-dark-web-how-much-is-yours-worth/}{Passports on the dark web: how much is yours worth?}},
journal = {Comparitech},
month = oct,
year = 2018,
day = 4,
}
@inproceedings{bhattacharya11computer,
title={Computer viruses in urban {Indian} telecenters: Characterizing an unsolved problem},
author={Bhattacharya, Prasanta and Thies, William},
booktitle={\bibconf[5th]{NSDR}{ACM workshop on Networked systems for developing regions}},
year={2011},
month=jun,
}
@inproceedings{bhargavan14triple,
title={\href{https://www.ieee-security.org/TC/SP2014/papers/TripleHandshakesandCookieCutters_c_BreakingandFixingAuthenticationoverTLS.pdf}{Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS}},
author={Bhargavan, Karthikeyan and Lavaud, Antoine Delignat and Fournet, C{\'e}dric and Pironti, Alfredo and Strub, Pierre Yves},
booktitle={IEEE Symposium on Security and Privacy},
year={2014}
}
@inproceedings{blakley79keys,
title = {\href{https://www.computer.org/csdl/proceedings/afips/1979/5087/00/50870313.pdf}{Safeguarding cryptographic keys}},
author={Blakley, George Robert},
booktitle={Proceedings of the national computer conference},
volume={48},
pages={313--317},
year={1979}
}
@inproceedings{blomer15anonymous,
author = {Johannes Bl{\"{o}}mer and
Jakob Juhnke and
Christina Kolb},
title = {Anonymous and publicly linkable reputation systems},
booktitle = {\bibconf[19th]{FC}{Financial Cryptography and Data Security}},
location = {Puerto Rico},
month = jan,
year = 2015
}
@techreport{blough11ct,
title={CT-T: MedVault-ensuring security and privacy for electronic medical records},
author={Blough, Douglas M and Liu, Ling and Sainfort, Francois and Ahamad, Mustaque},
year={2011},
institution={Georgia Institute of Technology}
}
@article{blum86prng,
author = {Blum, Lenore and Blum, Manuel and Shub, Michael},
title = {A simple unpredictable pseudo random number generator},
journal = {SIAM J. Comput.},
year = {1986}
}
@inproceedings{blum19synchronous,
title={Synchronous Consensus with Optimal Asynchronous Fallback Guarantees},
author={Blum, Erica and Katz, Jonathan and Loss, Julian},
booktitle={Theory of Cryptography Conference},
pages={131--150},
year={2019},
organization={Springer}
}
@incollection{blundo94randomness,
author = {Blundo, Carlo and
De Santis, Alfredo and
Vaccaro, Ugo},
title = {Randomness in distribution protocols},
booktitle = {Automata, Languages and Programming},
volume = {820},
series = {Lecture Notes in Computer Science},
editor = {Abiteboul, Serge and Shamir, Eli},
publisher = {Springer Berlin Heidelberg},
pages = {568-579},
year = {1994},
language = {English},
doi = {10.1007/3-540-58201-0_99},
url = {http://dx.doi.org/10.1007/3-540-58201-0_99},
isbn = {978-3-540-58201-4},
}
@inproceedings{blundo12espresso,
author = {Carlo Blundo and
Emiliano de Cristofaro and
Paolo Gasti},
title = {{EsPRESSo}: Efficient Privacy-Preserving Evaluation
of Sample Set Similarity},
booktitle = {DPM/SETOP},
month = sep,
year = 2012
}
@article{blundo14espresso,
author = {Carlo Blundo and
Emiliano de Cristofaro and
Paolo Gasti},
title = {{EsPRESSo}: {E}fficient Privacy-Preserving Evaluation
of Sample Set Similarity},
journal = {Journal of Computer Security},
volume = {22},
number = {3},
pages = {355--381},
year = 2014
}
@inproceedings{ bobbio14reproducible,
author = {J\'er\'emy {Bobbio (Lunar)}},
title = {\href{https://archive.fosdem.org/2014/schedule/event/reproducibledebian/}{Reproducible Builds for Debian}},
booktitle = {FOSDEM},
month = feb,
year = 2014,
}
@article{bogdanov13pushing,
title={Pushing back the rain\ --\ how to create trustworthy services in the cloud},
author={Bogdanov, Dan and Kalu, Aivo},
journal={{ISACA} Journal},
volume={3},
year={2013},
pages={49--51}
}
@inproceedings{ bogetoft09secure,
author = {Peter Bogetoft and Dan Lund Christensen and Ivan Dam\r{g}ard and
Martin Geisler and Thomas Jakobsen and Mikkel Kr\o{}igaard and
Janus Dam Nielsen and Jesper Buus Nielsen and Kurt Nielsen and
Jakob Pagter and Michael Schwartzbach and Tomas Toft},
title = {\href{https://link.springer.com/chapter/10.1007/978-3-642-03549-4_20}{Secure Multiparty Computation Goes Live}},
booktitle = {\bibconf[13th]{FC}{International Conference on Financial Cryptography and Data Security}},
month = feb,
year = 2009,
location = {Accra Beach, Barbados},
}
@incollection { boneh98decision,
author = {Dan Boneh},
title = {The Decision {Diffie-Hellman} problem},
booktitle = {Algorithmic Number Theory},
series = {Lecture Notes in Computer Science},
editor = {Joe Buhler},
publisher = {Springer Berlin / Heidelberg},
pages = {48-63},
volume = {1423},
note = {10.1007/BFb0054851},
year = {1998}
}
@incollection{ boneh01identity,
author = {Dan Boneh and Matt Franklin},
title = {Identity-Based Encryption from the {Weil} Pairing},
booktitle = {\bibconf[21st]{CRYPTO}{IACR International Cryptology Conference}},
year = {2001}
}
@article{boneh1998decision,
title={The decision diffie-hellman problem},
author={Boneh, Dan},
journal={Algorithmic number theory},
pages={48--63},
year={1998},
publisher={Springer}
}
@inproceedings{boneh01short,
title = {\href{https://www.iacr.org/archive/asiacrypt2001/22480516.pdf}{Short signatures from the Weil pairing}},
author={Boneh, Dan and Lynn, Ben and Shacham, Hovav},
booktitle={International Conference on the Theory and Application of Cryptology and Information Security},
pages={514--532},
year={2001},
organization={Springer}
}
@article{boneh03survey,
title={A survey of two signature aggregation techniques},
author={Boneh, Dan and Gentry, Craig and Lynn, Ben and Shacham, Hovav and others},
journal={RSA cryptobytes},
year={2003}
}
@inproceedings{ boneh04efficient,
title = {Efficient {selective-ID} secure identity-based encryption without random oracles},
author = {Boneh, Dan and Boyen, Xavier},
booktitle = {\bibconf{Eurocrypt}{International Conference on the
Theory and Applications of Cryptographic Techniques}},
pages = {223--238},
year = {2004},
}
@inproceedings{boneh04short,
title={Short group signatures},
author={Boneh, Dan and Boyen, Xavier and Shacham, Hovav},
booktitle={\bibconf[24th]{CRYPTO}{International Cryptology Conference}},
location = {Santa Barbara, CA},
mon = aug,
year=2004
}
@inproceedings{ boneh16balloon,
author = {Dan Boneh and Henry Corrigan-Gibbs and Stuart Schechter},
title = {\href{https://eprint.iacr.org/2016/027}{Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks}},
booktitle = {Asiacrypt},
month = dec,
year = 2016,
location = {Hanoi, Vietnam},
}
@inproceedings{ boneh18compact,
author = {Dan Boneh and Manu Drijvers and Gregory Neven},
title = {\href{https://eprint.iacr.org/2018/483}{Compact Multi-Signatures for Smaller Blockchains}},
booktitle = {Advances in Cryptology -- ASIACRYPT 2018},
month = dec,
year = 2018,
}
@inproceedings{ boneh18verifiable,
author = {Dan Boneh and Joseph Bonneau and Benedikt B\"unz and Ben Fisch},
title = {Verifiable Delay Functions},
booktitle = {\bibconf[38th]{CRYPTO}{Advances in Cryptology}},
month = aug,
year = 2018,
location = {Santa Barbara, CA, USA},
}
@misc{ bonneau15bitcoin,
author = {Joseph Bonneau and Jeremy Clark and Steven Goldfeder},
title = {\href{https://eprint.iacr.org/2015/1015.pdf}{On Bitcoin as a public randomness source}},
howpublished = {{IACR} eprint archive},
month = oct,
year = 2015,
}
@inproceedings{ bonneau16ethiks,
author={Bonneau, Joseph},
title={\href{https://link.springer.com/chapter/10.1007/978-3-662-53357-4_7}{EthIKS: Using Ethereum to Audit a CONIKS Key Transparency Log}},
booktitle={\bibconf{FC}{Financial Cryptography and Data Security}},
pages={95--105},
year={2016},
publisher={Springer Berlin Heidelberg},
isbn={978-3-662-53357-4},
doi={10.1007/978-3-662-53357-4_7},
url={http://dx.doi.org/10.1007/978-3-662-53357-4_7}
}
@inproceedings{borge17PoP,
title={\href{http://bford.info/pub/dec/pop-abs}{{Proof-of-Personhood}: Redemocratizing Permissionless Cryptocurrencies}},
booktitle={\href{http://prosecco.gforge.inria.fr/ieee-blockchain2016/}{1st IEEE Security and Privacy on the Blockchain}},
author = {Maria Borge and Eleftherios Kokoris-Kogias and Philipp Jovanovic and Nicolas Gailly and Linus Gasser and Bryan Ford},
month = apr,
year={2017},
}
@inproceedings{borisov2004off,
title={Off-the-record communication, or, why not to use PGP},
author={Borisov, Nikita and Goldberg, Ian and Brewer, Eric},
booktitle = {\bibconf{WPES}{ACM workshop on Privacy in the electronic society}},
year={2004},
}
% obsoleted by conference version: boldyreva03threshold
@inproceedings{boldyreva02threshold,
title={\href{https://eprint.iacr.org/2002/118}{Threshold Signatures, Multisignatures and Blind Signatures Based on the {Gap-Diffie-Hellman-Group} Signature Scheme}},
author={Boldyreva, Alexandra},
booktitle={Public Key Cryptography -- PKC 2003},
publisher= {Springer},
year={2002},
}
@inproceedings{boldyreva03threshold,
title = {\href{https://link.springer.com/chapter/10.1007/3-540-36288-6_3}{Threshold Signatures, Multisignatures and Blind Signatures Based on the {Gap-Diffie-Hellman-Group} Signature Scheme}},
author = {Boldyreva, Alexandra},
booktitle = {\bibconf[6th]{PKC}{International Workshop on Practice and Theory in Public Key Cryptography}},
month = jan,
year = 2003,
location = {Miami, FL, USA},
}
@inproceedings{bos2014elliptic,
title={Elliptic curve cryptography in practice},
author={Bos, Joppe W and Halderman, J Alex and Heninger, Nadia and Moore, Jonathan and Naehrig, Michael and Wustrow, Eric},
booktitle={International Conference on Financial Cryptography and Data Security},
pages={157--175},
year={2014},
organization={Springer}
}
@inproceedings{bos15post,
title={\href{https://ieeexplore.ieee.org/abstract/document/7163047}{Post-quantum key exchange for the TLS protocol from the ring learning with errors problem}},
author={Bos, Joppe W and Costello, Craig and Naehrig, Michael and Stebila, Douglas},
booktitle={Security and Privacy (SP), 2015 IEEE Symposium on},
pages={553--570},
year={2015},
organization={IEEE}
}
@misc{boyle11coin,
author = {Elette Boyle and Shafi Goldwasser and Yael Tauman Kalai},
title = {\href{https://eprint.iacr.org/2011/291.pdf}{Leakage-Resilient Coin Tossing}},
howpublished = {Cryptology ePrint Archive, Report 2011/291},
year = {2011},
}
@article{brennan12stylometry,
author = {Brennan, Michael and Afroz, Sadia and Greenstadt, Rachel},
title = {Adversarial Stylometry: Circumventing Authorship Recognition to Preserve Privacy and Anonymity},
journal = {\bibconf{TISSEC}{ACM Transactions on Information and System Security}},
month = nov,
year = {2012},
}
@inproceedings{ bresson02dynamic,
author = {Bresson, Emmanuel and Chevassut, Olivier and Pointcheval, David},
title = {Dynamic Group {Diffie-Hellman} Key Exchange under Standard Assumptions},
booktitle = {Proceedings of the International Conference on the Theory and
Applications of Cryptographic Techniques: Advances in Cryptology},
series = {Eurocrypt},
year = {2002},
isbn = {3-540-43553-0},
pages = {321--336},
publisher = {Springer-Verlag},
address = {London, UK, UK},
}
@article{ bright11diginotar,
author = { Peter Bright},
title = {\href{http://arstechnica.com/security/2011/08/earlier-this-year-an-iranian/}{Another fraudulent certificate raises the same old questions about certificate authorities}},
journal = {arstechnica},
month = aug,
year = 2011,
day = 29,
}
@article{ bright11comodo,
author = { Peter Bright},
title = {\href{http://arstechnica.com/security/2011/03/how-the-comodo-certificate-fraud-calls-ca-trust-into-question/}{How the Comodo certificate fraud calls CA trust into questions}},
journal = {arstechnica},
month = mar,
year = 2011,
day = 24,
}
@inproceedings{buchmann07merkle,
title = {Merkle Signatures with Virtually Unlimited Signature Capacity.},
author = {Buchmann, Johannes and Dahmen, Erik and Klintsevich, Elena and Okeya, Katsuyuki and Vuillaume, Camille},
booktitle = {\bibbrev{ACNS}{Applied Cryptography and Network Security}},
year = 2007
}
@thesis{buchman16tendermint,
title={\href{https://atrium.lib.uoguelph.ca/xmlui/bitstream/handle/10214/9769/Buchman_Ethan_201606_MAsc.pdf?sequence=7&isAllowed=y}{Tendermint: Byzantine Fault Tolerance in the Age of Blockchains}},
author={Buchman, Ethan},
year={2016}
}
@misc{ robinson17using,
author = {David ``Karit'' Robinson},
title = {\href{https://zxsecurity.co.nz/presentations/201707_Defcon-ZXSecurity-GPSSpoofing.pdf}{Using GPS Spoofing to Control Time}},
howpublished = {DEFCON 25},
month = jul,
year = 2017,
}
@article{bunz17proofs,
author = {Benedikt B{\"{u}}nz and
Jonathan Bootle and
Dan Boneh and
Andrew Poelstra and
Pieter Wuille and
Greg Maxwell},
title = {\href{https://eprint.iacr.org/2017/1066.pdf}{Bulletproofs: Short Proofs for Confidential Transactions and
More}},
journal = {{IACR} Cryptology ePrint Archive},
volume = {2017},
pages = {1066},
year = {2017},
url = {http://eprint.iacr.org/2017/1066},
timestamp = {Mon, 19 Mar 2018 14:21:51 +0100}
}
@article{ burgess15un,
author = {Matt Burgess},
title = {\href{http://www.wired.co.uk/news/archive/2015-11/10/surveillance-investigatory-powers-scary-joseph-cannataci}{UN privacy chief: UK surveillance bill is 'worse than scary'}},
journal = {Wired.co.uk},
month = nov,
year = 2015,
day = 10,
}
@inproceedings{burkhart10sepia,
title={Sepia: Privacy-preserving aggregation of multi-domain network events and statistics},
author={Burkhart, Martin and Strasser, Mario and Many, Dilip and Dimitropoulos, Xenofontas},
booktitle={{USENIX} Security Symposium},
month={August},
year={2010}
}
@inproceedings{burrows06chubby,
title={The Chubby lock service for loosely-coupled distributed systems},
author={Burrows, Mike},
booktitle={Proceedings of the 7th symposium on Operating systems design and implementation},
pages={335--350},
year={2006}
}
@misc{buterin15notes,
title={\href{https://pdfs.semanticscholar.org/ae5b/c3aaf0e02a42f4cd41916072c87db0e04ac6.pdf}{Notes on Scalable Blockchain Protocols (verson 0.3)}},
author={Buterin, Vitalik and Coleman, Jeff and Wampler-Doty, Matthew},
year={2015}
}
@article{buterin2016hardfork,
author = {Vitalik Buterin},
title = {\href{https://blog.ethereum.org/2016/07/20/hard-fork-completed/}{Hard fork completed}},
year={2016}
}
@article{ byers04leakage,
author = {Simon Byers},
title = {Information Leakage Caused by Hidden
Data in Published Documents},
journal ={IEEE Security and Privacy},
volume = {2},
year = {2004},
pages = {23-27},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
%C
@misc{ c4ads19above,
author = {C4ADS},
title = {\href{https://www.c4reports.org/aboveusonlystars}{Above Us Only Stars: Exposing GPS Spoofing in Russia and Syria}},
month = apr,
year = 2019,
}
@inproceedings{cachin16architecture,
title={\href{https://www.zurich.ibm.com/dccl/papers/cachin_dccl.pdf}{Architecture of the Hyperledger blockchain fabric}},
author={Cachin, Christian},
booktitle={Workshop on Distributed Cryptocurrencies and Consensus Ledgers},
year={2016}
}
@inproceedings{ cachin00random,
author = {Christian Cachin and Klaus Kursawe and Victor Shoup},
title = {\href{http://link.springer.com/article/10.1007/s00145-005-0318-0}{Random Oracles in {Constantinople}:
Practical Asynchronous {Byzantine} Agreement
Using Cryptography}},
booktitle = {19th ACM Symposium on Principles of Distributed Computing
(PODC)},
year = 2000,
}
% month = jul,
% url = {http://link.springer.com/article/10.1007/s00145-005-0318-0},
@inproceedings{ cachin01secure,
author = {Christian Cachin and Klaus Kursawe and Frank Petzold
and Victor Shoup},
title = {\href{http://www.zurich.ibm.com/~cca/papers/abc.pdf}{Secure and Efficient Asynchronous Broadcast Protocols}},
booktitle = {Advances in Cryptology (CRYPTO)},
year = 2001,
}
% month = aug,
% url = {http://www.zurich.ibm.com/~cca/papers/abc.pdf},
@inproceedings{ cachin02asynchronous,
author = {Christian Cachin and Klaus Kursawe and Anna Lysyanskaya and
Reto Strobl},
title = {\href{https://dl.acm.org/citation.cfm?id=586124}{Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems}},
booktitle = {\bibconf[9th]{CCS}{ACM Conference on
Computer and Communications Security}},
month = nov,
year = 2002,
}
@inproceedings{ cachin02secure,
author = {Christian Cachin and Jonathan A. Poritz},
title = {\href{https://cachin.com/cc/papers/sintra.pdf}{Secure Intrusion-tolerant Replication on the Internet}},
booktitle = {\bibconf{DSN}{Dependable Systems and Networks}},
month = jun,
year = 2002,
location = {Bethesda, MD, USA},
}
@inproceedings{ cachin04secure,
author = {Christian Cachin and Asad Samar},
title = {Secure distributed {DNS}},
booktitle = {Dependable Systems and Networks (DSN)},
month = jul,
year = 2004,
url = {http://www.zurich.ibm.com/~cca/papers/dnsrepl.pdf},
}
@article{ cachin05random,
title={Random oracles in {Constantinople}: Practical asynchronous Byzantine agreement using cryptography},
author={Cachin, Christian and Kursawe, Klaus and Shoup, Victor},
journal={Journal of Cryptology},
volume={18},
number={3},
pages={219--246},
year={2005},
publisher={Springer}
}
@inproceedings{ cai12touching,
author = {Xiang Cai and Xin Cheng Zhang and Brijesh Joshi
and Rob Johnson},
title = {\href{https://nymity.ch/tor-dns/pdf/Cai2012a.pdf}{Touching from a Distance: Website Fingerprinting Attacks and Defenses}},
booktitle = {ACM Conference on Computer and Communications Security},
month = oct,
year = 2012,
}
@inproceedings{ calandrino07machine,
author = {Joseph A. Calandrino and J. Alex Halderman and Edward W. Felten},
title = {\href{https://www.usenix.org/legacy/event/evt07/tech/full_papers/calandrino/calandrino_html/}{Machine-Assisted Election Auditing}},
booktitle = {\bibconf{ETV}{USENIX/ACCURATE Electronic Voting Technology Workshop}},
month = aug,
year = 2007,
}
@misc{callas07openpgp,
title={\href{https://tools.ietf.org/html/rfc4880}{RFC 4880: OpenPGP Message Format}},
author={Callas, J. and Donnerhacke, L. and Finney, H. and Shaw, D. and Thayer, R.},
year={2007},
}
@inproceedings{ camenisch97efficient,
title={Efficient group signature schemes for large groups},
author={Camenisch, Jan and Stadler, Markus},
booktitle={CRYPTO '97},
month=aug,
year={1997},
location={Santa Barbara, CA},
}
@inproceedings{ camenisch01efficient,
title={An efficient system for non-transferable anonymous credentials with optional anonymity revocation},
author={Jan Camenisch and Anna Lysyanskaya},
booktitle={EUROCRYPT},
month = may,
year=2001
}
@inproceedings{ camenisch02dynamic,
title={Dynamic accumulators and application to efficient revocation of
anonymous credentials},
author={Jan Camenisch and Anna Lysyanskaya},
booktitle={\bibconf[22nd]{CRYPTO}{Annual International Cryptology Conference}},
location={Santa Barbara, CAT},
month=aug,
year=2001
}
@inproceedings{camenisch05compact,
author = {Camenisch, Jan and
Hohenberger, Susan and
Lysyanskaya, Anna},
title = {Compact e-cash},
booktitle = {\bibconf[24th]{EUROCRYPT}{International Conference
on the theory and Applications of Cryptographic Techniques}},
location = {Aarhus, Denmark},
month = may,
year = 2005
}
@inproceedings{camenisch06balancing,
author={Jan Camenisch and
Susan Hohenberger and
Anna Lysyanskaya},
title={Balancing Accountability and Privacy Using E-Cash (Extended Abstract)},
booktitle = {\bibconf[5th]{SCN}{Security and Cryptography for Networks}},
location = {Maiori, Italy},
month = sep,
year = 2006
}
@inproceedings{camenisch07endorsed,
author={Jan Camenisch and
Anna Lysyanskaya and
Mira Meyerovich},
title={Endorsed e-cash},
booktitle={\bibconf[28th]{S{\&}P}{IEEE Symposium on Security and Privacy}},
location={Oakland, CA},
month=may,
year=2007
}
@inproceedings{camenisch08cred,
author = {Camenisch, Jan and Gro\ss, Thomas},
title = {Efficient attributes for anonymous credentials},
booktitle = {Proceedings of the 14th ACM Conference on Computer and Communications Security},
series = {{CCS}}, year = {2008},
pages = {345--356},
publisher = {ACM},
}
@inproceedings{ cao13redefining,
author = {Yinzhi Cao and Vaibhav Rastogi and Zhichun Li and Yan Chen
and Alexander Moshchuk},
title = {Redefining Web Browser Principals with a
Configurable Origin Policy},
booktitle = {\bibconf[43rd]{DSN}{IEEE/IFIP International Conference
on Dependable Systems and Networks}},
month = jun,
year = 2013,
location = {Budapest},
}
@inproceedings{ cappos08look,
author = {Justin Cappos and Justin Samuel and Scott Baker
and John H. Hartman},
title = {\href{http://www.cs.arizona.edu/stork/packagemanagersecurity/ccs2008.pdf}{A Look In the Mirror: Attacks on Package Managers}},
booktitle = {\bibconf[15th]{CCS}{ACM Conference on
Computer and Communications Security}},
month = oct,
year = 2008,
location = {Alexandria, VA},
}
@inproceedings{ cappos13avoiding,
author = {Justin Cappos},
title = {Avoiding Theoretical Optimality to Efficiently
and Privately Retrieve Security Updates},
booktitle = {\bibconf[17th]{FC}{Financial Cryptography and Data Security}},
month = apr,
year = 2013,
}
@inproceedings{ cascudo17scrape,
author = {Ignacio Cascudo and Bernardo David},
title = {\href{https://link.springer.com/chapter/10.1007/978-3-319-61204-1_27}{SCRAPE: Scalable Randomness Attested by Public Entities}},
booktitle = {\bibconf[15th]{ACNS}{International Conference on Applied Cryptography and Network Security}},
month = jul,
year = 2017,
location = {Kanazawa, Japan},
}
@article{ castiglione07advantages,
author = "A. Castiglione and A. De Santis and C. Soriente",
title = "Taking advantages of a disadvantage: Digital forensics and steganography using document metadata",
journal = "Journal of Systems and Software",
volume = "80",
number = "5",
pages = "750 - 764",
year = "2007",
}
@inproceedings{cha03identity,
title={An identity-based signature from gap Diffie-Hellman groups},
author={Cha, Jae Choon and Cheon, Jung Hee},
booktitle={{PKC}},
volume={2567},
pages={18--30},
year={2003}
}
@inproceedings{chandra07paxos,
title={Paxos made live: an engineering perspective},
author={Chandra, Tushar D and Griesemer, Robert and Redstone, Joshua},
booktitle={Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing},
pages={398--407},
year={2007}
}
@article{ chanthadavong15biometrics,
author = {Aimee Chanthadavong},
title = {\href{https://www.zdnet.com/article/biometrics-the-password-you-cannot-change/}{Biometrics: The password you cannot change}},
journal = {ZDNet},
month = aug,
year = 2015,
}
@inproceedings{chase16transparency,
title={Transparency Overlays and Applications},
author={Chase, Melissa and Meiklejohn, Sarah},
booktitle={Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security},
pages={168--179},
year={2016},
organization={ACM}
}
@inproceedings{chaum82blind,
title={Blind Signatures for Untraceable Payments.},
author={Chaum, David},
booktitle = {\bibconf{CRYPTO}{International Cryptology Conference}},
year={1982}
}
@inproceedings{chaum86demonstrating,
title={Demonstrating possession of a discrete logarithm without revealing it},
author={Chaum, David and Evertse, Jan-Hendrik and van de Graaf, Jeroen and Peralta, Ren{\'e}},
booktitle={Conference on the Theory and Application of Cryptographic Techniques},
pages={200--212},
year={1986},
organization={Springer}
}
@inproceedings{ chaum88untraceable,
author = {David Chaum and Amos Fiat and Moni Naor},
title = {Untraceable Electronic Cash},
booktitle = {\bibconf{CRYPTO}{International Cryptology Conference}},
month = aug,
year = 1988,
location = {Santa Barbara, CA},
}
@inproceedings{chaum91group,
title={Group signatures},
author={Chaum, David and Van Heyst, Eug{\`e}ne},
booktitle={\bibconf{EUROCRYPT}{Advances in Cryptology}},
month = apr,
year = 1991
}
@inproceedings{ chaum92wallet,
author = {Chaum, David and Pedersen, Torben P.},
title = {Wallet Databases with Observers},
booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}},
year = {1992},
}
@misc{ chaum16random,
author = {David Chaum},
title = {\href{https://rsvoting.org/whitepaper/white_paper.pdf}{Random-Sample Voting}},
year = 2016,
}
@inproceedings{checkoway11comprehensive,
title={Comprehensive Experimental Analyses of Automotive Attack Surfaces},
author={Checkoway, Stephen and McCoy, Damon and
Kantor, Brian and Anderson, Danny and Shacham, Hovav and Savage, Stefan and
Koscher, Karl and Czeskis, Alexei and Roesner, Franziska and Kohno, Tadayoshi},
booktitle={{USENIX} Security Symposium},
year={2011}
}
@inproceedings{checkoway14practical,
title={On the practical exploitability of {Dual EC} in {TLS} implementations},
author={Checkoway, Stephen and Fredrikson, Matthew and Niederhagen, Ruben and Everspaugh, Adam and Green, Matthew and Lange, Tanja and Ristenpart, Thomas and Bernstein, Daniel J and Maskiewicz, Jake and Shacham, Hovav},
booktitle={USENIX Security Symposium},
year={2014}
}
@inproceedings{chen13splitx,
author = {Ruichuan Chen and
Istemi Ekin Akkus and
Paul Francis},
title = {Split{X}: {H}igh-Performance Private Analytics},
booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}},
location = {Hong Kong, China},
month = aug,
year = 2013
}
@article{cheng18ekiden,
title={\href{https://arxiv.org/pdf/1804.05141.pdf}{Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and
Performant Smart Contract Execution}},
author={Cheng, Raymond and Zhang, Fan and Kos, Jernej and He, Warren and Hynes, Nicholas and Johnson, Noah and Juels, Ari and Miller, Andrew and Song, Dawn},
journal={arXiv preprint arXiv:1804.05141},
year={2018}
}
@inproceedings{cherif11optimistic,
title={\href{https://dl.acm.org/citation.cfm?id=1982374}{Optimistic
access control for distributed collaborative editors}},
author={Cherif, Asma and Imine, Abdessamad and Rusinowitch,
Micha{\"e}l},
booktitle={ACM Symposium on Applied Computing},
pages={861--868},
year={2011}
}
@article{ chesney18deep,
author = {Robert Chesney and Danielle Keats Citron},
title = {\href{https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3213954}{Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security}},
journal = {California Law Review},
month = jul,
year = 2018,
}
Chesney, Robert and Citron, Danielle Keats, Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security (July 14, 2018). 107 California Law Review (2019, Forthcoming); U of Texas Law, Public Law Research Paper No. 692; U of Maryland Legal Studies Research Paper No. 2018-21. Available at SSRN: https://ssrn.com/abstract=3213954 or http://dx.doi.org/10.2139/ssrn.3213954
@incollection{ chevallier06encoding,
author = {Chevallier-Mames, Benoît and Paillier, Pascal and Pointcheval, David},
title = {Encoding-Free ElGamal Encryption Without Random Oracles},
booktitle = {Public Key Cryptography - PKC 2006},
series = {Lecture Notes in Computer Science},
editor = {Yung, Moti and Dodis, Yevgeniy and Kiayias, Aggelos and Malkin, Tal},
publisher = {Springer Berlin / Heidelberg},
pages = {91-104},
volume = {3958},
year = {2006}
}
@article{chokhani99internet,
title={Internet {X.509} public key infrastructure certificate policy and certification practices framework},
author={Chokhani, Santosh and Ford, Warwick},
year={1999},
note={RFC 2527},
}
@inproceedings{ chor85verifiable,
author = {Benny Chor and Shafi Goldwasser and Silvio Micali and Baruch Awerbuch},
title = {\href{https://ieeexplore.ieee.org/document/4568164}{Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults}},
booktitle = {\bibconf[26th]{SFCS}{Symposium on Foundations of Computer Science}},
month = oct,
year = 1985,
location = {Portland, OR, USA},
}
@article{christin13incognisense,
author = {Delphine Christin and
Christian Ro{\ss}kopf and
Matthias Hollick and
Leonardo A. Martucci and
Salil S. Kanhere},
title = {Incogni{S}ense: {A}n anonymity-preserving reputation
framework for participatory sensing applications},
journal = {Pervasive and Mobile Computing},
volume = {9},
number = {3},
pages = {353--371},
year = 2013
}
@inproceedings{clark10beacon,
author = {Jeremy Clark and Urs Hengartner},
title = {\href{https://www.usenix.org/conference/evtwote-10/use-financial-data-random-beacon}{On the Use of Financial Data as a Random Beacon}},
booktitle = {\bibconf{EVT/WOTE}{Electronic Voting Technology Workshop/Workshop on Trustworthy Elections}},
month = aug,
year = {2010},
location = {Washington, DC, USA},
}
@inproceedings{clark13sok,
title={{SoK}: {SSL} and {HTTPS}: Revisiting past challenges and evaluating certificate trust model enhancements},
author={Clark, Jeremy and van Oorschot, Paul C},
booktitle = {{IEEE} Symposium on Security and Privacy},
booktitle = {IEEE \bibconf[34th]{SP}{Symposium on Security and Privacy}},
month = may,
year = {2013},
}
@inproceedings{clauss13kanonymous,
author = {Sebastian Clau{\ss} and
Stefan Schiffner and
Florian Kerschbaum},
title = {\emph{k}-anonymous reputation},
booktitle = {\bibconf[8th]{AsiaCCS}{ACM Symposium on Information,
Computer and Communications Security}},
location = {Hangzhou, China},
month = may,
year = 2013
}
@inproceedings{clement09making,
title={\href{https://www.usenix.org/legacy/events/nsdi09/tech/full_papers/clement/clement.pdf}{Making {Byzantine} Fault Tolerant Systems Tolerate Byzantine Faults}},
author={Clement, Allen and Wong, Edmund L and Alvisi, Lorenzo and Dahlin, Michael and Marchetti, Mirco},
booktitle={6th USENIX Symposium on Networked Systems Design and Implementation},
year={2009},
}
% month = apr,
% url={https://www.usenix.org/legacy/events/nsdi09/tech/full_papers/clement/clement.pdf},
@article{ cloudflare16cloudflare,
author = {CloudFlare, Inc.},
title = {\href{https://www.cloudflare.com/}{CloudFlare - The web performance \& security company
}},
month = may,
year = 2016,
}
@article{ cohen08bittorent,
author = {Bram Cohen},
title = {\href{http://www.bittorrent.org/beps/bep_0003.html}{The BitTorrent Protocol Specification}},
month = jan,
year = 2008,
}
@misc{coindesk180x,
author = {CoinDesk},
title = {\href{https://www.coindesk.com/decentralized-exchange-crypto-dex}{Decentralized Exchanges Arent Living Up to Their Name - And Data Proves It}},
month = jul,
year = 2018,
}
@misc{coindeskethupgrade,
author = {CoinDesk},
title = {\href{https://www.coindesk.com/ethereum-network-draws-developer-ire-after-scheduling-new-years-day-upgrade}{Ethereum Network Draws Developer Ire After Scheduling New Years Day Upgrade}},
month = dec,
year = 2019,
}
@article{ comodo11comodo,
author = {Comodo Group},
title = {\href{https://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html}{Comodo Fraud Incident
}},
month = jul,
year = 2015,
}
@misc{ conner-simons19programmers,
author = {Adam Conner-Simons},
title = {\href{https://www.csail.mit.edu/news/programmers-solve-mits-20-year-old-cryptographic-puzzle}{Programmers solve MITs 20-year-old cryptographic puzzle}},
month = apr,
year = 2019,
}
@inproceedings{ corrigangibbs13conscript,
author = {Corrigan-Gibbs, Henry and Ford, Bryan},
title = {Conscript your friends into larger anonymity sets with {JavaScript}},
booktitle = {\bibconf{WPES}{Workshop in Privacy in the Electronic Society}},
month = nov,
year = {2013},
comment = {workshop},
}
@misc{ corrigangibbs13conscript-ext,
year = {2013},
month = sep,
title = {Conscript Your Friends into Larger Anonymity Sets with {JavaScript}
(Extended version)},
howpublished = {\url{http://arxiv.org/abs/1309.0958}},
author = {Henry Corrigan-Gibbs and Bryan Ford},
}
@inproceedings{ corrigangibbs13ensuring,
author = {Corrigan-Gibbs, Henry and Mu, Wendy and Boneh, Dan and Ford, Bryan},
title = {Ensuring High-Quality Randomness in Cryptographic Key Generation},
booktitle = {\bibconf[20th]{CCS}{ACM Conference on
Computer and Communications Security}},
month = nov,
year = {2013},
comment = {conference},
day = {4},
venueurl = {www.sigsac.org/ccs/CCS2013/},
}
@inproceedings{ corrigangibbs13proactively,
author = {Corrigan-Gibbs, Henry and Wolinsky, David Isaac
and Ford, Bryan},
title={Proactively Accountable Anonymous Messaging in {Verdict}},
booktitle={22nd USENIX Security Symposium},
month = aug,
year = 2013,
location = {Washington, DC},
}
@techreport{ corrigangibbs13proactively-tr,
title={Proactively Accountable Anonymous Messaging in {Verdict}},
author={Henry Corrigan-Gibbs and David Isaac Wolinsky and Bryan Ford},
number = {YALEU/DCS/TR1478},
month = jun,
year = 2013,
institution = {Department of Computer Science, Yale University},
}
@inproceedings{ costello15geppetto,
author = {Craig Costello and C\'edric Fournet and Jon Howell and
Markulf Kohlweiss and Benjamin Kreuter and Michael Naehrig and
Bryan Parno and Samee Zahur},
title = {\href{https://ieeexplore.ieee.org/abstract/document/7163030}{Geppetto: Versatile Verifiable Computation}},
booktitle = {IEEE Security and Privacy},
month = may,
year = 2015,
}
@misc{coyne14keybase,
title = {\href{https://keybase.io}{Keybase.io}},
author = {Chris Coyne and Maxwell Krohn},
year = 2014,
}
@inproceedings{ cramer94proofs,
title={Proofs of partial knowledge and simplified design of witness hiding protocols},
author={Cramer, Ronald and Damg{\aa}rd, Ivan and Schoenmakers, Berry},
booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}},
pages={174--187},
year={1994},
}
@inproceedings{ cramer97advances,
author = {Ronald Cramer and
Rosario Gennaro and
Berry Schoenmakers},
title={A Secure and Optimally Efficient Multi-Authority Election Scheme},
booktitle = {\bibconf{EUROCRYPT}{{Conference on Theory and applications
of cryptographic techniques}}},
location = {Konstanz, Germany},
month = may,
year = 1997
}
@incollection{ cramer98zero,
year={1998},
booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}},
volume={1462},
series={Lecture Notes in Computer Science},
editor={Krawczyk, Hugo},
title={Zero-knowledge proofs for finite field arithmetic, or: Can zero-knowledge be for free?},
author={Cramer, Ronald and Damgård, Ivan},
pages={424-441}
}
@inproceedings{ cramer00general,
author = {Ronald Cramer and Ivan Dam\r{g}ard and Ueli Maurer},
title = {\href{https://link.springer.com/chapter/10.1007/3-540-45539-6_22}{General Secure Multi-party Computation from any Linear Secret-Sharing Scheme}},
booktitle = {Eurocrypt},
month = may,
year = 2000,
location = {Bruges, Belgium},
}
@article{cramer01design,
author = {Ronald Cramer and Victor Shoup},
title = {Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack},
journal = {SIAM Journal on Computing},
year = {2001},
volume = {33},
pages = {167--226}
}
@inproceedings{ cramer01multiparty,
author = {Ronald Cramer and Ivan Damg\r{a}rd and Jesper B. Nielsen},
title = {\href{https://link.springer.com/chapter/10.1007/3-540-44987-6_18}{Multiparty Computation from Threshold Homomorphic Encryption}},
booktitle = {Eurocrypt},
month = may,
year = 2001,
}
@inproceedings{cristofaro12fast,
author = {Emiliano De Cristofaro and
Paolo Gasti and
Gene Tsudik},
title = {Fast and Private Computation of Cardinality of Set Intersection
and Union},
booktitle = {CANS},
month = dec,
year = 2012
}
@inproceedings{cristofaro13linear,
author = {Emiliano De Cristofaro and
Jihye Kim and
Gene Tsudik},
title = {Linear-Complexity Private Set Intersection Protocols Secure
in Malicious Model},
booktitle = {ASIACRYPT},
year = {2010}
}
@inproceedings{ croman16scaling,
author = {Kyle Croman and Christian Decke and Ittay Eyal and Adem Efe Gencer and Ari Juels and Ahmed Kosba and Andrew Miller and Prateek Saxena and Elaine Shi and Emin Gun Sirer and Dawn Song an and Roger Wattenhofer},
title = {\href{http://fc16.ifca.ai/bitcoin/papers/CDE+16.pdf}{On Scaling Decentralized Blockchains (A Position Paper)}},
booktitle = {3rd Workshop on Bitcoin and Blockchain Research},
year = {2016},
url = {http://fc16.ifca.ai/bitcoin/papers/CDE+16.pdf},
}
@inproceedings{ crosby09efficient,
author = {Scott A. Crosby and Dan S. Wallach},
title = {Efficient Data Structures for Tamper-Evident Logging},
booktitle = {USENIX Security Symposium},
month = aug,
year = 2009,
location = {Montreal, Canada},
}
@misc{curiousmind18firelotto,
author = {CuriosMind},
title = {\href{https://medium.com/@Curious_Mind/worlds-hottest-decentralized-lottery-powered-by-blockchain-90a35bad464a}{World's Hottest Decentralized Lottery Powered by Blockchain}},
month = feb,
year = 2018,
}
@inproceedings{cui15paxos,
title={Paxos made transparent},
author={Cui, Heming and Gu, Rui and Liu, Cheng and Chen, Tianyu and Yang, Junfeng},
booktitle={Proceedings of the 25th Symposium on Operating Systems Principles},
pages={105--120},
year={2015}
}
@misc{ czernik18frontrunning,
author = {Matt Czernik},
title = {\href{https://medium.com/@matt.czernik/on-blockchain-frontrunning-part-i-cut-the-line-or-make-a-new-one-b33850663b55}{On Blockchain Frontrunning}},
month = feb,
year = 2018,
}
%D
@inproceedings{dachman-soled09efficient,
author = {Dana Dachman-Soled and
Tal Malkin and
Mariana Raykova and
Moti Yung},
title = {Efficient Robust Private Set Intersection},
booktitle = {\bibbrev{ACNS}{Applied Cryptography and Network Security}},
year = {2009}
}
@inproceedings{ dacosta12trust,
author = {Italo Dacosta and Mustaque Ahamad and Patrick Traynor},
title = {Trust No One Else: Detecting {MITM} Attacks against {SSL/TLS}
without Third-Parties},
booktitle = {\bibconf[17th]{ESORICS}{European Symposium on
Research in Computer Security}},
month = sep,
year = 2012,
location = {Pisa, Italy},
}
@misc{ dai96pipenet,
author = {Wei Dai},
title = {{PipeNet 1.1}},
year = 1996,
month = aug,
note = {UseNet post. \url{http://www.weidai.com/pipenet.txt}},
}
@article{daian2016dao,
author = {Phil Daian},
title = {\href{https://web.archive.org/web/20191001182349/https://hackingdistributed.com/2016/06/18/analysis-of-the-dao-exploit/}{Analysis of the DAO exploit}},
year={2016}
}
@misc{ daian18on-chain,
author = {Philip Daian and Tyler Kell and Ian Miers and Ari Juels},
title = {\href{http://hackingdistributed.com/2018/07/02/on-chain-vote-buying/}{On-Chain Vote Buying and the Rise of Dark DAOs}},
month = jul,
day = 2,
year = 2018,
note = {\href{http://hackingdistributed.com}{Hacking, Distributed}},
}
@inproceedings{ damgaard01generalisation,
title={A Generalisation, a Simpli. cation and Some Applications of Paillier's Probabilistic Public-Key System},
author={Damg{\aa}rd, Ivan and Jurik, Mads},
booktitle={Public Key Cryptography},
pages={119--136},
year={2001},
organization={Springer}
}
@inproceedings{damgard09asynchronous,
title={Asynchronous multiparty computation: Theory and implementation},
author={Damg{\aa}rd, Ivan and Geisler, Martin and Kroig{\aa}rd, Mikkel and Nielsen, Jesper Buus},
booktitle={International Conference on Practice and Theory in Public-Key Cryptography},
publisher={Springer},
month={March},
year={2009}
}
@misc{damgard02sigma,
title={\href{http://www.cs.au.dk/~ivan/Sigma.pdf}{On {$\Sigma$}-protocols}},
author={Damg\r{a}rd, Ivan},
year = 2010,
}
@article{danezis16centrally,
title={\href{https://eprint.iacr.org/2015/502.pdf}{Centrally Banked Cryptocurrencies}},
author={Danezis, George and Meiklejohn, Sarah},
journal={\bibconf[23rd]{NDSS}{Annual Network \& Distributed System Security
Symposium}},
location = {San Diego, CA},
month = Feb,
year=2016
}
@article{danezis18blockmania,
title={Blockmania: from Block DAGs to Consensus},
author={Danezis, George and Hrycyszyn, David},
journal={arXiv preprint arXiv:1809.01620},
year={2018}
}
@inproceedings{ danezis04statistical,
title = {Statistical Disclosure or Intersection Attacks on Anonymity Systems},
author = {Danezis, George and Serjantov, Andrei},
booktitle = {Workshop on Information Hiding},
year = {2004},
month = {May},
location = {Toronto, Ontario, Canada},
}
@article{ davidson13strongbox,
author = {Amy Davidson},
title = {Introducing Strongbox},
journal = {The New Yorker},
month = may,
day = 15,
year = 2013,
}
@article{ davis96kerberos,
author = {Donald T. Davis and Daniel E. Geer and Theodore Ts'o},
title = {\href{https://www.usenix.org/legacy/publications/compsystems/1996/win_davis.pdf}{Kerberos With Clocks Adrift: History, Protocols, and Implementation}},
journal = {Computing systems},
volume = 9,
number = 1,
year = 1996,
pages = {29-46},
},
@InProceedings{decker16bitcoin,
author = {Christian Decker and Jochen Seidel and Roger Wattenhofer},
title = {\href{http://www.tik.ee.ethz.ch/file/ed3e5da74fbca5584920e434d9976a12/peercensus.pdf}{Bitcoin Meets Strong Consistency}},
booktitle = {{17th International Conference on Distributed Computing and Networking (ICDCN), Singapore}},
month = {January},
year = {2016},
url = {http://www.tik.ee.ethz.ch/file/ed3e5da74fbca5584920e434d9976a12/peercensus.pdf},
}
@misc{ delacruz18blockchain,
author = {Juan Delacruz, IBM Blockchain},
title = {\href{https://www.ibm.com/blogs/blockchain/2018/02/blockchain-is-tackling-the-challenge-of-data-sharing-in-government/}{Blockchain is tackling the challenge of data sharing in government}},
month = may,
year = 2018,
}
@inproceedings{ delaune06coercion,
author = {Ste\'ephanie Delaune and Steve Kremer and Mark Ryan},
title = {\href{https://ieeexplore.ieee.org/abstract/document/1648706}{Coercion-Resistance and Receipt-Freeness in Electronic Voting}},
booktitle = {\bibconf[19th]{CSFW}{IEEE Computer Security Foundations Workshop}},
month = jul,
year = 2006,
}
@inproceedings{delmolino16step,
title={\href{https://link.springer.com/chapter/10.1007/978-3-662-53357-4_6}{Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab}},
author={Delmolino, Kevin and Arnett, Mitchell and Kosba, Ahmed and Miller, Andrew and Shi, Elaine},
booktitle={International Conference on Financial Cryptography and Data Security},
pages={79--94},
year={2016},
organization={Springer}
}
@article{denning96key,
title={Key escrow encryption systems},
author={Denning, Dorothy E and Branstad, Dennis K},
journal={Communications of the ACM},
volume={39},
number={3},
pages={35},
year={1996}
}
@inproceedings{ desmedt87tampering,
title={Public-key systems based on the difficulty of tampering (Is there a difference between {DES} and {RSA}?)},
author={Desmedt, Yvo and Quisquater, Jean-Jacques},
booktitle={\bibconf{CRYPTO}{Advances in Cryptology}},
year={1987},
}
@inproceedings{ desmedt89threshold,
author = {Yvo Desmedt and Yair Frankel},
title = {Threshold cryptosystems},
booktitle = {\bibconf{CRYPTO}{Advances in Cryptology}},
month = aug,
year = 1989,
}
@article{ dey10pseudoid,
title={{PseudoID}: Enhancing privacy in federated login},
author={Dey, Arkajit and Weis, Stephen},
journal={\bibconf{HotPETs}{Hot topics in privacy enhancing technologies}},
year={2010}
}
@inproceedings{di2006deniable,
title={Deniable authentication and key exchange},
author={Di Raimondo, Mario and Gennaro, Rosario and Krawczyk, Hugo},
booktitle = {\bibconf{CCS}{ACM conference on computer and
communications security}},
year={2006},
}
@inproceedings{diaz02measuring,
author = {D\'{\i}az, Claudia and Seys, Stefaan and Claessens, Joris and Preneel, Bart},
title = {Towards measuring anonymity},
booktitle = {Proceedings of the 2nd international conference on Privacy enhancing technologies},
series = {PET'02},
year = {2003},
}
@incollection{diaz07accountable,
title={Accountable anonymous communication},
author={Diaz, Claudia and Preneel, Bart},
booktitle={Security, Privacy, and Trust in Modern Data Management},
pages={239--253},
year={2007},
publisher={Springer}
}
@inproceedings{dingledine03reputation,
author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
title = {Reputation in P2P Anonymity Systems},
booktitle = {In Workshop on Economics of Peer-to-Peer Systems},
year = {2003}
}
@inproceedings{ dingledine09performance,
author = {Roger Dingledine and Steven J. Murdoch},
title = {Performance Improvements on {Tor} or,
Why {Tor} is slow and what we're going to do about it},
booktitle = {DEFCON 17},
month = jul,
year = 2009,
location = {Las Vegas, NV},
url = {http://www.hackerjeopardy.com/images/defcon-17/dc-17-presentations/defcon-17-roger_dingledine-tor.pdf},
}
@article{dierks08transport,
title={The transport layer security (TLS) protocol version 1.2},
author={Dierks, Tim},
year={2008}
}
@article{diffie76new,
title={New directions in cryptography},
author={Diffie, Whitfield and Hellman, Martin E},
journal={IEEE \bibconf{IT}{Transactions on Information Theory}},
year={1976},
}
@misc{digistamp,
key = {digistamp},
title = {Digi{S}tamp - {T}rusted {T}ime{S}tamp {A}uthority},
howpublished = {\url{https://www.digistamp.com/}}
}
@inproceedings{dinur03revealing,
title={\href{https://dl.acm.org/citation.cfm?id=773173}{Revealing information while preserving privacy}},
author={Dinur, Irit and Nissim, Kobbi},
booktitle={Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems},
pages={202--210},
year={2003},
organization={ACM}
}
@article{ doctorow16using,
author = {Cory Doctorow},
title = {\href{http://boingboing.net/2016/03/10/using-distributed-code-signatu.html}{Using distributed code-signatures to make it much harder to order secret backdoors}},
journal = {BoingBoing},
month = mar,
year = 2016,
}
@inproceedings{ dodis04anonymous,
title={Anonymous identification in ad hoc groups},
author={Dodis, Y. and Kiayias, A. and Nicolosi, A. and Shoup, V.},
booktitle={Eurocrypt},
pages={609--626},
year={2004},
}
@inproceedings{dodis05verifiable,
title={A verifiable random function with short proofs and keys},
author={Dodis, Yevgeniy and Yampolskiy, Aleksandr},
booktitle={International Workshop on Public Key Cryptography},
pages={416--431},
year={2005},
organization={Springer}
}
@inproceedings{ dodis18fast,
title={\href{https://eprint.iacr.org/2019/016.pdf}{Fast message franking: From invisible salamanders to encryptment}},
author={Dodis, Yevgeniy and Grubbs, Paul and Ristenpart, Thomas and Woodage, Joanne},
booktitle={Annual International Cryptology Conference (CRYPTO)},
pages={155--186},
year={2018}
}
@inproceedings{dong13private,
author = {Changyu Dong and Liqun Chen and Zikai Wen},
title = {When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol},
booktitle = {\bibconf{CCS}{ACM Conference on Computer and Communications Security}},
year = {2013},
moth = nov
}
@inproceedings{ dong13protecting,
author = {Xinshu Dong and Zhaofeng Chen and Hossein Siadati and
Shruti Tople and Prateek Saxena and Zhenkai Liang},
title = {Protecting Sensitive Web Content from
Client-side Vulnerabilities with {CRYPTONs}},
booktitle = {\bibconf[20th]{CCS}{ACM conference on
Computer and communications security}},
month = nov,
year = 2013,
location = {Berlin, Germany},
}
@inproceedings{ dorrendorf07cryptanalysis,
author = {Dorrendorf, Leo and Gutterman, Zvi and Pinkas, Benny},
title = {Cryptanalysis of the {Windows} Random Number Generator},
booktitle = {Proceedings of the 14th ACM Conference on Computer and Communications Security},
series = {{CCS}},
year = {2007},
pages = {476--485},
}
@inproceedings{ drijvers19security,
author = {Manu Drijvers and Kasra Edalatnejad and Bryan Ford and Eike Kiltz
and Julian Loss and Gregory Neven and Igors Stepanovs},
title = {On the Security of Two-Round Multi-Signatures},
booktitle = {\bibconf[40th]{SP}{IEEE Symposium on Security and Privacy}},
month = may,
year = 2019,
}
@inproceedings{ duan18beat,
author = {Sisi Duan and Michael K. Reiter and Haibin Zhang},
title = {\href{https://dl.acm.org/citation.cfm?id=3243812}{BEAT: Asynchronous BFT Made Practical}},
booktitle = {\bibconf{CCS}{Computer and Communications Security}},
month = oct,
year = 2018,
location = {Toronto, Canada},
}
@article{dubovitskaya17secure,
title={\href{https://arxiv.org/pdf/1709.06528.pdf}{Secure and Trustable Electronic Medical Records Sharing using Blockchain}},
author={Dubovitskaya, Alevtina and Xu, Zhigang and Ryu, Samuel and Schumacher, Michael and Wang, Fusheng},
journal={arXiv preprint arXiv:1709.06528},
year={2017}
}
@article{ dufaux08scrambling,
author = {Fr\'ed\'eric Dufaux and Touradj Ebrahimi},
title = {Scrambling for Privacy Protection in
Video Surveillance Systems},
journal = {IEEE Transactions on Circuits and Systems
for Video Technology},
volume = 18,
number = 8,
year = 2008,
pages = {1168--1174},
}
@inproceedings{dunn12eternal,
title={Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels},
author={Dunn, Alan M and Lee, Michael Z and Jana, Suman and Kim, Sangman and Silberstein, Mark and Xu, Yuanzhong and Shmatikov, Vitaly and Witchel, Emmett},
booktitle={Proc. of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)},
year={2012}
}
@article{ durden15tiger,
author = {Tyler Durden},
title = {\href{https://www.zerohedge.com/news/2015-08-13/1300-tiger-penis-800k-snipers-complete-black-market-price-guide}{From \$1,300 Tiger Penis To \$800K Snipers: The Complete Black Market Price Guide}},
journal = {ZeroHedge},
month = aug,
day = 13,
year = 2015,
}
@misc{durham11namecoin,
title = {\href{https://namecoin.info/}{Namecoin}},
author={Vincent Durham},
year={2011},
}
@inproceedings{ dwork92pricing,
author = {Cynthia Dwork and Moni Naor},
title = {\href{https://link.springer.com/chapter/10.1007%2F3-540-48071-4_10}{Pricing via Processing or Combatting Junk Mail}},
booktitle = {\bibconf[12th]{CRYPTO}{Advances in Cryptology}},
month = aug,
year = 1992,
location = {Santa Barbara, California, USA},
}
@inproceedings{ dwork08differential,
author = {Cynthia Dwork},
title = {Differential Privacy: A Survey of Results},
booktitle = {International Conference on Theory and Applications
of Models of Computation (TAMC)},
year = 2008,
}
@inproceedings{ dyer12peekaboo,
author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart
and Thomas Shrimpton},
title={\href{https://kpdyer.com/publications/oakland2012-peekaboo.pdf}{Peek-a-Boo, {I} Still See You: Why Efficient Traffic Analysis Countermeasures Fail}},
booktitle = {IEEE Symposium on Security and Privacy},
month = may,
year = 2012
}
@inproceedings{ dziembowski15proofs,
author = {Stefan Dziembowski and Sebastian Faust and
Vladimir Kolmogorov and Krzysztof Pietrzak},
title = {\href{https://eprint.iacr.org/2013/796.pdf}{Proofs of Space}},
booktitle = {35th International Cryptology Conference (CRYPTO)},
month = aug,
year = 2015,
}
%E
@misc{eff11observatory,
title = {\href{https://www.eff.org/observatory}{The EFF SSL Observatory}},
author={{Electronic Frontier Foundation}},
year={2011},
}
@inproceedings{egele13empirical,
title={An Empirical Study of Cryptographic Misuse in {Android} Applications},
author={Egele, Manuel and Brumley, David and Fratantonio, Yanick and Kruegel, Christopher},
booktitle = {\bibconf[20th]{CCS}{ACM conference on computer and
communications security}},
year={2013},
month=nov,
}
@misc{eip18,
title={\href{http://eips.ethereum.org/EIPS/eip-665}{EIP 665: Add precompiled contract for Ed25519 signature
verification}},
author={Oberstein, Tobias},
month=mar,
year=2018,
}
@inproceedings{el12efficient,
title={\href{https://link.springer.com/chapter/10.1007%2F978-3-642-30955-7_14}{An efficient lattice-based secret sharing construction}},
author={El Bansarkhani, Rachid and Meziani, Mohammed},
booktitle={IFIP International Workshop on Information Security Theory and Practice},
pages={160--168},
year={2012},
organization={Springer}
}
@article{elgamal85crypto,
author={Taher Elgamal},
journal={IEEE Transactions on Information Theory},
title={\href{https://ieeexplore.ieee.org/abstract/document/1057074/}{A public key cryptosystem and a signature scheme based on discrete logarithms}},
year={1985},
volume={31},
number={4},
pages={469-472},
doi={10.1109/TIT.1985.1057074},
ISSN={0018-9448},
month={July},
}
@article{elkins96mime,
title={MIME security with pretty good privacy},
author={Elkins, M.},
year={1996}
}
@article{EU16GDPR,
title={\href{https://www.eugdpr.org/}{General Data Protection Regulation (GDPR)}},
author={{European Parliament and Council of the European Union}},
journal={Official Journal of the European Union (OJ)},
volume={\href{https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32016R0679}{L119}},
pages={1--88},
year={2016},
}
@article{ellis14guardian,
title={\href{https://www.theguardian.com/technology/2014/jun/05/guardian-launches-securedrop-whistleblowers-documents}{The Guardian introduces SecureDrop for document leaks}},
author={Ellis, Justin},
journal={Nieman Journalism Lab},
year={2014}
}
@misc{ellison07ceremony,
author = {Carl M. Ellison},
title = {\href{http://eprint.iacr.org/2007/399}{Ceremony Design and Analysis}},
journal = {{IACR} Cryptology ePrint Archive},
pages = {399},
year = {2007},
url = {http://eprint.iacr.org/2007/399},
}
@misc{eos,
title={\href{https://eos.io/}{eosio | Blockchain software architecture}},
}
@inproceedings{ eskandari19transparent,
author = {Shayan Eskandari and Seyedehmahsa Moosavi and Jeremy Clark},
title = {\href{http://fc19.ifca.ai/wtsc/TransparentDishonesty.pdf}{Transparent Dishonesty: front-running attacks on Blockchain}},
booktitle = {\bibconf[3rd]{WTSC}{Workshop on Trusted Smart Contracts}},
month = feb,
year = 2019,
}
@inproceedings{ evans09practical,
author = {Nathan S. Evans and Roger Dingledine and Christian Grothoff},
title = {A Practical Congestion Attack on {Tor} Using Long Paths},
booktitle={18th USENIX Security Symposium},
month = aug,
year = 2009,
location = {Montreal, Canada},
}
@article{everspaugh15pythia,
title={\href{https://eprint.iacr.org/2015/644.pdf}{The Pythia PRF Service.}},
author={Everspaugh, Adam and Chatterjee, Rahul and Scott, Samuel and Juels, Ari and Ristenpart, Thomas and Tech, Cornell},
journal={IACR Cryptology ePrint Archive},
volume={2015},
pages={644},
year={2015}
}
@inproceedings{evfimievski03limiting,
author = {Alexandre V. Evfimievski and
Johannes Gehrke and
Ramakrishnan Srikant},
title = {Limiting privacy breaches in privacy preserving data mining},
booktitle = {PODS},
year = {2003}
}
@misc{ ey18health,
author = {Ernst \& Young},
title = {\href{https://www.hyperledger.org/wp-content/uploads/2016/10/ey-blockchain-in-health.pdf}{Blockchain in health}},
month = may,
year = 2018,
}
@inproceedings{eyal16bitcoinng,
title = {\href{https://www.usenix.org/system/files/conference/nsdi16/nsdi16-paper-eyal.pdf}{{Bitcoin-NG}: A Scalable Blockchain Protocol}},
author = {Eyal, Ittay and Gencer, Adem Efe and Sirer, Emin G\"un and van Renesse, Robbert},
booktitle = {13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)},
year = {2016},
month = Mar,
address = {Santa Clara, CA},
url = {https://www.usenix.org/system/files/conference/nsdi16/nsdi16-paper-eyal.pdf},
publisher = {USENIX Association},
}
@incollection{eyal14majority,
title={\href{https://www.cs.cornell.edu/~ie53/publications/btcProcFC.pdf}{Majority is not enough: {Bitcoin} mining is vulnerable}},
author={Eyal, Ittay and Sirer, Emin G{\"u}n},
booktitle={Financial Cryptography and Data Security},
pages={436--454},
year={2014},
publisher={Springer},
url={https://www.cs.cornell.edu/~ie53/publications/btcProcFC.pdf},
}
%F
@inproceedings{fahl14apptransparency,
author = {Fahl, Sascha and Dechand, Sergej and Perl, Henning and Fischer, Felix and Smrcek, Jaromir and Smith, Matthew},
title = {\href{https://dl.acm.org/citation.cfm?id=2660311}{Hey, {NSA}: Stay Away from My Market! {Future} Proofing App Markets Against Powerful Attackers}},
booktitle = {Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security},
year = {2014},
isbn = {978-1-4503-2957-6},
numpages = {13},
url = {http://doi.acm.org/10.1145/2660267.2660311},
doi = {10.1145/2660267.2660311},
acmid = {2660311},
publisher = {ACM},
}
location = {Scottsdale, Arizona, USA},
keywords = {android, apps, market, nsa, security, transparency},
address = {New York, NY, USA},
pages = {1143--1155},
series = {CCS '14},
@article{fan12somewhat,
title={\href{https://eprint.iacr.org/2012/144.pdf}{Somewhat Practical Fully Homomorphic Encryption.}},
author={Fan, Junfeng and Vercauteren, Frederik},
journal={IACR Cryptology ePrint Archive},
volume={2012},
pages={144},
year={2012},
publisher={Citeseer}
}
@misc { federrath11monitor,
author = {Hannes Federrath},
title = {The {Anonym-O-Meter}},
howpublished = {\url{http://anon.inf.tu-dresden.de/help/jap_help/en/help/jap.JAPNewView_anonymometer.html}},
year = {2013},
month = {July}
}
@inproceedings{feigenbaum17multiple,
title={\href{https://link.springer.com/chapter/10.1007/978-3-319-71075-4_2}{Multiple Objectives of Lawful-Surveillance Protocols (Transcript of Discussion)}},
author={Feigenbaum, Joan},
booktitle={Cambridge International Workshop on Security Protocols},
pages={9--17},
year={2017},
organization={Springer}
}
@article{ feinberg15gogo,
author = {Ashley Feinberg},
title = {\href{http://gizmodo.com/gogo-is-using-man-in-the-middle-malware-tactics-on-its-1677559652}{{Gogo} {Wi-Fi} Is Using Man-in-the-Middle Malware Tactics on Its Own Users}},
journal = {Gizmodo},
month = jan,
year = 2015,
}
@inproceedings{feldman87practical,
title={\href{https://ieeexplore.ieee.org/abstract/document/4568297/}{A practical scheme for non-interactive verifiable secret sharing}},
author={Feldman, Paul},
booktitle={Foundations of Computer Science, 1987., 28th Annual Symposium on},
pages={427--438},
year={1987},
organization={IEEE}
}
@inproceedings{ fiat87prove,
title={How to prove yourself: practical solutions to identification and signature problems},
author={Fiat, Amos and Shamir, Adi},
booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}},
pages={186--194},
year={1987},
}
@article{ fienberg71randomization,
author = {Stephen E. Fienberg},
title = {\href{https://science.sciencemag.org/content/171/3968/255}{Randomization and Social Affairs: The 1970 Draft Lottery}},
journal = {Science},
volume = 171,
number = 3968,
month = jan,
year = 1971,
pages = {255-261},
doi = {10.1126/science.171.3968.255},
}
@misc{firelotto,
title = {\href{https://firelotto.io/}{Fire Lotto blockchain lottery}},
year = {2018},
}
@misc{fleischer12tor,
author = {Gregory Fleischer},
month = {July},
year = {2009},
booktitle = {DEFCON 17},
howpublished = {\url{http://ww.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-gregory_fleischer-attacking_tor.pdf}},
title = {Attacking Tor at the Application Layer},
}
@misc{ ford15verify,
author = {Bryan Ford},
title = {\href{https://bford.info/2015/10/07/names.html}{Let's verify real people, not real names.}},
month = oct,
year = 2015,
}
@article{ ford16apple,
author = {Bryan Ford},
title = {\href{https://freedom-to-tinker.com/blog/bford/apple-fbi-and-software-transparency/}{Apple, FBI, and Software Transparency}},
journal = {\href{https://freedom-to-tinker.com/}{Freedom to Tinker}},
month = mar,
year = 2016,
}
@misc{ ford17technology,
author = {Bryan Ford},
title = {\href{https://bford.info/2017/06/23/turing50/}{Technology Governs Us. Will it Govern Us Well?
}},
month = jun,
year = 2017,
note = {Opening remarks to panel ``Restoring Personal Privacy without Compromising National Security'' at \href{https://www.acm.org/turing-award-50/conference}{50 Years of the ACM Turing Award Celebration}},
}
@misc{ ford19privacy,
author = {Bryan Ford},
title = {Privacy-preserving foundation for online personal identity},
month = may,
year = 2019,
note = {ONR grant N000141912361},
}
@misc{ ford19rationality,
author = {Bryan Ford and Rainer B\"ohme},
title = {\href{https://arxiv.org/abs/1910.08820}{Rationality is Self-Defeating in Permissionless Systems}},
month = sep,
year = 2019,
}
@article{ forgrave18man,
author = {Reid Forgrave},
title = {\href{https://www.nytimes.com/interactive/2018/05/03/magazine/money-issue-iowa-lottery-fraud-mystery.html}{The Man Who Cracked the Lottery}},
journal = {The New York Times Magazine},
month = may,
year = 2018,
}
@inproceedings{ franklin97fair,
author = {Matthew K. Franklin and Michael K. Reiter},
title = {Fair Exchange with a Semi-Trusted Third Party},
booktitle = {\bibbrev{CCS}{ACM Conference on
Computer and Communications Security}},
month = apr,
year = 1997,
}
@inproceedings{ franklin06passive,
title = {{Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting}},
author = {Franklin, Jason and Mccoy, Damon and Tabriz, Parisa and Neagoe, Vicentiu and Van Randwyk, Jami and Sicker, Douglas},
booktitle = {USENIX Security},
year = {2006},
month = {July},
pages = {167--178},
}
@article{franklin13unique,
title={\href{https://eprint.iacr.org/2012/577.pdf}{A Framework for Unique Ring Signatures.}},
author={Franklin, Matthew K and Zhang, Haibin},
journal={IACR Cryptology ePrint Archive},
volume={2012},
pages={577},
year={2012},
url = {https://eprint.iacr.org/2012/577.pdf},
}
@misc{freeTSA,
key={Free Timestamping Authority},
title = {Free {T}imestamping {A}uthority},
howpublished = {\url{http://www.freetsa.org/}}
}
@inproceedings{freedman04efficient,
author = {Michael J. Freedman and
Kobbi Nissim and
Benny Pinkas},
title = {Efficient Private Matching and Set Intersection},
booktitle = {\bibconf{EUROCRYPT}{{Conference on Theory and applications
of cryptographic techniques}}},
location = {Interlaken, Switzerland},
month = may,
year = 2004
}
@inproceedings{frikken07privacy,
author = {Keith B. Frikken},
title = {Privacy-Preserving Set Union},
booktitle = {\bibbrev{ACNS}{Applied Cryptography and Network Security}},
year = {2007}
}
@journal{ froelicher17unlynx,
author = {David Froelicher and Patricia Egger and Jo\~ao S\'a Sousa and
Jean Louis Raisaro and Zhicong Huang and Christian Mouchet and
Bryan Ford and Jean-Pierre Hubaux},
title = {\href{https://content.sciendo.com/view/journals/popets/2017/4/article-p232.xml}{UnLynx: A Decentralized System for Privacy-Conscious Data Sharing}},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = 2017,
number = 4,
month = oct,
year = 2017,
pages = {232250},
}
@thesis{ fu05distribution,
author={Fu, Kevin E.},
title={\href{http://dspace.mit.edu/handle/1721.1/34464}{Integrity and
Access Control in Untrusted Content Distribution Networks}},
school={Massachusetts Institute of Technology},
year={2005}
}
@inproceedings{ fujisaki01rsa,
title={{RSA-OAEP} is secure under the {RSA} assumption},
author={Fujisaki, Eiichiro and Okamoto, Tatsuaki and Pointcheval, David and Stern, Jacques},
pages={260--274},
booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}},
year={2001},
organization={Springer}
}
%G
@inproceedings{ galindo15neuchatel,
author = {David Galindo and Sandra Guasch and Jordi Puiggal\'i},
title = {\href{https://link.springer.com/chapter/10.1007/978-3-319-22270-7_1}{Neuch\^atels Cast-as-Intended Verification Mechanism}},
booktitle = {International Conference on E-Voting and Identity},
month = sep,
year = 2015,
pages = {3-18},
}
@article{ gallagher13snowden,
author = {Ryan Gallagher},
title = {New {Snowden} Documents Show {NSA} Deemed {Google} Networks
a ``Target''},
journal = {Slate},
month = sep # "~9,",
day = 9,
year = 2013,
}
@inproceedings{gafni98round,
title={Round-by-Round Fault Detectors, Unifying Synchrony and Asynchrony (Extendeda Abstract)},
author={Gafni, Eli},
booktitle={Proc. 17th Annual ACM Symposium on Principles of Distributed Computing (PODC), Puerto Vallarta, Mexico, June},
pages={143--152},
year={1998}
}
@article{ ganeriwal08secure,
author = {Saurabh Ganeriwal and Christina P\"opper and
Srdjan \v{C}apkun and Mani B. Srivastava},
title = {\href{https://dl.acm.org/citation.cfm?doid=1380564.1380571}{Secure Time Synchronization in Sensor Networks}},
journal = {ACM Transactions on Information and System Security (TISSEC)},
volume = 11,
number = 4,
month = jul,
year = 2008,
}
@inproceedings{garay07practical,
author = {Juan A. Garay and
Berry Schoenmakers and
Jos{\'{e}} Villegas},
title = {Practical and secure solutions for integer comparison},
booktitle = {\bibconf[10th]{PKC}{Public Key Cryptography}},
location = {Beijing, China},
month = apr,
year = 2007
}
@incollection{garay15bitcoin,
title={\href{https://eprint.iacr.org/2014/765.pdf}{The {Bitcoin} backbone protocol: Analysis and applications}},
author={Garay, Juan and Kiayias, Aggelos and Leonardos, Nikos},
booktitle={EUROCRYPT 2015},
pages={281--310},
year={2015},
publisher={Springer},
url={https://eprint.iacr.org/2014/765.pdf},
}
@inproceedings{garcia18paxos,
title={Paxos consensus, deconstructed and abstracted},
author={Garc{\'\i}a-P{\'e}rez, {\'A}lvaro and Gotsman, Alexey and Meshman, Yuri and Sergey, Ilya},
booktitle={European Symposium on Programming},
pages={912--939},
year={2018},
organization={Springer, Cham}
}
@inproceedings{geambasu09vanish,
title={\href{https://www.usenix.org/legacy/events/sec09/tech/full_papers/sec09_crypto.pdf}{Vanish: Increasing Data Privacy with Self-Destructing Data.}},
author={Geambasu, Roxana and Kohno, Tadayoshi and Levy, Amit A and Levy, Henry M},
booktitle={USENIX Security Symposium},
pages={299--316},
year={2009}
}
@inproceedings{ geddes13cover,
author = {John Geddes and Max Schuchard and Nicholas Hopper},
title = {Cover Your {ACKs}: Pitfalls of Covert Channel
Censorship Circumvention},
booktitle = {\bibbrev[20th]{CCS}{ACM Conference on
Computer and Communications Security}},
month = nov,
year = {2013},
}
@article{gellman13broke,
author = {Gellman, Barton},
title = {{NSA} broke privacy rules thousands of times per year, audit finds},
journal = {The New York Times},
month = Aug # {~15,},
year = {2013}
}
@article{ gellman13secret,
author={Gellman, Barton and Timberg, Craig and Rich, Steven},
title={Secret {NSA} documents show campaign against {Tor} encrypted network},
journal={The Washington Post},
year=2013,
month=Oct # {~4,},
}
@article{ gellman13nsa,
author = {Barton Gellman and Ashkan Soltani},
title = {{NSA} tracking cellphone locations worldwide,
{Snowden} documents show},
journal = {The Washington Post},
year = 2013,
month = dec # {~4,},
}
@article{gellman14offensive,
author = {Barton Gellman and Ellen Nakashima},
title = {\href{www.washingtonpost.com/world/national-security/us-spy-agencies-mounted-231-offensive-cyber-operations-in-2011-documents-show/2013/08/30/d090a6ae-119e-11e3-b4cb-fd7ce041d814_story.html}{U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show}},
journal = {The Washington Post},
month = aug,
year = 2013,
day = 30,
}
@misc{ genecoin18make,
author = {Genecoin},
title = {\href{http://genecoin.me/}{Make a Backup of Yourself Using Bitcoin}},
month = may,
year = 2018,
}
@inproceedings{ gencer18decentralization,
author = {Adem Efe Gencer and Soumya Basu and Ittay Eyal and
Robbert van Renesse and Emin G\"un Sirer},
title = {\href{https://fc18.ifca.ai/preproceedings/75.pdf}{Decentralization in Bitcoin and Ethereum Networks}},
booktitle = {Financial Cryptography and Data Security},
month = feb,
year = 2018,
url = {https://fc18.ifca.ai/preproceedings/75.pdf},
}
@article{gencer17aspen,
author = {Adem Efe Gencer and
Robbert van Renesse and
Emin G{\"{u}}n Sirer},
title = {\href{http://fc17.ifca.ai/preproceedings/paper_73.pdf}{ Short Paper: Service-Oriented Sharding for Blockchains}},
journal={Financial Cryptography and Data Security 2017},
year = {2017},
url = {http://fc17.ifca.ai/preproceedings/paper_73.pdf},
}
@inproceedings{ gennaro98simplified,
author = {Rosario Gennaro and Michael O. Rabin and Tal Rabin},
title = {\href{https://dl.acm.org/citation.cfm?doid=277697.277716}{Simplified VSS and Fast-track Multiparty Computations with Applications to Threshold Cryptography}},
booktitle = {\bibconf[17th]{PODC}{Principles of Distributed Computing}},
month = jun,
year = 1998,
location = {Puerto Vallarta, Mexico},
}
% obsoleted by journal version: gennaro07secure
@inproceedings{ gennaro99secure,
title={\href{https://link.springer.com/chapter/10.1007/3-540-48910-X_21}{Secure distributed key generation for discrete-log based cryptosystems}},
author={Gennaro, Rosario and Jarecki, Stanis{\l}aw and Krawczyk, Hugo and
Rabin, Tal},
booktitle={Eurocrypt},
volume={99},
pages={295--310},
year={1999},
organization={Springer}
}
@article{ gennaro07secure,
author = {Rosario Gennaro and Stanis\l{}aw Jarecki and Hugo Krawczyk and Tal Rabin},
title = {\href{https://link.springer.com/article/10.1007/s00145-006-0347-3}{Secure Distributed Key Generation for Discrete-Log Based Cryptosystems}},
month = jan,
year = 2007,
volume = 20,
number = 1,
pages = {51-83},
}
@inproceedings{ gentry09fully,
author = {Craig Gentry},
title = {\href{https://dl.acm.org/doi/abs/10.1145/1536414.1536440}{Fully Homomorphic Encryption Using Ideal Lattices}},
booktitle = {\bibconf{STOC}{ACM Symposium on Theory of Computing}},
month = may,
year = 2009,
location = {Bethesda, Maryland},
}
@article{ gervais14bitcoin,
author = {Arthur Gervais and Ghassan O. Karame and Srdjan Capkun
and Vedran Capkun},
title = {\href{https://www.ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/system-security-group-dam/research/publications/pub2014/spmagazine_gervais.pdf}{Is Bitcoin a Decentralized Currency?}},
journal = {IEEE Security and Privacy Magazine},
year = 2014,
volume={12},
number={3},
pages={54--60},
url = {https://www.ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/system-security-group-dam/research/publications/pub2014/spmagazine_gervais.pdf},
}
@inproceedings{gervais15tampering,
title={\href{https://eprint.iacr.org/2015/578.pdf}{Tampering with the Delivery of Blocks and Transactions in {Bitcoin}}},
author={Gervais, Arthur and Ritzdorf, Hubert and Karame, Ghassan O and Capkun, Srdjan},
booktitle={22nd ACM SIGSAC Conference on Computer and Communications Security},
pages={692--705},
year={2015},
organization={ACM},
url = {https://eprint.iacr.org/2015/578.pdf},
}
@inproceedings{ gervais16security,
title={\href{https://dl.acm.org/citation.cfm?id=2976749.2978341}{On the Security and Performance of Proof of Work Blockchains}},
author={Gervais, Arthur and Karame, Ghassan O and W\"ust, Karl and Glykantzis, Vasileios and Ritzdorf, Hubert and \v{C}apkun, Srdjan},
month = oct,
year = 2016,
location = {Hofburg Palace, Vienna, Austria},
}
@inproceedings{georgiev12most,
title={The most dangerous code in the world: validating
{SSL} certificates in non-browser software},
author={Georgiev, Martin and Iyengar, Subodh and Jana, Suman and
Anubhai, Rishita and Boneh, Dan and Shmatikov, Vitaly},
booktitle={\bibconf[19th]{CCS}{ACM conference on Computer and communications security}},
year={2012},
month=oct,
}
@inproceedings{ghosh14torpath,
author = {Mainak Ghosh and Miles Richardson and Bryan Ford
and Rob Jansen},
title = {A {TorPath} to {TorCoin}:
Proof-of-Bandwidth Altcoins for Compensating Relays},
booktitle = {Workshop on Hot Topics in Privacy Enhancing Technologies
(HotPETs)},
year = 2014,
location = {Amsterdam, Netherlands},
}
@misc{gilad17algorand,
author = {Yossi Gilad and Rotem Hemo and Silvio Micali and Georgios Vlachos and Nickolai Zeldovich},
title = {\href{https://dl.acm.org/authorize?N47148}{Algorand: Scaling Byzantine Agreements for Cryptocurrencies}},
booktitle = {26th ACM Symposium on Operating Systems Principles (SOSP)},
month = oct,
year = {2017},
}
@misc{ gill13characterizing,
author = {Phillipa Gill and others},
title = {Characterizing Censorship of {Web} Content Worldwide},
year = 2013,
note = {\url{http://www.cs.stonybrook.edu/~phillipa/papers/GCDG_May8.pdf}},
}
@inproceedings{goldreich01secure,
author = {Oded Goldreich},
title = {Secure multi-party computation},
month = jun,
year = 2001,
note = {\url{http://www.wisdom.weizmann.ac.il/~odedg/pp.html}}
}
@inproceedings{goldberg09multi,
title={Multi-party off-the-record messaging},
author={Goldberg, Ian and Ustao{\u{g}}lu, Berkant and Van Gundy, Matthew D and Chen, Hao},
booktitle = {\bibconf{CCS}{ACM Conference on Computer and Communications Security}},
year={2009},
}
@article{goldberg96randomness,
title = {Randomness and the {Netscape} browser},
author = {Goldberg, Ian and Wagner, David},
journal = {Dr. {Dobb}'s Journal--Software Tools for the Professional Programmer},
volume = {21},
number = {1},
pages = {66--71},
year = {1996},
}
@article{ goodin13attackers,
author = {Dan Goodin},
title = {Attackers wield {Firefox} exploit
to uncloak anonymous {Tor} users},
journal = {ars technica},
month = aug,
day = 5,
year = 2013,
}
@article{ goodin13crack,
author = {Dan Goodin},
title = {\href{http://arstechnica.com/security/2012/09/crime-hijacks-https-sessions/}{Crack in {Internets} foundation of trust allows {HTTPS} session hijacking}},
month = sep,
year = 2012,
journal = {ars technica},
}
@inproceedings{goyal06attribute,
title={Attribute-based encryption for fine-grained access control of encrypted data},
author={Goyal, Vipul and Pandey, Omkant and Sahai, Amit and Waters, Brent},
booktitle={Proceedings of the 13th ACM conference on Computer and communications security},
pages={89--98},
year={2006},
organization={Acm}
}
@article{ greer14heartbleed,
author = {Dan Greer},
title = {Heartbleed as Metaphor},
journal = {Lawfare},
month = apr,
day = 21,
year = 2014,
note = {\url{http://www.lawfareblog.com/2014/04/heartbleed-as-metaphor/},
accessed on Sep 9, 2014}
}
@article{ greenberg15tor,
title = {\href{http://www.wired.com/2015/11/tor-says-feds-paid-carnegie-mellon-1m-to-help-unmask-users/}{Tor Says Feds Paid Carnegie Mellon \$1M to Help Unmask Users}},
journal = {Wired},
month = nov,
year = 2015,
}
@inproceedings{groth04evaluating,
author = {Jens Groth},
title = {Evaluating security of voting schemes in the universal
composability framework},
booktitle = {\bibconf[2nd]{ACNS}{Applied Cryptography
and Network Security}},
location = {Yellow Mountain, China},
month = Jun,
year = 2004
}
@phdthesis{ groth04honest,
title = {Honest verifier zero-knowledge arguments applied},
author = {Jens Groth},
school = {University of Aarhus},
year = {2004},
month = {October},
}
@inproceedings{groth05noninteractive,
author = {Jens Groth},
title = {Non-interactive zero-knowledge arguments for voting},
booktitle = {\bibconf[3rd]{ACNS}{Applied Cryptography
and Network Security}},
location = {New York, NY},
month = Jun,
year = 2005
}
% journal version of a 2003 conference paper in PKC
@article{ groth10verifiable,
author = {Jens Groth},
title = {\href{https://link.springer.com/article/10.1007/s00145-010-9067-9}{A Verifiable Secret Shuffle of Homomorphic Encryptions}},
journal = {Journal of Cryptology},
volume = 23,
pages = {546-579},
month = may,
year = 2010,
}
@inproceedings{ grubbs17leakage,
title={\href{https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7958603}{Leakage-abuse
attacks against order-revealing encryption}},
author={Grubbs, Paul and Sekniqi, Kevin and Bindschaedler, Vincent and
Naveed, Muhammad and Ristenpart, Thomas},
booktitle={IEEE Symposium on Security and Privacy (SP)},
pages={655--672},
year={2017}
}
@inproceedings{guarnizo2019pdfs,
title= {\href{https://arxiv.org/pdf/1808.06641.pdf}{PDFS: Practical Data Feed Service for Smart Contracts}},
author={Guarnizo, Juan and Szalachowski, Pawel},
booktitle={European Symposium on Research in Computer Security},
pages={767--789},
year={2019},
organization={Springer}
}
@article{guerraoui02non,
title={\href{https://pdfs.semanticscholar.org/1998/ddf989eb4bb7ba8fe1e678c26f2029e9911f.pdf}{Non-blocking atomic commit in asynchronous distributed systems with failure detectors}},
author={Guerraoui, Rachid},
journal={Distributed Computing},
volume={15},
number={1},
pages={17--25},
year={2002},
publisher={Springer}
}
@inproceedings{guerraoui13byzantine,
author = {Guerraoui, Rachid and Huc, Florian and Kermarrec, Anne-Marie},
title = {Highly Dynamic Distributed Computing with Byzantine Failures},
booktitle = {Proceedings of the 2013 ACM Symposium on Principles of Distributed Computing},
series = {PODC '13},
year = {2013},
pages = {176--183},
numpages = {8},
publisher = {ACM},
address = {New York, NY, USA},
isbn = {978-1-4503-2065-8},
url = {http://doi.acm.org/10.1145/2484239.2484263},
doi = {10.1145/2484239.2484263},
acmid = {2484263},
}
@inproceedings{ gutterman05hold,
author = {Zvi Gutterman and Dahlia Malkhi},
title = {Hold Your Sessions: An Attack on {Java} Session-Id Generation},
booktitle = {{CT-RSA}},
year = 2005,
pages = {44-57},
}
@inproceedings{ gutterman06analysis,
author = {Zvi Gutterman and Benny Pinkas and Tzachy Reinman},
title = {Analysis of the {Linux} Random Number Generator},
booktitle = {{IEEE} Symposium on Security and Privacy},
year = {2006},
pages = {371-385},
}
%H
@article{ haber91how,
author = {Stuart Haber and W. Scott Stornetta},
title = {How to Time-Stamp a Digital Document},
journal = {Journal of Cryptology},
year = 1991,
}
@misc { hanke18dfinity,
author = {Timo Hanke and Mahnush Movahedi and Dominic Williams},
title = {\href{https://arxiv.org/abs/1805.04548}{DFINITY Technology Overview Series: Consensus System}},
month = may,
year = 2018,
}
@inproceedings{haeberlen11fuzz,
author = {Andreas Haeberlen and
Benjamin C. Pierce and
Arjun Narayan},
title = {Differential Privacy Under Fire},
booktitle = {\bibconf[20th]{USENIX Security}{Proceedings of USENIX Security Symposium}},
location = {San Francisco, CA},
month = aug,
year = 2011
}
@inproceedings{ haenni16cast,
author = {Rolf Haenni and Reto E. Koenig and Eric Dubuis},
title = {\href{https://link.springer.com/chapter/10.1007/978-3-319-52240-1_5}{Cast-as-Intended Verification in Electronic Elections Based on Oblivious Transfer}},
booktitle = {International Joint Conference on Electronic Voting},
month = oct,
year = 2016,
location = {Bregenz, Austria},
}
@misc{ haenni19chvote,
author = {Rolf Haenni and Reto E. Koenig and Philipp Locher and Eric Dubuis},
title = {\href{https://eprint.iacr.org/2017/325.pdf}{CHVote System Specification}},
month = dec,
year = 2019,
}
@inproceedings{halderman07harvesting,
author = {Halderman, J. Alex and Waters, Brent},
title = {{Harvesting Verifiable Challenges from Oblivious Online Sources}},
booktitle = {Proceedings of the 14th ACM Conference on Computer and Communications Security},
series = {CCS '07},
year = {2007},
pages = {330--341},
publisher = {ACM},
address = {New York, NY, USA},
isbn = {978-1-59593-703-2},
location = {Alexandria, Virginia, USA},
numpages = {12},
url = {http://doi.acm.org/10.1145/1315245.1315287},
doi = {10.1145/1315245.1315287},
acmid = {1315287},
}
@inproceedings{hunt10zookeeper,
title={ZooKeeper: Wait-free Coordination for Internet-scale Systems.},
author={Hunt, Patrick and Konar, Mahadev and Junqueira, Flavio Paiva and Reed, Benjamin},
booktitle={USENIX annual technical conference},
volume={8},
number={9},
year={2010}
}
@inproceedings{hardjono2016cloud,
title={\href{https://hardjono.mit.edu/sites/default/files/documents/hardjono-smith-acm-iotpts2016.pdf}{Cloud-based commissioning of constrained devices using permissioned
blockchains}},
author={Hardjono, Thomas and Smith, Ned},
booktitle={Proceedings of the 2nd ACM International Workshop on IoT Privacy,
Trust, and Security},
pages={29--36},
year={2016},
organization={ACM}
}
@inproceedings{ hatsukazu87ibe,
author = {Hatsukazu Tanaka},
title = {A Realization Scheme for the Identity-Based Cryptosystem},
booktitle = {\bibconf{CRYPTO}{Advances in Cryptology}},
year = {1987},
}
@misc{ havocscope19fake,
author = {Havocscope},
title = {\href{https://www.havocscope.com/fake-id/}{Fake ID Cards, Driver Licenses, and Stolen Passports}},
year = 2019,
}
@article{he04quest,
title = {The quest for personal control over mobile location privacy},
author = {Qi He and Dapeng Wu and Khosla, P.},
journal = {Communications Magazine, IEEE},
year = {2004},
month = {may},
volume = {42},
number = {5},
pages = {130 -- 136},
}
@inproceedings{heilman15eclipse,
title={\href{https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-heilman.pdf}{Eclipse Attacks on {Bitcoin}'s Peer-to-Peer Network}},
author={Heilman, Ethan and Kendler, Alison and Zohar, Aviv and Goldberg, Sharon},
booktitle={24th USENIX Security Symposium},
pages={129--144},
year={2015},
url={https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-heilman.pdf},
}
@inproceedings{henry10making,
title={Making a nymbler nymble using verbs},
author={Henry, Ryan and Henry, Kevin and Goldberg, Ian},
booktitle={PETS},
year=2010
}
@inproceedings{henecka10tasty,
author={Henecka, Wilko and K\"ogl, Stefan and Sadeghi, Ahmad-reza and Schneider, Thomas and Wehrenberg, Immo},
title={Tasty: Tool for Automating Secure Two-partY computations},
booktitle={{ACM} Conference on Computer and Communications Security},
month={August},
year={2010}
}
@inproceedings{ heninger12mining,
author = {Heninger, Nadia and Durumeric, Zakir and Wustrow, Eric and Halderman, J. Alex},
title = {Mining Your {$P$}s and {$Q$}s: Detection of Widespread Weak Keys in Network Devices},
year = 2012,
month = aug,
booktitle = {21st {USENIX} Security Symposium}
}
@inproceedings{ herrmann09website,
author = {Dominik Herrmann and Rolf Wendolsky and Hannes Federrath},
title = {Website Fingerprinting: Attacking Popular
Privacy Enhancing Technologies
with the Multinomial Na\"ive-Bayes Classifier},
booktitle = {CCSW},
month = nov,
year = 2009,
}
@article{ herzberg95proactive,
title={\href{https://link.springer.com/chapter/10.1007/3-540-44750-4_27}{Proactive Secret Sharing Or: How to Cope With Perpetual Leakage}},
author={Herzberg, Amir and Jarecki, Stanis{\l}aw and Krawczyk, Hugo and Yung, Moti},
booktitle = {\bibconf[15th]{CRYPTO}{Advances in Cryptology}},
pages={339--352},
month=aug,
year={1995},
location = {Santa Barbara, California, USA},
}
@inproceedings{ hildenbrandt18kevm,
author = {Everett Hildenbrandt and Manasvi Saxena and Nishant Rodrigues and
Xiaoran Zhu and Philip Daian and Dwight Guth and
Brandon Moore and Daejun Park and Yi Zhang and
Andrei Stefanescu and Grigore Rosu},
title = {\href{https://ieeexplore.ieee.org/abstract/document/8429306}{KEVM: A Complete Formal Semantics of the Ethereum Virtual Machine}},
booktitle = {\bibconf[31st]{CSF}{Computer Security Foundations Symposium}},
month = jul,
year = 2018,
}
@article{ hirt00player,
author = {Martin Hirt and Ueli Maurer},
title = {\href{https://link.springer.com/article/10.1007/s001459910003}{Player Simulation and General Adversary Structures in Perfect Multiparty Computation}},
volume = 31,
pages = {31-60},
month = apr,
year = 2000,
}
@misc{ hoffman-andrews14verizon,
author = {Jacob Hoffman-Andrews},
title = {Verizon Injecting Perma-Cookies to Track Mobile Customers,
Bypassing Privacy Controls},
publisher = {Electronic Frontier Foundation},
month = nov,
year = 2014,
}
@inproceedings{ hohenberger14anonize,
author = {Susan Hohenberger and Steven Myers and Rafael Pass
and abhi shelat},
title = {{ANONIZE}: A Large-Scale Anonymous Survey System},
booktitle = {IEEE Security and Privacy},
month = may,
year = 2014,
}
@inproceedings{hohenberger06privacy,
author = {Susan Hohenberger and
Stephen A. Weis},
title = {Honest-Verifier Private Disjointness Testing Without Random
Oracles},
booktitle = {\bibconf{PETS}{Privacy Enhancing Technologies}},
location = {New York, NY},
month = jun,
year = 2006
}
@inproceedings{holzer12secure,
author={Holzer, Andreas and Franz, Martin and Katzenbeisser, Stefan and Veith, Helmut},
title={Secure two-party computations in {ANSI C}},
booktitle={{ACM} Conference on Computer and Communications Security},
month={October},
year={2012}
}
@inproceedings{ hopper06on,
author = {Nicholas Hopper and Eugene Y. Vasserman},
title = {On the Effectiveness of $k$-Anonymity Against
Traffic Analysis and Surveillance},
booktitle = {WPES},
month = oct,
year = 2006,
location = {Alexandria, VA},
}
@article{ horowitz18mystery,
author = {Jason Horowitz},
title = {\href{https://www.nytimes.com/2018/02/28/world/europe/italy-election-davide-casaleggio-five-star.html}{The Mystery Man Who Runs Italys `Five Star' From the Shadows}},
journal = {The New York Times},
month = feb,
day = 28,
year = 2018,
}
@inproceedings{houmansadr13freewave,
title={{I Want my Voice to be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention}},
author={Amir Houmansadr and Thomas Riedl and Nikita Borisov and Andrew Singer},
booktitle={\bibbrev{NDSS}{Network and Distributed System Security Symposium}},
year={2013}
}
@inproceedings{ houmansadr13parrot,
author = {Houmansadr, Amir and Brubaker, Chad and Shmatikov, Vitaly},
title = {The Parrot is Dead:
Observing Unobservable Network Communications},
booktitle = {IEEE \bibconf[34th]{SP}{Symposium on Security and Privacy}},
month = may,
year = {2013},
}
@inproceedings{huang12private,
author = {Yan Huang and
David Evans and
Jonathan Katz},
title = {Private Set Intersection: Are Garbled Circuits Better than
Custom Protocols?},
booktitle = {NDSS},
year = {2012}
}
@article{huang2017seshare,
title={\href{https://onlinelibrary.wiley.com/doi/full/10.1002/cpe.4359}{SeShare: Secure cloud data sharing based on blockchain and public auditing}},
author={Huang, Longxia and Zhang, Gongxuan and Yu, Shui and Fu, Anmin and Yearwood, John},
journal={Concurrency and Computation: Practice and Experience},
publisher={Wiley Online Library}
}
@inproceedings{ huhnlein03ibe,
title={Towards practical non-interactive public key cryptosystems using non-maximal imaginary quadratic orders},
author={H{\"u}hnlein, Detlef and Jacobson, Michael and Weber, Damian},
booktitle={Journal Designs, Codes and Cryptography},
year={2003},
}
@inproceedings{ huisman06temporal,
author = {Marieke Huisman and
Pratik Worah and
Kim Sunesen},
title = {A temporal logic characterisation of observational determinism},
booktitle = {IEEE \bibconf[19th]{CSFW}{computer Security Foundation Workshop}},
month = jul,
year = {2006},
}
%I
@misc{ intel14software,
author = {{Intel}},
title = {\href{https://software.intel.com/sites/default/files/managed/48/88/329298-002.pdf}{Software Guard Extensions Programming Reference}},
month = oct,
year = 2014,
}
@inproceedings{ ioannidis06privacy,
author = {Ioannidis, Sotiris and
Sidiroglou, Stelios and Keromytis, Angelos D.},
title = {Privacy as an operating system service},
booktitle = {Proceedings of the 1st USENIX
Workshop on Hot Topics in Security},
series = {HOTSEC'06},
year = {2006},
location = {Vancouver, B.C., Canada},
pages = {8--8},
publisher = {USENIX Association},
address = {Berkeley, CA, USA},
}
%J
@article{jaccard,
author = {Paul Jaccard},
journal = {Bulletin de la Soci\'et\'e Vaudoise des Sciences Naturelles},
title = {{\'Etude} comparative de la distribution florale dans une portion des {A}lpes et du {J}ura},
volume = 37,
number = 142,
pages = {547-579},
month = jun,
year = 1901,
}
@inproceedings{jansen14onions,
author = {Rob Jansen and Andrew Miller and Paul Syverson
and Bryan Ford},
title = {From Onions to Shallots: Rewarding {Tor} Relays with {TEARS}},
booktitle = {Workshop on Hot Topics in Privacy Enhancing Technologies
(HotPETs)},
month = jul,
year = 2014,
location = {Amsterdam, Netherlands},
}
@inproceedings{jakobsson00addition,
title={Addition of {El Gamal} Plaintexts},
author={Jakobsson, Markus and Juels, Ari},
booktitle={\bibconf{ASIACRYPT}{Advances in Cryptology}},
year={2000},
}
@inproceedings{jakobsson99quorum,
title={\href{https://link.springer.com/chapter/10.1007/3-540-49162-7_9}{On quorum controlled asymmetric proxy re-encryption}},
author={Jakobsson, Markus},
booktitle={Public key cryptography},
pages={632--632},
year={1999},
organization={Springer}
}
@inproceedings{ jarabek12thinav,
author = {Jarabek, Chris and Barrera, David and Aycock, John},
title = {\href{http://doi.acm.org/10.1145/2420950.2420983}{ThinAV: Truly
Lightweight Mobile Cloud-based Anti-malware}},
booktitle = {Proceedings of the 28th Annual Computer Security Applications
Conference},
series = {ACSAC '12},
year = {2012},
location = {Orlando, Florida, USA},
numpages = {10},
publisher = {ACM},
address = {New York, NY, USA},
}
@inproceedings{ji15your,
author = {Shouling Ji and
Weiqing Li and
Neil Zhenqiang Gong and
Prateek Mittal and
Raheem A. Beyah},
title = {On Your Social Network De-anonymizablity:
{Q}uantification and Large Scale Evaluation with Seed Knowledge},
booktitle = {\bibconf[22nd]{NDSS}{Network and Distributed System Security
Symposium}},
location = {San Diego, CA},
month = apr,
year = 2015
}
@inproceedings{ jiang07preserving,
author = {Jiang, Tao and Wang, Helen J. and Hu, Yih-Chun},
title = {Preserving location privacy in wireless lans},
booktitle = {Proceedings of the 5th international conference on Mobile systems, applications and services},
series = {MobiSys '07},
year = {2007},
location = {San Juan, Puerto Rico},
pages = {246--257},
publisher = {ACM},
address = {New York, NY, USA},
}
@inproceedings{ johansen07firepatch,
author={Johansen, H{\aa}vard and Johansen, Dag and van Renesse, Robbert},
editor={Venter, Hein and Eloff, Mariki and Labuschagne, Les and Eloff, Jan
and von Solms, Rossouw},
title={\href{http://dl.ifip.org/db/conf/sec/sec2007/JohansenJR07.pdf}
{FirePatch: Secure and Time-Critical Dissemination of Software Patches}},
bookTitle={New Approaches for Security, Privacy and Trust in Complex
Environments: Proceedings of the IFIP TC-11 22nd International Information
Security Conference (SEC 2007)},
month={may},
year={2007}
}
@inproceedings{ johnson13users,
author = {Johnson, Aaron and Wacek, Chris and Jansen, Rob and Sherr, Micah and Syverson, Paul},
title = {Users Get Routed: Traffic Correlation on {Tor} by Realistic Adversaries},
booktitle = {\bibconf[20th]{CCS}{ACM Conference on
Computer and Communications Security}},
month = nov,
year = {2013},
}
@inproceedings{johnson07nymble,
title={Nymble: {A}nonymous {IP}-address blocking},
author={Johnson, Peter C and Kapadia, Apu and Tsang, Patrick P and Smith, Sean W},
booktitle={PETS},
year=2007
}
@article{josang07survey,
title={A survey of trust and reputation systems for online service provision},
author={J{\o}sang, Audun and Ismail, Roslan and Boyd, Colin},
journal={Decision support systems},
volume={43},
number={2},
pages={618--644},
year={2007},
publisher={Elsevier}
}
@misc{ jovanovic16byzcoin,
title = {\href{http://hackingdistributed.com/2016/08/04/byzcoin/}{ByzCoin: Securely Scaling Blockchains}},
author = {Philipp Jovanovic},
month = {August},
year = {2016},
howpublished = {\href{http://hackingdistributed.com/}{Hacking, Distributed}},
}
@inproceedings{ juels02verifiable,
author = {Juels, Ari and Guajardo, Jorge},
title = {{RSA} Key Generation with Verifiable Randomness},
year = 2002,
month = feb,
booktitle = {Public Key Cryptography}
}
@inproceedings{ juels16investigating,
author = {Ari Juels and Ahmed Kosba and Elaine Shi},
title = {\href{https://dl.acm.org/doi/abs/10.1145/2976749.2978362}{The Ring of Gyges: Investigating the Future of Criminal Smart Contracts}},
booktitle = {\bibconf{CCS}{ACM Conference on Computer and
Communications Security}},
month = oct,
year = 2016,
}
@inproceedings{junqueira11zab,
title={Zab: High-performance broadcast for primary-backup systems},
author={Junqueira, Flavio P and Reed, Benjamin C and Serafini, Marco},
booktitle={2011 IEEE/IFIP 41st International Conference on Dependable Systems \& Networks (DSN)},
pages={245--256},
year={2011},
organization={IEEE}
}
%K
@inproceedings{kalodner2018arbitrum,
title={Arbitrum: Scalable, private smart contracts},
author={Kalodner, Harry and Goldfeder, Steven and Chen, Xiaoqi and Weinberg, S Matthew and Felten, Edward W},
booktitle={Proceedings of the 27th USENIX Conference on Security Symposium},
pages={1353--1370},
year={2018},
organization={USENIX Association}
}
@inproceedings{karame12double,
title={\href{https://eprint.iacr.org/2012/248.pdf}{Double-spending fast payments in {Bitcoin}}},
author={Karame, Ghassan O and Androulaki, Elli and Capkun, Srdjan},
booktitle={19th ACM Conference on Computer and communications security},
pages={906--917},
year={2012},
organization={ACM},
url={https://eprint.iacr.org/2012/248.pdf},
}
@INPROCEEDINGS{ karger05multilevel,
author = {Paul A. Karger},
title = {Multi-level security requirements for hypervisors},
booktitle = {Computer Security Applications Conference, 21st Annual},
series = {ACSAC '05},
year = {2005},
month = {Dec.},
}
@inproceedings{kate09distributed,
title={\href{https://ieeexplore.ieee.org/abstract/document/5158416/}{Distributed Key Generation for the Internet}},
author={Kate, Aniket and Goldberg, Ian},
booktitle={\bibconf[29th]{ICDCS}{International Conference on Distributed Computing Systems}},
pages={119--128},
month=jun,
year={2009},
organization={IEEE}
}
@inproceedings{ kate10distributed,
author = {Aniket Kate and Ian Goldberg},
title = {\href{https://link.springer.com/chapter/10.1007/978-3-642-15317-4_27}{Distributed Private-Key Generators for Identity-Based Cryptography}},
booktitle = {\bibconf[7th]{SCN}{Security and Cryptography for Networks}},
month = sep,
year = 2010,
location = {Amalfi, Italy},
}
@misc{ kate12distributed,
author = {Aniket Kate and Yizhou Huang and Ian Goldberg},
title = {\href{https://eprint.iacr.org/2012/377.pdf}{Distributed Key Generation in the Wild}},
howpublished = {Cryptology ePrint Archive, Report 2012/377},
month = jul,
year = 2012,
}
@incollection{katz01cryptographic,
title={Cryptographic counters and applications to electronic voting},
author={Katz, Jonathan and Myers, Steven and Ostrovsky, Rafail},
booktitle={Eurocrypt},
pages={78--92},
year={2001},
publisher={Springer}
}
@misc{keating07arrested,
title = {Use Tor P2P - Get Arrested},
author = {Tom Keating},
publisher = {{TMC}net},
month = "September",
day = 17,
year = 2007,
note = {\url{http://blog.tmcnet.com/blog/tom-keating/p2p/use-tor-p2p-get-arrested.asp}}
}
@inproceedings{kedogan02limits,
author = {Kedogan, Dogan and Agrawal, Dakshi and Penz, Stefan},
title = {Limits of Anonymity in Open Environments},
booktitle = {Workshop on Information Hiding},
month = oct,
year = {2002},
}
@phdthesis{kelly09taxonomy,
author = {Kelly, Douglas J.},
title = {A taxonomy for and analysis of anonymous communications networks},
year = {2009},
isbn = {978-1-109-07876-3},
note = {AAI3351544},
publisher = {Air Force Institute of Technology},
address = {Wright Patterson AFB, OH, USA},
}
@inproceedings{kelly08towards,
title={Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary},
author={Kelly, Douglas and Raines, Richard and Baldwin, Rusty and Mullins, Barry and Grimaila, Michael},
booktitle={\bibbrev{IPCCC}{International Performance, Computing,
and Communications Conference}},
pages={524--531},
year={2008},
organization={IEEE}
}
@misc{ kessem15CaaS,
author = {Limor Kessem},
title = {\href{https://securityintelligence.com/certificates-as-a-service-code-signing-certs-become-popular-cybercrime-commodity/}{Certificates-as-a-Service? Code Signing Certs Become Popular Cybercrime Commodity
}},
month = sep,
year = 2015,
}
@article{ kessem15certificates,
author = {Limor Kessem},
title = {\href{https://securityintelligence.com/certificates-as-a-service-code-signing-certs-become-popular-cybercrime-commodity/}{Certificates-as-a-Service? Code Signing Certs Become Popular Cybercrime Commodity}},
month = sep,
year = 2015,
journal = {Security Intelligence},
}
@inproceedings{kirsch08paxos,
title={Paxos for system builders: An overview},
author={Kirsch, Jonathan and Amir, Yair},
booktitle={Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware},
pages={1--6},
year={2008}
}
@article{khattak11trust,
title={Analysis of Open Environment Sign-in Schemes-Privacy Enhanced \& Trustworthy Approach},
author={Khattak, Zubair Ahmad and Manan, Jamalul-lail Ab and Sulaiman, Suziah and others},
journal={Journal of Advances in Information Technology},
year={2011}
}
@article{ khrennikov14putin,
author = {Ilya Khrennikov},
title = {\href{http://www.bloomberg.com/news/2014-07-29/putin-sets-110-000-bounty-for-cracking-tor-as-anonymous-internet-usage-in-russia-surges.html}{Putin Sets \$110,000 Bounty for Cracking Tor as Anonymous Internet Usage in Russia Surges}},
journal = {Bloomberg Business},
month = jul,
year = 2014,
}
@misc{ kiayias16ouroboros,
author = {Aggelos Kiayias and Alexander Russell and Bernardo David and Roman Oliynykov},
title = {\href{http://eprint.iacr.org/2016/889}{Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol}},
howpublished = {Cryptology ePrint Archive, Report 2016/889},
year = {2016},
}
@inproceedings{kiayias05testing,
author = {Aggelos Kiayias and
Antonina Mitrofanova},
title = {Testing Disjointness of Private Datasets},
booktitle = {Financial Cryptography and Data Security},
year = {2005}
}
@techreport{kiayias15speed,
title={\href{https://eprint.iacr.org/2015/1019.pdf}{Speed-Security Tradeoffs in Blockchain Protocols}},
author={Kiayias, Aggelos and Panagiotakos, Giorgos},
year={2015},
institution={IACR: Cryptology ePrint Archive}
}
@inproceedings{kim01communication,
title={\href{https://netsec.ethz.ch/publications/papers/ifip-sec-2001.pdf}{Communication-efficient group key agreement}},
author={Kim, Yongdae and Perrig, Adrian and Tsudik, Gene},
booktitle={IFIP International Information Security Conference},
pages={229--244},
year={2001}
}
@inproceedings{ kim13accountable,
author = {Tiffany Hyun-Jin Kim and Lin-Shung Huang and Adrian Perrig and Collin Jackson and Virgil Gligor},
title = {\href{https://www.cs.cmu.edu/~xia/resources/Documents/kim-www13.pdf}{Accountable Key Infrastructure {(AKI)}: A Proposal for a Public-Key Validation Infrastructure}},
booktitle = {\bibconf{WWW}{International Word Wide Web Conference}},
year = 2014,
}
@article{ kirk13could,
author = {Jeremy Kirk},
title = {\href{http://www.computerworld.com/article/2498077/desktop-apps/could-the-bitcoin-network-be-used-as-an-ultrasecure-notary-service-.html}{Could the {Bitcoin} network be used as an ultrasecure notary service?}},
month = may,
year = 2013,
journal = {Computerworld},
}
@inproceedings{kissner05privacy,
author = {Lea Kissner and
Dawn Xiaodong Song},
title = {Privacy-Preserving Set Operations},
booktitle = {\bibconf[25th]{CRYPTO}{Annual International
Cryptology Conference}},
publisher = {Springer},
location = {Santa Barbara, CA},
month = aug,
year = 2005
}
@article{ kline08security,
author = {Candice L. Kline},
title = {\href{https://heinonline.org/HOL/LandingPage?handle=hein.journals/utol39&div=34}{Security Theater and Database-Driven Information Markets: a Case for an Omnibus U.S. Data Privacy Statute}},
journal = {The University of Toledo Law Review},
volume = 39,
number = 1,
month = feb,
year = 2008,
}
@inproceedings{ knockel11three,
author = {Jeffrey Knockel and Jedidiah R. Crandall and Jared Saia},
title = {Three Researchers, Five Conjectures:
An Empirical Analysis of {TOM-Skype} Censorship and Surveillance},
booktitle = {\bibbrev{FOCI}{USENIX Workshop on Free and Open
Communications on the Internet}},
month = aug,
year = 2011,
location = {San Francisco, CA},
}
@article{ kobeissi13cryptocat,
title={Cryptocat: Adopting Accessibility and Ease of Use as Security Properties},
author={Kobeissi, Nadim and Breault, Arlo},
journal={arXiv preprint arXiv:1306.5156},
year={2013}
}
@inproceedings{ kokoris16enhancing,
author = {Eleftherios Kokoris-Kogias and Philipp Jovanovic and Nicolas Gailly and Ismail Khoffi and Linus Gasser and Bryan Ford},
title = {\href{http://arxiv.org/abs/1602.06997}{Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing}},
booktitle = {Proceedings of the 25th USENIX Conference on Security Symposium},
year = {2016},
}
@inproceedings{ kokoris16enhancing-short,
author = {Eleftherios Kokoris-Kogias and others},
title = {\href{http://arxiv.org/abs/1602.06997}{Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing}},
booktitle = {25th USENIX Conference on Security Symposium},
year = {2016},
}
@techreport{kokoris16managing,
title={\href{https://www.securityweek2016.tu-darmstadt.de/fileadmin/user_upload/Group_securityweek2016/pets2016/1_Managing_identities_bryan_ford_etc.pdf}{Managing Identities Using Blockchains and CoSi}},
author={Kokoris-Kogias, Eleftherios and Gasser, Linus and Khoffi, Ismail and Jovanovic, Philipp and Gailly, Nicolas and Ford, Bryan},
year={2016},
institution={9th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2016)}
}
@inproceedings{kokoris17omniledger,
title={\href{https://eprint.iacr.org/2017/406.pdf}{OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding}},
author={Kokoris-Kogias, Eleftherios and Jovanovic, Philipp and Gasser, Linus and Gailly, Nicolas and Syta, Ewa and Ford, Bryan},
booktitle={39th {IEEE Symposium on Security and Privacy}},
pages={19--34},
year={2018},
organization={IEEE}
}
@misc{kokoris18calypso,
author = {Eleftherios Kokoris-Kogias and Enis Ceyhun Alp and Sandra Deepthy Siby and Nicolas Gailly and Linus Gasser and Philipp Jovanovic and Ewa Syta and Bryan Ford},
title = {\href{https://eprint.iacr.org/2018/209}{Verifiable Management of Private Data under Byzantine Failures}},
howpublished = {Cryptology ePrint Archive, Report 2018/209},
year = {2018},
}
@phdthesis{kokoris19secure,
title={\href{https://drive.google.com/open?id=1tl1nNqLUhgubzxlRkNfMBcWZVl_N0WT3}{Secure, Confidential Blockchains Providing High Throughput and Low Latency}},
author={Kokoris-Kogias, Eleftherios},
school = {\'Ecole Polytechnique F\'ed\'erale de Lausanne (EPFL)},
month = may,
year = 2019,
}
@misc{ kokoris19bootstrapping,
author = {Eleftherios Kokoris-Kogias and Alexander Spiegelman and
Dahlia Malkhi and Ittai Abraham},
title = {\href{https://eprint.iacr.org/2019/1015.pdf}{Bootstrapping
Consensus Without Trusted Setup:
Fully Asynchronous Distributed Key Generation}},
month = sep,
year = 2019,
howpublished = {Cryptology ePrint Archive Report 2019/1015},
}
@inproceedings{kosba2016hawk,
title={Hawk: The blockchain model of cryptography and privacy-preserving smart contracts},
author={Kosba, Ahmed and Miller, Andrew and Shi, Elaine and Wen, Zikai and Papamanthou, Charalampos},
booktitle={2016 IEEE symposium on security and privacy (SP)},
pages={839--858},
year={2016},
organization={IEEE}
}
@inproceedings{koscher10experimental,
title={Experimental security analysis of a modern automobile},
author={Koscher, Karl and Czeskis, Alexei and Roesner, Franziska and
Patel, Shwetak and Kohno, Tadayoshi and Checkoway, Stephen and
McCoy, Damon and Kantor, Brian and Anderson, Danny and Shacham, Hovav and
Savage, Stefan},
booktitle={IEEE Security and Privacy},
year={2010},
month=may,
}
@misc{ kozlov19league,
author = {Dina Kozlov},
title = {\href{https://blog.cloudflare.com/league-of-entropy/}{League of Entropy: Not All Heroes Wear Capes}},
howpublished = {CloudFlare Blog},
month = jun,
year = 2019,
}
@inproceedings{ kranch15upgrading,
author = {Michael Kranch and Joseph Bonneau},
title = {Upgrading {HTTPS} in Mid-Air: An Empirical Study of
Strict Transport Security and Key Pinning},
booktitle = {Network and Distributed System Security Symposium (NDSS)},
month = feb,
year = 2015,
}
@inproceedings{kreuter13pcf,
author={Kreuter, Ben and Mood, Benjamin and shelat, abhi and Butler, Kevin},
title={{PCF}: A Portable Circuit Format for Scalable Two-Party Secure Computation},
booktitle={{USENIX} Security Symposium},
month={August},
year={2013},
}
@misc{ kroll14secure,
author = {Joshua A. Kroll and Edward W. Felten and Dan Boneh},
title = {\href{https://freedom-to-tinker.com/blog/felten/secure-protocols-for-accountable-warrant-execution/}{Secure protocols for accountable warrant execution}},
month = apr,
year = 2014,
}
@inproceedings{krohn04fly,
title={On-the-fly verification of rateless erasure codes for efficient content distribution},
author={Krohn, Maxwell N and Freedman, Michael J and Mazieres, David},
booktitle={Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on},
pages={226--240},
year={2004},
organization={IEEE}
}
@inproceedings{kulynych17claimchain,
title={\href{https://dl.acm.org/citation.cfm?id=3268947}{ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging}},
author={Kulynych, Bogdan and Lueks, Wouter and Isaakidis, Marios and Danezis, George and Troncoso, Carmela},
booktitle={Proceedings of the 2018 Workshop on Privacy in the Electronic Society},
pages={86--103},
year={2018},
organization={ACM}
}
@inproceedings{kumaresan15use,
title={\href{https://people.csail.mit.edu/ranjit/papers/poker.pdf}{How to use bitcoin to play decentralized poker}},
author={Kumaresan, Ranjit and Moran, Tal and Bentov, Iddo},
booktitle={Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security},
pages={195--206},
year={2015},
organization={ACM}
}
@inproceedings{ kuppusamy16diplomat,
author = {Trishank Karthik Kuppusamy and Santiago Torres-Arias and Vladimir Diaz and Justin Cappos},
title = {\href{https://www.usenix.org/node/194973}{Diplomat: Using Delegations to Protect Community Repositories}},
booktitle = {\bibconf[13th]{NSDI}{USENIX Symposium on Networked Systems Design and Implementation}},
month = mar,
year = 2016,
}
@inproceedings{kwon16riffle,
author = {Albert Kwon and
David Lazar and
Srinivas Devadas and
Bryan Ford},
title = {Riffle: {A}n efficient communication system with strong
anonymity},
booktitle = {\bibconf[16th]{PETS}{Privacy Enhancing Technologies}},
location = {Darmstadt, Germany},
month = jul,
year = 2016
}
@article{kwon14tendermint,
title={\href{http://tendermint.com/docs/tendermint.pdf}{TenderMint: Consensus without Mining}},
author={Kwon, Jae},
year={2014}
}
@article{kwon16atom,
author = {Albert Kwon and
Henry Corrigan{-}Gibbs and
Srinivas Devadas and
Bryan Ford},
title = {Atom: Scalable Anonymity Resistant to Traffic Analysis},
journal = {CoRR},
volume = {abs/1612.07841},
year = {2016},
url = {http://arxiv.org/abs/1612.07841},
archivePrefix = {arXiv},
eprint = {1612.07841},
timestamp = {Wed, 07 Jun 2017 14:40:14 +0200},
biburl = {http://dblp.org/rec/bib/journals/corr/KwonCDF16},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@misc{kyber,
title = {\href{https://github.com/dedis/kyber}{The {Kyber} Cryptography Library}},
key = {kyber},
year = {2010 -- 2018},
}
%L
@article{lampson1992,
Author = {Lampson, Butler and Abadi, Mart\'{\i}n and Burrows, Michael and Wobber, Edward},
Journal = {ACM Trans. Comput. Syst.},
Title = {Authentication in distributed systems: theory and practice},
Year = {1992}
}
@inproceedings{lampson96build,
title={How to build a highly available system using consensus},
author={Lampson, Butler W},
booktitle={International Workshop on Distributed Algorithms},
pages={1--17},
year={1996},
organization={Springer}
}
@article{langley13anssi,
author = {Adam Langley},
title = {\href{http://googleonlinesecurity.blogspot.com/2013/12/further-improving-digital-certificate.html}{Further improving digital certificate security}},
journal = {Google Online Security Blog},
month = dec,
year = 2013,
day = 7,
}
@article{langley15cnnic,
author = {Adam Langley},
title = {\href{http://googleonlinesecurity.blogspot.nl/2015/03/maintaining-digital-certificate-security.html?m=1}{Maintaining digital certificate security }},
journal = {Google Online Security Blog},
month = mar,
year = 2015,
day = 23,
}
@article{laurie14CT,
author = {Laurie, Ben},
title = {\href{https://queue.acm.org/detail.cfm?id=2668154}{Certificate Transparency}},
journal = {ACM Queue},
month = sep,
year = {2014},
volume = 12,
number = 8,
}
@misc{laurie13CTrfc,
title={RFC 6962: Certificate transparency},
author={Laurie, Ben and Langley, Adam and Kasper, Emilia},
month = jun,
year={2013},
}
@misc{ laurie15improving,
author = {Ben Laurie},
title = {\href{https://www.certificate-transparency.org/ev-ct-plan}{Improving the Security of EV Certificates}},
month = may,
year = 2015,
}
@inproceedings{leblond2014ngo,
title={A look at targeted attacks through the lense of an {NGO}},
author={Le Blond, Stevens and Uritesc, Adina and Gilbert, Cedric and Leong Chua, Zheng
and Saxena, Prateek and Kirda, Engin},
booktitle={USENIX Security},
year={2014}
}
@inproceedings{ leblond18enforcing,
author = {Stevens Le Blond and Alejandro Cuevas and
Juan Ramón Troncoso-Pastoriza and Philipp Jovanovic and
Bryan Ford and Jean-Pierre Hubaux},
title = {\href{https://bford.info/pub/dec/immunity-abs/}{On Enforcing the Digital Immunity of a Large Humanitarian Organization}},
booktitle = {\bibconf{S\&P}{IEEE Symposium on Security and Privacy}},
month = may,
year = 2018,
}
@inproceedings{lee13anon,
title={Anon-pass: Practical anonymous subscriptions},
author={Lee, Michael Z and Dunn, Alan M and Waters, Brent and Witchel, Emmett and Katz, Jonathan},
booktitle = {\bibconf{S\&P}{IEEE Symposium on Security and Privacy}},
year={2013},
}
@article{ lenstra12ron,
title = {Ron was wrong, Whit is right},
author = {Lenstra, Arjen K and Hughes, James P and
Augier, Maxime and Bos, Joppe W and Kleinjung, Thorsten and Wachter, Christophe},
journal = {{IACR} eprint archive},
volume = 64,
year = 2012,
}
@misc{ lenstra15random,
author = {Arjen K. Lenstra and Benjamin Wesolowski},
title = {\href{https://eprint.iacr.org/2015/366.pdf}{A random zoo: sloth, unicorn, and trx}},
howpublished = {{IACR} eprint archive},
month = apr,
year = 2015,
}
@article{ lemos11effobs,
author = {Robert Lemos},
title = {\href{http://www.infoworld.com/article/2620473/encryption/eff-builds-system-to-warn-of-certificate-breaches.html}{EFF builds system to warn of certificate breaches}},
journal = {InfoWorld },
month = september,
year = 2011,
day = 21,
}
@misc{lee11litecoin,
title={\href{https://bitcointalk.org/index.php?topic=47417.0}{Litecoin -- A Light Version of Bitcoin}},
author={Charlie Lee},
year={2011}
}
@inproceedings{ lee20replicated,
author = {Jonathan Lee and Kirill Nikitin and Srinath Setty},
title = {\href{https://eprint.iacr.org/2020/195.pdf}{Replicated state machines
without replicated execution}},
booktitle = {To appear in the IEEE Symposium on Security and Privacy},
month = may,
year = {2020},
}
@article{levy03poisoning,
author={E. Levy},
journal={IEEE Security Privacy},
title={\href{http://ieeexplore.ieee.org/document/1203227/}{Poisoning the
software supply chain}},
year={2003},
volume={1},
number={3},
pages={70-73},
month={may}
}
@inproceedings{lewenberg15inclusive,
title={\href{https://link.springer.com/chapter/10.1007/978-3-662-47854-7_33}{Inclusive block chain protocols}},
author={Lewenberg, Yoad and Sompolinsky, Yonatan and Zohar, Aviv},
booktitle={International Conference on Financial Cryptography and Data Security},
pages={528--547},
year={2015},
organization={Springer}
}
@inproceedings{li04secure,
title={Secure untrusted data repository (SUNDR)},
author={Li, Jinyuan and Krohn, Maxwell N and Mazi{\`e}res, David and Shasha, Dennis},
booktitle={OSDI},
year={2004}
}
@inproceedings{ li06bar,
author = {Harry C. Li and Allen Clement and Edmund L. Wong and Jeff Napper
and Indrajit Roy and Lorenzo Alvisi and Michael Dahlin},
title = {\href{https://dl.acm.org/citation.cfm?id=1298474}{BAR Gossip}},
booktitle = {\bibconf[7th]{OSDI}{Operating Systems Design and Implementation}},
month = nov,
year = 2006,
location = {Seattle, Washington, USA},
}
@article{ li06revere,
author = {Li, Jun and Reiher, P. L. and Popek, G. J.},
title =
{\href{http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1258125}{Resilient
Self-organizing Overlay Networks for Security Update Delivery}},
journal = {IEEE J.Sel. A. Commun.},
issue_date = {September 2006},
volume = {22},
number = {1},
month = sep,
year = {2006},
numpages = {14},
publisher = {IEEE Press},
}
@inproceedings{liang06index,
title={The Index Poisoning Attack in P2P File Sharing Systems.},
author={Liang, Jian and Naoumov, Naoum and Ross, Keith W},
booktitle={INFOCOM},
pages={1--12},
year={2006},
organization={Citeseer}
}
@article{ lindeman12gentle,
author = {Mark Lindeman and Philip B. Stark},
title = {\href{https://ieeexplore.ieee.org/document/6175884}{A Gentle Introduction to Risk-Limiting Audits}},
journal = {IEEE Security \& Privacy},
volume = 10,
number = 5,
month = sep,
year = 2012,
}
@inproceedings{linn16blockchain,
title={\href{https://www.healthit.gov/sites/default/files/11-74-ablockchainforhealthcare.pdf}{Blockchain for health data and its potential use in health it and health care related research}},
author={Linn, Laure A and Koo, Martha B},
booktitle={ONC/NIST Use of Blockchain for Healthcare and Research Workshop. Gaithersburg, Maryland, United States: ONC/NIST},
year={2016}
}
@misc{linux16hyperledger,
title = {\href{https://www.hyperledger.org/}{Hyperledger Project}},
author = {{Linux Foundation}},
url = {https://www.hyperledger.org/},
year = {2016},
}
@inproceedings{liu05linkable,
author = {Liu, Joseph K and
Wong, Duncan S},
title = {Linkable ring signatures: {S}ecurity models and new schemes},
booktitle = {\bibconf{ICCSA}{Computational Science and Its Applications}},
location = {Singapore},
month = may,
year=2005
}
@inproceedings{ liu13screenpass,
author = {Dongtao Liu and Eduardo Cuervo and Valentin Pistol and
Ryan Scudellari and Landon P. Cox},
title = {ScreenPass: Secure Password Entry on Touchscreen Devices},
booktitle = {\bibconf[11th]{MobiSys}{International Conference on
Mobile Systems, Applications, and Services}},
month = jun,
year = 2013,
location = {Taipei, Taiwan},
}
@inproceedings{ liu15end,
author = {Yabing Liu and Will Tome and Liang Zhang and David Choffnes
and Dave Levin and Bruce Maggs and Alan Mislove
and Aaron Schulman and Christo Wilson},
title = {\href{http://conferences2.sigcomm.org/imc/2015/papers/p183.pdf}{An End-to-End Measurement of Certificate Revocation in the Web's PKI}},
booktitle = {\bibconf{IMC}{Internet Measurement Conference}},
month = oct,
year = 2015,
location = {Tokyo, Japan},
}
@inproceedings{liu2013improved,
title={Improved group off-the-record messaging},
author={Liu, Hong and Vasserman, Eugene Y and Hopper, Nicholas},
booktitle = {\bibconf{WPES}{ACM workshop on Privacy in the electronic society}},
year={2013},
}
@misc{loss18combining,
author = {Julian Loss and Tal Moran},
title = {\href{https://eprint.iacr.org/2018/235}{Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds}},
howpublished = {Cryptology ePrint Archive, Report 2018/235},
year = {2018},
}
@article{ loucaides19what,
author = {Darren Loucaides},
title = {\href{https://www.wired.com/story/italy-five-star-movement-techno-utopians/}{What Happens When Techno-Utopians Actually Run a Country}},
journal = {Wired},
month = feb,
day = 14,
year = 2019,
}
@article{lu08pseudotrust,
author={Li Lu and Jinsong Han and Yunhao Liu and Lei Hu
and Jin-Peng Huai and Ni, L. and Jian Ma},
journal={Parallel and Distributed Systems, IEEE Transactions on},
title={Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps},
year={2008},
month= oct,
volume={19},
number={10},
pages={1325 -1337},
}
@incollection{lu06sequential,
title={Sequential aggregate signatures and multisignatures without random oracles},
author={Lu, Steve and Ostrovsky, Rafail and Sahai, Amit and Shacham, Hovav and Waters, Brent},
booktitle={\bibconf{EUROCRYPT}{Conference on Theory and application of cryptographic techniques}},
year={2006},
}
@article{lu08pseudotrust,
author={Li Lu and Jinsong Han and Yunhao Liu and Lei Hu
and Jin-Peng Huai and Ni, L. and Jian Ma},
journal={Parallel and Distributed Systems, IEEE Transactions on},
title={Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps},
year={2008},
month= oct,
volume={19},
number={10},
pages={1325 -1337},
}
@inproceedings{lucas09flybynight,
author = {Matthew M. Lucas and
Nikita Borisov},
title = {{flyByNight}: mitigating the privacy risks of social networking},
booktitle = {\bibconf{SOUPS}{Symposium on Usable Privacy and Security}},
year = {2009},
}
@inproceedings{ luckie15resilience,
author = {Matthew Luckie and Robert Beverly and Tiange Wu and Mark Allman and
kc claffy},
title = {\href{https://dl.acm.org/doi/abs/10.1145/2815675.2815700}{Resilience of Deployed TCP to Blind Attacks}},
booktitle = {\bibbrev{IMC}{Internet Measurement Conference}},
year = 2015,
}
% month = oct,
@phdthesis{lueks17security,
title={\href{http://repository.ubn.ru.nl/bitstream/handle/2066/176475/176475.pdf?sequence=1}{Security and Privacy via Cryptography Having your cake and eating it too}},
author={Lueks, W},
year={2017},
school={[Sl: sn]}
}
@inproceedings{luo09facecloak,
author = {Wanying Luo and
Qi Xie and
Urs Hengartner},
title = {{FaceCloak}: {A}n Architecture for User Privacy on
Social Networking Sites},
booktitle = {\bibconf{CSE}{International Conference on
Computational Science and Engineering}},
year = {2009}
}
@inproceedings{luu15demystifying,
author = {Luu, Loi and Teutsch, Jason and Kulkarni, Raghav and Saxena, Prateek},
title = {\href{http://doi.acm.org/10.1145/2810103.2813659}{Demystifying
Incentives in the Consensus Computer}},
booktitle = {Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security},
series = {CCS '15},
year = {2015},
location = {Denver, Colorado, USA},
pages = {706--719},
numpages = {14},
publisher = {ACM},
}
@inproceedings{luu16secure,
author = {Luu, Loi and Narayanan, Viswesh and Zheng, Chaodong and Baweja, Kunal and Gilbert, Seth and Saxena, Prateek},
title = {\href{http://doi.acm.org/10.1145/2976749.2978389}{A Secure Sharding Protocol For Open Blockchains}},
booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security},
series = {CCS '16},
year = {2016},
isbn = {978-1-4503-4139-4},
location = {Vienna, Austria},
pages = {17--30},
numpages = {14},
url = {http://doi.acm.org/10.1145/2976749.2978389},
doi = {10.1145/2976749.2978389},
acmid = {2978389},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {bitcoin, consensus protocol, sharding},
}
@phdthesis{ lynn07pairing,
author = {Lynn, Ben},
title = {On the implementation of pairing-based cryptosystems},
year = {2007},
publisher = {Stanford University},
school = {Stanford University},
address = {Stanford, CA, USA},
}
@inproceedings{ lysyanskaya00pseudonym,
title={Pseudonym systems},
author={Lysyanskaya, Anna and Rivest, Ronald L and Sahai, Amit and Wolf, Stefan},
booktitle={Selected Areas in Cryptography},
pages={184--199},
year={2000},
organization={Springer}
}
%M
@article{ ma09new,
author = {Di Ma and Gene Tsudik},
title = {A New Approach to Secure Logging},
journal = {ACM Transactions on Storage},
volume = 5,
number = 1,
month = mar,
year = 2009,
}
@article{macaskill13decoded,
author = {Ewen Macaskill and Gabriel Dance},
title = {\href{http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded}{NSA Files Decoded}},
journal = {the Guardian},
month = november,
year = 2013,
day = 1,
}
@article{ macaskill13gchq,
author = {Ewen MacAskill and Julian Borger and Nick Hopkins and
Nick Davies and James Ball},
title = {{GCHQ} taps fibre-optic cables for secret access
to world's communications},
journal = {The Guardian},
month = jun,
day = 21,
year = 2013,
note = {\url{http://www.guardian.co.uk/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa}},
}
@article{ mack18psa,
author = {David Mack},
title = {\href{https://www.buzzfeednews.com/article/davidmack/obama-fake-news-jordan-peele-psa-video-buzzfeed}{This PSA About Fake News From Barack Obama Is Not What It Appears}},
journal = {Buzzfeed News},
month = apr,
year = 2018,
}
@inproceedings{maesa17blockchain,
title={\href{https://scholar.googleusercontent.com/scholar.bib?q=info:9OGqDno-XxgJ:scholar.google.com/&output=citation&scisig=AAGBfm0AAAAAWvLFmOBeDy6bsqG1HLtJ9UOamXOaHd8B&scisf=4&ct=citation&cd=-1&hl=en}{Blockchain based access control}},
author={Maesa, Damiano Di Francesco and Mori, Paolo and Ricci, Laura},
booktitle={IFIP International Conference on Distributed Applications and Interoperable Systems},
pages={206--220},
year={2017},
organization={Springer}
}
@inproceedings{ maheswaran13cryptobook,
title={{Crypto-Book}: {A}n Architecture for Privacy Preserving Online Identities},
author={Maheswaran, John and Wolinsky, David Isaac and Ford, Bryan},
booktitle={\bibconf[12th]{HotNets}{ACM Workshop on Hot Topics
in Networks}},
location = {College Park, MD},
month = Nov,
year = 2013
}
@inproceedings{ maheswaran16building,
author = {John Maheswaran and Daniel Jackowitz and Ennan Zhai and David Isaac Wolinsky and Bryan Ford},
title = {\href{http://dedis.cs.yale.edu/dissent/papers/cryptobook-abs}{Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities}},
booktitle = {CODASPY},
month = mar,
year = 2016,
}
@inproceedings{mahlki2004fairplay,
title={Fairplay\ --\ a secure two-party computation system},
author={Malkhi, Dahlia and Nisan, Noam and Pinkas, Benny and Sella, Yaron},
booktitle={{USENIX} Security Symposium},
month={August},
year={2004}
}
@incollection{mahmoody11time,
title={\href{https://link.springer.com/chapter/10.1007%2F978-3-642-22792-9_3}{Time-Lock Puzzles in the Random Oracle Model}},
author={Mahmoody, Mohammad and Moran, Tal and Vadhan, Salil},
booktitle={\bibconf{CRYPTO}{Advances in Cryptology}},
pages={39--50},
year={2011},
publisher={Springer}
}
@misc{maidsafe16project,
title={\href{https://github.com/maidsafe/Whitepapers/blob/master/Project-Safe.md}{MaidSafe.net announces project SAFE to the community}},
author={Maidsafe},
year={2016}
}
@inproceedings{ maniatis02secure,
author = {Petros Maniatis and Mary Baker},
title = {Secure History Preservation through Timeline Entanglement},
booktitle = {11th USENIX Security Symposium},
month = aug,
year = 2002,
location = {San Francisco, CA},
}
@article{maram19dynamic,
title={Dynamic-Committee Proactive Secret Sharing},
author={Maram, Sai Krishna Deepak and Zhang, Fan and Wang, Lun and Low, Andrew and Zhang, Yupeng and Juels, Ari and Song, Dawn},
year = {2019},
}
% previously malhotra15attacking (eprint)
@inproceedings{ malhotra16attacking,
author = {Aanchal Malhotra and Isaac E. Cohen and Erik Brakke
and Sharon Goldberg},
title = {\href{https://www.ndss-symposium.org/wp-content/uploads/2017/09/attacking-network-time-protocol.pdf}{Attacking the Network Time Protocol}},
booktitle = {\bibconf{NDSS}{Network and Distributed System Security Symposium}},
month = feb,
year = 2016,
location = {San Diego, CA, USA},
}
@article{ malhotra16broadcast,
author = {Aanchal Malhotra and Sharon Goldberg},
title = {\href{http://www.sigcomm.org/node/3899}{Attacking NTPs Authenticated Broadcast Mode}},
journal = {ACM SIGCOMM Computer Communication Review},
month = apr,
year = 2016,
volume = 46,
number = 2,
}
@inproceedings{ malhotra17security,
author = {Aanchal Malhotra and Matthew Van Gundy and Mayank Varia and
Haydn Kennedy and Jonathan Gardner and Sharon Goldberg},
title = {\href{https://fc17.ifca.ai/preproceedings/paper_29.pdf}{The Security of NTPs Datagram Protocol}},
booktitle = {\bibconf{FC}{Financial Cryptography and Data Security}},
month = apr,
year = 2017,
location = {Malta},
}
@article{ malkhi98byzantine,
author = {Dahlia Malkhi and Michael Reiter},
title = {\href{https://dl.acm.org/doi/abs/10.1007/s004460050050}{Byzantine Quorum Systems}},
journal = {Distributed Computing},
month = oct,
year = 1998,
volume = 11,
number = 4,
}
@inproceedings{malkhi19flexible,
title={Flexible Byzantine fault tolerance},
author={Malkhi, Dahlia and Nayak, Kartik and Ren, Ling},
booktitle={Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security},
pages={1041--1053},
year={2019}
}
@inproceedings{matsumoto2017ikp,
title={\href{https://ieeexplore.ieee.org/document/7958590}{IKP: Turning a PKI
around with decentralized automated incentives}},
author={Matsumoto, Stephanos and Reischuk, Raphael M},
booktitle={Security and Privacy (SP), 2017 IEEE Symposium on},
pages={410--426},
year={2017},
organization={IEEE}
}
@article{ manils10compromising,
title = {Compromising {Tor} anonymity exploiting {P2P} information leakage},
author = {Manils, P. and Abdelberri, C. and Blond, S.L.
and Kaafar, M.A. and Castelluccia, C. and Legout, A. and Dabbous, W.},
journal = {arXiv preprint arXiv:1004.1461},
year = {2010},
}
@misc{ marlinspike13trust,
author = {M. Marlinspike and T. {Perrin, Ed.}},
title = {Trust Assertions for Certificate Keys},
month = jan,
year = 2013,
note = {Internet-Draft draft-perrin-tls-tack-02.txt (Work in Progress)},
}
@inproceedings{ marlinspike11ssl,
author = {Moxie Marlinspike},
title = {{SSL} And The Future Of Authenticity},
booktitle = {BlackHat USA},
month = aug,
year = 2001,
}
@article{ mathews16flaws,
author = {Hans Verghese Mathews},
title = {\href{https://www.epw.in/journal/2016/9/special-articles/flaws-uidai-process.html}{Flaws in the UIDAI Process}},
journal = {Economic \& Political Weekly},
volume = 51,
number = 9,
month = feb,
year = 2016,
}
@inproceedings { mathewson04disclosure,
author = {Mathewson, Nick and Dingledine, Roger},
title = {Practical traffic analysis: extending and resisting statistical disclosure},
booktitle = {\bibconf[4th]{PETS}{International Workshop on
Privacy Enhancing Technologies}},
year = {2004},
month = {May},
}
@misc{mazieres07paxos,
title={Paxos made practical},
author={Mazieres, David},
year={2007}
}
@inproceedings{ maurer91ibe,
title={Non-interactive public-key cryptography},
author={Maurer, Ueli and Yacobi, Yacov},
booktitle={\bibconf{EUROCRYPT}{Conference on Theory and application of cryptographic techniques}},
year={1991},
}
@inproceedings{mccorry2017smart,
title={\href{https://eprint.iacr.org/2017/110.pdf}{A Smart Contract for
Boardroom Voting with Maximum Voter Privacy}},
author={McCorry, Patrick and Shahandashti, Siamak F and Hao, Feng},
booktitle={International Conference on Financial Cryptography and Data Security},
pages={357--375},
year={2017},
}
@inproceedings{ mccoy08shining,
title = {Shining light in dark places: Understanding the {Tor} network},
author = {McCoy, D. and Bauer, K. and Grunwald, D. and Kohno, T. and Sicker, D.},
booktitle = {Privacy Enhancing Technologies},
pages = {63--76},
year = {2008},
}
@misc{ mcgonaghy16dcs,
author = {Trent McConaghy},
title = {\href{https://blog.bigchaindb.com/the-dcs-triangle-5ce0e9e0f1dc}{The DCS Triangle}},
month = jun,
year = 2016,
}
@inproceedings{melara15coniks,
title={\href{https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-melara.pdf}{{CONIKS}: Bringing Key Transparency to End Users}},
author={Melara, Marcela S and Blankstein, Aaron and Bonneau, Joseph and Felten, Edward W and Freedman, Michael J},
booktitle={Proceedings of the 24th USENIX Conference on Security Symposium},
pages={383--398},
year={2015},
organization={USENIX Association}
}
%author={Melara, Marcela S and Blankstein, Aaron and Bonneau, Joseph and Felten, Edward W and %Freedman, Michael J}
@inproceedings{melara15coniks2,
title={\href{https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-melara.pdf}{{CONIKS}: Bringing key transparency to end users}},
author={Melara and others},
booktitle={24th USENIX Conference on Security Symposium},
year={2015},
}
@article{ menezes93elliptic,
author = {Menezes, Alfred J. and Vanstone, Scott A.},
title = {Elliptic curve cryptosystems and their implementation},
journal = {Journal of Cryptology},
publisher = {Springer New York},
issn = {0933-2790},
keyword = {Computer Science},
pages = {209-224},
volume = {6},
issue = {4},
year = {1993}
}
@phdthesis{ merkle79secrecy,
title = {\href{http://www.merkle.com/papers/Thesis1979.pdf}{Secrecy, Authentication, and Public Key Systems}},
author = {Ralph Charles Merkle},
school = {Stanford University},
month = jun,
year = {1979},
url = {http://www.merkle.com/papers/Thesis1979.pdf},
}
@inproceedings{merkle89certified,
title={\href{https://link.springer.com/chapter/10.1007%2F0-387-34805-0_21?LI=true}{A certified digital signature}},
author={Merkle, Ralph},
booktitle={Advances in Cryptology—CRYPTO 89 Proceedings},
pages={218--238},
year={1990},
organization={Springer}
}
@inproceedings{ micali99verifiable,
author = {Micali, Silvio and Vadhan, Salil and Rabin, Michael},
title = {\href{https://people.csail.mit.edu/silvio/Selected%20Scientific%20Papers/Pseudo%20Randomness/Verifiable_Random_Functions.pdf}{Verifiable Random Functions}},
booktitle = {Proceedings of the 40th Annual Symposium on Foundations of Computer Science},
series = {FOCS '99},
year = {1999},
pages = {120--130},
publisher = {IEEE Computer Society},
}
@inproceedings{micali01accountable,
title={Accountable-subgroup multisignatures},
author={Micali, Silvio and Ohta, Kazuo and Reyzin, Leonid},
booktitle = {\bibconf{CCS}{ACM Conference on Computer and
Communications Security}},
year={2001},
}
@inproceedings{michels96risk,
title={On the risk of disruption in several multiparty signature schemes},
author={Michels, Markus and Horster, Patrick},
booktitle={\bibconf{ASIACRYPT}{Advances in Cryptology}},
year={1996},
}
@inproceedings{ miers13zerocoin,
author = {Ian Miers and
Christina Garman and
Matthew Green and
Aviel D. Rubin},
title = {\href{https://ieeexplore.ieee.org/abstract/document/6547123/}{Zerocoin:
Anonymous Distributed E-Cash from {Bitcoin}}},
booktitle = {\bibconf[34th]{S{\&}P}{IEEE Symposium on Security and Privacy}},
location = {San Francisco, CA},
month = may,
year = 2013
}
@techreport{miller14anonymous,
title={Anonymous {Byzantine} Consensus from Moderately-Hard Puzzles:
A Model for {Bitcoin}},
author={Miller, Andrew and LaViola Jr., Joseph J.},
institution={University of Central Florida},
number={CS-TR-14-01},
month=apr,
year={2014},
url={https://socrates1024.s3.amazonaws.com/consensus.pdf},
}
@inproceedings{miller15shadow,
title={\href{https://www.usenix.org/conference/cset15/workshop-program/presentation/miller}{Shadow-Bitcoin: scalable simulation via direct execution of multi-threaded applications}},
author={Miller, Andrew and Jansen, Rob},
booktitle={8th Workshop on Cyber Security Experimentation and Test (CSET 15)},
year={2015},
url={https://www.usenix.org/conference/cset15/workshop-program/presentation/miller},
}
% obsoleted by conference version miller16honey
@techreport{miller16honey-eprint,
title={\href{https://eprint.iacr.org/2016/199.pdf}{The Honey Badger of BFT protocols}},
author={Miller, Andrew and Xia, Yu and Croman, Kyle and Shi, Elaine and Song, Dawn},
year={2016},
institution={Cryptology ePrint Archive 2016/199}
}
@inproceedings{miller16honey,
author = {Miller, Andrew and Xia, Yu and Croman, Kyle and Shi, Elaine and Song, Dawn},
title = {\href{https://eprint.iacr.org/2016/199.pdf}{The Honey Badger of BFT Protocols}},
booktitle = {\bibconf{CCS}{Computer and Communications Security}},
year = {2016},
keywords = {BFT, asynchronous, atomic broadcast, blockchain},
}
@inproceedings{ miller14know,
author = {Brad Miller and Ling Huang andA.D.Joseph and J.D. Tygar},
title = {I Know Why You Went to the Clinic:
Risks and Realization of {HTTPS} Traffic Analysis},
booktitle = {PETS},
month = jul,
year = 2014,
}
@article { mimoso15dlink,
author = {Michael Mimoso},
title = {\href{https://threatpost.com/d-link-accidentally-leaks-private-code-signing-keys/114727/}{D-Link Accidentally Leaks Private Code-Signing Keys}},
journal = {ThreatPost},
month = sep,
year = 2015,
}
@inproceedings{minkus14know,
author = {Tehila Minkus and
Keith W. Ross},
title = {I Know What You're Buying: {P}rivacy breaches on e{B}ay},
booktitle = {\bibconf[14th]{PETS}{International Symposium on Privacy
Enhancing Technologies}},
location = {Amsterdam, Netherlands},
month = jul,
year = 2014
}
@inproceedings{ mislove08ostra,
author = {Alan Mislove and Ansley Post and Peter Druschel and
Krishna P. Gummadi},
title = {Ostra: Leveraging trust to thwart unwanted communication},
booktitle = {\bibconf[5th]{NSDI}{USENIX Symposium on Networked Systems Design and Implementation}},
month = apr,
year = 2008,
pages = {15-30},
}
@misc{ moeller00mixmaster,
author = {Moeller, Ulf and Cottrell, Lance},
month = jan,
year = 2003,
title = {Mixmaster Protocol: Version 2},
howpublished = {\url{http://freehaven.net/anonbib/cache/mixmaster-spec.txt}}
}
@inproceedings{moniz06randomized,
author = {Moniz, Henrique and Neves, Nuno Ferreira and Correia, Miguel and Verissimo, Paulo},
title = {\href{https://www.gsd.inesc-id.pt/~mpc/pubs/hmoniz-randomized.pdf}{Randomized Intrusion-Tolerant Asynchronous Services}},
year = {2006},
booktitle = {Proceedings of the International Conference on Dependable Systems and Networks},
pages = {568--577},
series = {DSN 06}
}
@inproceedings{ mont03hp,
author = {Marco Casassa Mont and Keith Harrison and Martin Sadler},
title = {The {HP} Time Vault Service: Exploiting {IBE}
for Timed Release of Confidential Information},
booktitle = {\bibconf[12th]{WWW}{International World Wide Web Conference}},
month = may,
year = 2003,
}
@misc{ moore13unplug,
author = {{HD} Moore},
month = jan,
year = 2013,
title = {Whitepaper: Security Flaws in Universal Plug and Play: Unplug, Don't Play},
howpublished = {\url{https://community.rapid7.com/docs/DOC-2150}},
}
@inproceedings{morenosanchezk15privacy,
author = {Pedro Moreno{-}Sanchez and
Aniket Kate and
Matteo Maffei and
Kim Pecina},
title = {Privacy Preserving Payments in Credit Networks:
{E}nabling trust with privacy in online marketplaces},
booktitle = {\bibconf[22th]{NDSS}{Annual Network and Distributed System
Security Symposium}},
location = {San Diego, CA},
month = feb,
year = 2015
}
@article{ morris14inside,
author = {David Z. Morris},
title = {\href{http://fortune.com/2014/04/09/inside-the-world-of-national-cryptocurrencies/}{Inside the world of national cryptocurrencies}},
journal = {Fortune},
month = apr,
year = 2014,
}
@techreport{ moshchuk12content,
author = {Alexander Moshchuk and Helen J. Wang and Yunxin Liu},
title = {Content-Based Isolation:
Rethinking Isolation Policy in Modern Client Systems},
number = {MSR-TR-2012-82},
month = aug,
year = 2012,
institution = {Microsoft Research},
}
@article{movahedi14broadcast,
author = {Mahnush Movahedi and
Jared Saia and
Mahdi Zamani},
title = {Secure Anonymous Broadcast},
journal = {CoRR},
volume = {abs/1405.5326},
year = {2014},
url = {http://arxiv.org/abs/1405.5326},
}
@inproceedings{ murdoch07sampled,
author = {Murdoch, Steven J. and Zieli\'{n}ski, Piotr},
title = {Sampled Traffic Analysis by {Internet}-Exchange-Level Adversaries},
booktitle = {\bibconf[7th]{PETS}{Privacy Enhancing Technologies Symposium}},
year = {2007},
}
%N
@misc{ nakamoto08bitcoin,
author = {Satoshi Nakamoto},
title = {\href{https://bitcoin.org/bitcoin.pdf}{Bitcoin: A Peer-to-Peer Electronic Cash System}},
year = 2008,
}
month = oct,
@INPROCEEDINGS{naor02deniable,
author = {Moni Naor},
title = {Deniable Ring Authentication},
booktitle = {\bibconf['02]{CRYPTO}{Advances in Cryptology}},
year = {2002},
}
@inproceedings{narayanan11location,
title={Location privacy via private proximity testing},
author={Narayanan, Arvind and Thiagarajan, Narendran and Lakhani, Mugdha and Hamburg, Michael and Boneh, Dan},
booktitle={Proc. of NDSS},
volume={2011},
year={2011}
}
@inproceedings{narayanan08robust,
author = {Arvind Narayanan and
Vitaly Shmatikov},
title = {Robust de-anonymization of large sparse datasets},
booktitle = {\bibconf[29th]{IEEE S{\&}P}{IEEE Symposium on Security and
Privacy}},
month = may,
year = 2008,
location = {Oakland, CA}
}
@inproceedings{narayanan12feasibility,
author = {Arvind Narayanan and
Hristo S. Paskov and
Neil Zhenqiang Gong and
John Bethencourt and
Emil Stefanov and
Eui Chul Richard Shin and
Dawn Song},
title = {On the feasibility on {I}nternet-scale author identification},
booktitle = {\bibconf{S{\&}P}{IEEE Symposium on Security and
Privacy}},
month = may,
year = 2012,
location = {San Francisco, CA}
}
@inproceedings{narayanan10socialkeys,
title={{SocialKeys}: Transparent Cryptography via Key Distribution over Social Networks},
booktitle={IAB Workshop on Internet Privacy},
year={2010},
author={Narayanan, Arvind},
}
@inproceedings{ narula18zkledger,
author = {Neha Narula and Willy Vasquez and Madars Virza},
title = {\href{https://www.usenix.org/conference/nsdi18/presentation/narula}{{zkLedger}: Privacy-Preserving Auditing for Distributed Ledgers}},
booktitle = {15th USENIX Symposium on Networked Systems Design and Implementation (NSDI)},
month = apr,
year = 2018,
url = {https://www.usenix.org/conference/nsdi18/presentation/narula},
}
@inproceedings{nayak15stubborn,
title={\href{http://eprint.iacr.org/2015/796.pdf}{Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack}},
booktitle={1st IEEE European Symposium on Security and Privacy},
author={Nayak, Kartik and Kumar, Srijan and Miller, Andrew and Shi, Elaine},
month = mar,
year={2015},
url={http://eprint.iacr.org/2015/796.pdf},
}
@inproceedings{neisse2017blockchain,
title={\href{https://scholar.googleusercontent.com/scholar.bib?q=info:kywG5E9XAn4J:scholar.google.com/&output=citation&scisig=AAGBfm0AAAAAWvLF7wUSaMoQQGWDZfAxB_86sCVMGCJ5&scisf=4&ct=citation&cd=-1&hl=en}{A Blockchain-based Approach for Data Accountability and Provenance Tracking}},
author={Neisse, Ricardo and Steri, Gary and Nai-Fovino, Igor},
booktitle={Proceedings of the 12th International Conference on Availability, Reliability and Security},
pages={14},
year={2017},
organization={ACM}
}
@article{nguyen06verifiable,
author = {Lan Nguyen and
Reihaneh Safavi{-}Naini and
Kaoru Kurosawa},
title = {Verifiable shuffles: a formal model and a {P}aillier-based
three-round construction with provable security},
journal = {Int. J. Inf. Sec.},
volume = {5},
number = {4},
pages = {241--255},
year = 2006
}
@inproceedings {nikitin17chainiac,
author = {Kirill Nikitin and Eleftherios Kokoris-Kogias and Philipp Jovanovic and Nicolas Gailly and Linus Gasser and Ismail Khoffi and Justin Cappos and Bryan Ford},
title = {\href{https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/nikitin}{{CHAINIAC}: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds}},
booktitle = {26th {USENIX} Security Symposium},
year = {2017},
pages = {1271--1287}
}
@article{ nikitin19reducing,
author = {Kirill Nikitin and Ludovic Barman and Wouter Lueks and
Matthew Underwood and Jean-Pierre Hubaux and Bryan Ford},
title = {\href{https://content.sciendo.com/view/journals/popets/2019/4/article-p6.xml}{Reducing Metadata Leakage from Encrypted Files and Communication with {PURBs}}},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = 2019,
number = 4,
month = jul,
year = 2019
}
% obsoleted by NISTIR 8213
@misc{nist-beacon,
author={{National Institute of Standards and Technology}},
title = {\href{https://csrc.nist.gov/Projects/Interoperable-Randomness-Beacons}{Interoperable Randomness Beacons}},
year={2017},
}
@misc{ nist09fips186,
author = {{National Institute of Standards and Technology}},
title = {{FIPS PUB 186-3: Digital Signature Standard (DSS)}},
year = {2009}
}
@misc{ nist12recommendation,
author = {{National Institute of Standards and Technology}},
title = {{Special Publication 800-57: Recommendation for Key Management}},
year = {2012}
}
@inbook{nist15security,
title = {\href{http://nvlpubs.nist.gov/nistpubs/ir/2015/NIST.IR.7966.pdf}{Security of Interactive and automated Access
Management Using Secure Shell (SSH)}},
chapter = "5.1.2",
author={{NIST}},
year={2015},
}
@techreport{ nist19reference,
author = {John Kelsey and Lu\'is T. A. N. Brand\~ao and Rene Peralta
and Harold Booth},
title = {\href{https://csrc.nist.gov/publications/detail/nistir/8213/draft}{A Reference for Randomness Beacons: Format and Protocol Version 2}},
month = may,
year = 2019,
institution = {{National Institute of Standards and Technology}},
number = {NISTIR 8213 (DRAFT)}
}
@misc{ nordberg15gossiping,
author = {L. Nordberg and D. Gillmor and T. Ritter},
title = {\href{https://tools.ietf.org/html/draft-linus-trans-gossip-ct-02}{Gossiping in CT}},
howpublished = {Internet-Draft draft-linus-trans-gossip-ct-02},
month = jul,
year = 2015,
}
@misc{ nullbyte14hack,
author = {{Null Byte}},
title = {\href{http://null-byte.wonderhowto.com/how-to/hack-like-pro-hijack-software-updates-install-rootkit-for-backdoor-access-0149225/}{Hack Like a Pro: How to Hijack Software Updates to Install a Rootkit for Backdoor Access}},
howpublished = {WonderHowTo},
year = 2014,
}
%O
@misc{ ocean18data,
author = {{Ocean Protocol Foundation}},
title = {\href{https://oceanprotocol.com/#papers}{Ocean Protocol: A Decentralized Substrate for AI Data \& Services}},
month = may,
year = 2018,
}
@article{okamoto99multi,
title={Multi-signature schemes secure against active insider attacks},
author={Ohta, Kazuo and Okamoto, Tatsuaki},
journal={IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences},
month=jan,
year={1999},
}
@inproceedings{oluwasanmi:2012:beacon,
author = {Oluwasanmi, Olumuyiwa and Saia, Jared},
title = {{Scalable Byzantine Agreement with a Random Beacon}},
booktitle = {Stabilization, Safety, and Security of Distributed Systems},
volume = {7596},
series = {Lecture Notes in Computer Science},
editor = {Richa, Andr\'{e}a W. and Scheideler, Christian},
publisher = {Springer Berlin Heidelberg},
pages = {253-265},
year = {2012},
isbn = {978-3-642-33535-8},
doi = {10.1007/978-3-642-33536-5_25},
url = {http://dx.doi.org/10.1007/978-3-642-33536-5_25},
}
@misc{oraclize,
title = {\href{http://www.oraclize.it/}{Oraclize - blockchain oracle
service, enabling data-rich smart contracts}},
}
@inproceedings{oswald05sidechannel,
author = {Elisabeth Oswald and
Stefan Mangard and
Norbert Pramstaller and
Vincent Rijmen},
title = {A side-channel analysis resistant description of the {AES}
{S-Box}},
booktitle = {\bibconf{FSE}{Fast Software Encryption Workshop}},
location = {Paris, France},
month = feb,
year = 2005
}
@article{ouaddah2016fairaccess,
title={FairAccess: a new Blockchain-based access control framework for the Internet of Things},
author={Ouaddah, Aafaf and Abou Elkalam, Anas and Ait Ouahman, Abdellah},
journal={Security and Communication Networks},
volume={9},
number={18},
pages={5943--5964},
year={2016},
publisher={Wiley Online Library}
}
%P
@techreport{pagnia99impossibility,
title={\href{https://pdfs.semanticscholar.org/208b/22c7a094ada20736593afcc8c759c7d1b79c.pdf}{On the impossibility of fair exchange without a trusted third party}},
author={Pagnia, Henning and G{\"a}rtner, Felix C},
year={1999},
institution={Technical Report TUD-BS-1999-02, Darmstadt University of Technology, Department of Computer Science, Darmstadt, Germany}
}
@inproceedings{paillier99public,
author = {Pascal Paillier},
title = {Public-{K}ey Cryptosystems Based on Composite
Degree Residuosity Classes},
booktitle = {\bibconf{EUROCRYPT}{Advances in Cryptology}},
month = may,
year = 1999
}
@inproceedings{ palomar06p2p,
author={Palomar, E. and Estevez-Tapiador, J.M. and Hernandez-Castro, J.C.
and Ribagorda, A.},
title={\href{http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1698436}
{A Protocol for Secure Content Distribution in Pure P2P Networks}},
booktitle={Proceeding of the 17th International Conference on Database and
Expert Systems Applications},
year={2006}
}
@incollection{ pan08liveness,
author = {Gang Pan and Zhaohui Wu and Lin Sun},
title = {\href{https://www.intechopen.com/books/recent_advances_in_face_recognition/liveness_detection_for_face_recognition/}{Liveness Detection for Face Recognition}},
booktitle = {Recent Advances in Face Recognition},
publisher = {IntechOpen},
month = dec,
year = 2008,
}
@inproceedings{ pang07fingerprinting,
author = {Pang, Jeffrey and Greenstein, Ben and Gummadi, Ramakrishna and Seshan, Srinivasan and Wetherall, David},
title = {802.11 user fingerprinting},
booktitle = {ACM International Conference on Mobile Computing and Networking (MobiCom)},
year = {2007},
pages = {99--110},
}
@article{parity2017alert,
author = {},
title = {\href{https://paritytech.io/security-alert-2/}{Parity Wallet Security Alert}},
year={2017}
}
@misc{ park18spacemint,
author = {Sunoo Park and Albert Kwon and Georg Fuchsbauer
and Peter Ga\v{z}i and Jo\"el Alwen
and Krzysztof Pietrzak},
title = {\href{https://fc18.ifca.ai/preproceedings/78.pdf}{SpaceMint: A Cryptocurrency Based on Proofs of Space}},
booktitle = {Financial Cryptography and Data Security},
month = feb,
year = 2018,
url = {https://fc18.ifca.ai/preproceedings/78.pdf},
}
% obsoleted by pass17hybrid
@misc{pass16hybrid,
author = {Rafael Pass and Elaine Shi},
title = {\href{http://eprint.iacr.org/2016/917}{Hybrid Consensus: Efficient Consensus in the Permissionless Model}},
howpublished = {Cryptology ePrint Archive, Report 2016/917},
year = {2016},
}
@article{pass16analysis,
title={\href{https://eprint.iacr.org/2016/454.pdf}{Analysis of the Blockchain Protocol in Asynchronous Networks}},
author={Pass, Rafael and Tech, Cornell and Seeman, Lior},
journal={Annual International Conference on the Theory and Applications of Cryptographic Techniques ({EUROCRYPT})},
year={2017},
organization={Springer}
}
@inproceedings{ pass17hybrid,
author = {Rafael Pass and Elaine Shi},
title = {\href{http://drops.dagstuhl.de/opus/volltexte/2017/8004/}{Hybrid Consensus: Efficient Consensus in the Permissionless Model}},
booktitle = {\bibconf[31st]{DISC}{International Symposium on Distributed Computing}},
month = oct,
year = {2017},
location = {Vienna, Austria},
}
@inproceedings{ pass17fruitchains,
author = {Rafael Pass and Elaine Shi},
title = {\href{https://dl.acm.org/citation.cfm?id=3087809}{FruitChains: A Fair Blockchain}},
booktitle = {\bibconf{PODC}{ACM Symposium on Principles of Distributed Computing}},
month = jul,
year = 2017,
location = {Washington, DC, USA},
}
@incollection{pass03deniability,
title={On deniability in the common reference string and random oracle model},
author={Pass, Rafael},
booktitle={Advances in Cryptology-CRYPTO 2003},
pages={316--337},
year={2003},
publisher={Springer}
}
@inproceedings{pavlov04supporting,
author = {Elan Pavlov and
Jeffrey S. Rosenschein and
Zvi Topol},
title = {Supporting privacy in decentralized additive reputation
systems},
booktitle = {\bibconf[2nd]{iTrust}{Trust Management}},
location = {Oxford, UK},
month = mar,
year = 2004
}
@inproceedings{pedersen1991non,
title={Non-interactive and information-theoretic secure verifiable secret sharing.},
author={Pedersen, Torben P and others},
organization={Springer}
}
@inproceedings{peng06secrecy,
author = {Pai Peng and
Peng Ning and
Douglas S. Reeves},
title = {On the secrecy of timing-based active watermarking trace-back
techniques},
booktitle = {\bibconf{S{\&}P}{IEEE Symposium on Security and Privacy}},
location = {Berkeley, CA},
month = may,
year = 2006
}
@inproceedings{peng06ciphertext,
author = {Kun Peng and
Colin Boyd and
Ed Dawson and
Byoungcheon Lee},
title = {Ciphertext comparison, a new solution
to millionaire problem},
booktitle = {\bibconf[7th]{ICICS}{Information and Communications Security}},
location = {Beijing, China},
month = dec,
year = 2005
}
@article{ peralta92distribution,
author = {Ren\'e Peralta},
title = {On the Distribution of Quadratic Residues and Nonresidues Modulo a Prime Number},
journal = {Mathematics of Computation},
year = {1992},
pages = {443--440},
volume = {58},
number = {197},
}
@inproceedings{ petullo13minimalt,
author = {W. Michael Petullo and Xu Zhang and Jon A. Solworth
and Daniel J. Bernstein and Tanja Lange},
title = {\href{http://cr.yp.to/tcpip/minimalt-20130522.pdf}{MinimaLT: Minimal-latency Networking Through Better Security}},
booktitle = {ACM CCS},
month = nov,
year = 2013,
}
@inproceedings{pfitzmann91isdn,
title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}},
author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner},
booktitle = {GI/ITG Conference on Communication in Distributed Systems},
year = {1991},
month = {February},
}
@inproceedings{pfitzmann01anonymity,
title={Anonymity, unobservability, and pseudonymity? proposal for terminology},
author={Pfitzmann, Andreas and K{\"o}hntopp, Marit},
booktitle={Designing privacy enhancing technologies},
pages={1--9},
year={2001},
organization={Springer}
}
@misc{ pfitzmann10terminology,
title = {A terminology for talking about privacy by data minimization:
Anonymity, Unlinkability, Undetectability, Unobservability,
Pseudonymity, and Identity Management},
author = {Andreas Pfitzmann and Marit Hansen},
month = aug,
year = 2010,
}
@article{pilkington15blockchain,
title={\href{https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2662660}{Blockchain Technology: Principles and Applications}},
author={Pilkington, Marc},
journal={Research Handbook on Digital Transformation},
year={2015}
}
@misc{poa,
title={\href{https://poa.network/}{POA Network}},
}
@inproceedings{poddebniak18efail,
author = {Damian Poddebniak and Christian Dresen and Jens Müller and
Fabian Ising and Sebastian Schinzel and Simon Friedberger and Juraj
Somorovsky and Jörg Schwenk},
title = {\href{https://efail.de/efail-attack-paper.pdf}{Efail: Breaking
S/MIME and OpenPGP Email Encryption using Exfiltration Channels}},
booktitle = {{USENIX} Security Symposium},
year = {2018}
}
@article{pohlig78improved,
author = {Stephen C. Pohlig and
Martin E. Hellman},
title = {An improved algorithm for computing logarithms over
{GF(p)} and its cryptographic significance ({C}orresp.)},
journal = {IEEE Transactions on Information Theory},
volume = {24},
number = {1},
year = {1978},
pages = {106-110}
}
@misc{popov16rnd,
author = {Serguei Popov},
title = {\href{http://eprint.iacr.org/2016/228}{On a decentralized trustless pseudo-random number generation algorithm}},
howpublished = {Cryptology ePrint Archive, Report 2016/228},
year = {2016},
}
@misc{ popov18tangle,
author = {Serguei Popov},
title = {\href{https://www.iota.org/research/academic-papers}{The Tangle}},
month = apr,
year = 2018,
}
@article{ porup15how,
author = {J.M. Porup},
title = {\href{http://motherboard.vice.com/read/how-debian-is-trying-to-shut-down-the-cia-and-make-software-trustworthy-again}{How Debian Is Trying to Shut Down the CIA and Make Software Trustworthy Again}},
journal = {Motherboard},
month = sep,
day = 7,
year = 2015,
}
@article{ poulsen13feds,
author = {Kevin Poulsen},
title = {Feds Are Suspects in New Malware That Attacks {Tor} Anonymity},
journal = {Wired},
month = aug # "~5,",
year = 2013,
url = {http://www.wired.com/threatlevel/2013/08/freedom-hosting/},
}
@misc{ provable,
title = {\href{https://provable.xyz/}{Provable - Oraclize 2.0 -
blockchain oracle service, enabling data-rich smart contracts}},
}
@article{ psiaki16gnss,
author = {Mark L. Psiaki and Todd E. Humphreys},
title = {\href{https://ieeexplore.ieee.org/document/7445815}{GNSS Spoofing and Detection}},
journal = {Proceedings of the IEEE},
volume = 104,
number = 6,
month = apr,
year = 2016,
}
%Q
%R
@article{ rabin80probabilistic,
title={Probabilistic algorithm for testing primality},
author={Rabin, Michael O},
journal={Journal of number theory},
volume={12},
number={1},
pages={128--138},
year={1980},
publisher={Elsevier}
}
@article{rabin83beacons,
title = {Transaction {{Protection}} by {{Beacons}}},
author = {{Rabin}, Michael O.},
volume = {27},
number = {2},
journal = {Journal of Computer and System Sciences},
year = {1983},
pages = {256--267},
doi = {10.1016/0022-0000(83)90042-9},
}
@inproceedings{ rabin98simplified,
author = {Tal Rabin},
title = {\href{https://doi.org/10.1007/BFb0055722}{A Simplified Approach to Threshold and Proactive {RSA}}},
booktitle = {\bibconf{CRYPTO}{Advances in Cryptology}},
month = aug,
year = 1998,
}
@inproceedings{ rackoff91noninteractive,
year={1991},
booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}},
title={Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack},
author={Rackoff, Charles and Simon, Daniel R.},
pages={433-444},
}
@article{raisaro19medco,
title = {MedCo: Enabling Secure and Privacy-Preserving Exploration of Distributed Clinical and Genomic Data},
author = {Raisaro, Jean Louis and Troncoso-Pastoriza, Juan Ramón and Misbach, Mickaël and Gomes de Sá E Sousa, Joao André and Pradervand, Sylvain and Missiaglia, Edoardo and Michielin, Olivier and Ford, Bryan Alexander and Hubaux, Jean-Pierre},
journal = {IEEE/ACM Transactions on Computational Biology and Bioinformatics},
number = {4},
volume = {16},
pages = {1328-1341},
year = {2019},
abstract = {The increasing number of health-data breaches is creating a complicated environment for medical-data sharing and, consequently, for medical progress. Therefore, the development of new solutions that can reassure clinical sites by enabling privacy-preserving sharing of sensitive medical data in compliance with stringent regulations (e.g., HIPAA, GDPR) is now more urgent than ever. In this work, we introduce MedCo, the first operational system that enables a group of clinical sites to federate and collectively protect their data in order to share them with external investigators without worrying about security and privacy concerns. MedCo uses (a) collective homomorphic encryption to provide trust decentralization and end-to-end confidentiality protection, and (b) obfuscation techniques to achieve formal notions of privacy, such as differential privacy. A critical feature of MedCo is that it is fully integrated within the i2b2 (Informatics for Integrating Biology and the Bedside) framework, currently used in more than 300 hospitals worldwide. Therefore, it is easily adoptable by clinical sites. We demonstrate MedCos practicality by testing it on data from The Cancer Genome Atlas in a simulated network of three institutions. Its performance is comparable to the ones of SHRINE (networked i2b2), which, in contrast, does not provide any data protection guarantee.},
url = {http://infoscience.epfl.ch/record/256348},
doi = {10.1109/TCBB.2018.2854776},
}
@article{rajabi18verifiable,
title={\href{https://www.sciencedirect.com/science/article/pii/S0020025516316152}{A Verifiable Threshold Secret Sharing Scheme Based On Lattices}},
author={Rajabi, Bahman and Eslami, Ziba},
journal={Information Sciences},
year={2018},
publisher={Elsevier}
}
@inproceedings{ ramasamy06parsimonious,
author = {HariGovind V. Ramasamy and Christian Cachin},
title = {Parsimonious Asynchronous {Byzantine}-Fault-Tolerant
Atomic Broadcast},
booktitle = {9th International Conference on Principles of Distributed Systems (OPODIS)},
month = dec,
year = 2005,
url = {https://www.zurich.ibm.com/~cca/papers/oabc.pdf},
}
@inproceedings{raymond00traffic,
author = {Jean-Fran\c{c}ois Raymond},
title = {Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems},
booktitle = {Workshop on Design Issues in Anonymity and Unobservability},
year = {2000},
}
@misc{randao18,
author = {randao.org},
title = {\href{https://www.randao.org}{Randao: Blockchain Based Verifiable Random Number Generator}},
year = {2018},
}
@inproceedings{reardon13sok,
title={Sok: Secure data deletion},
author={Reardon, Joel and Basin, David and Capkun, Srdjan},
booktitle={Security and Privacy (SP), 2013 IEEE Symposium on},
pages={301--315},
year={2013},
organization={IEEE}
}
@inproceedings{ reiter94secure,
author = {Michael K. Reiter},
title = {\href{https://dl.acm.org/citation.cfm?id=191194}{Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart}},
booktitle = {\bibconf[2nd]{CCS}{Computer and Communications Security}},
year = 1994,
}
% month = nov,
% location = {Fairfax, Virginia, USA},
@misc{ reitman13securedrop,
title = {Freedom of the Press Foundation Launches {SecureDrop},
an Open-Source Submission Platform for Whistleblowers},
author = {Rainey Reitman},
publisher = {Freedom of the Press Foundation},
month = oct,
day = 15,
year = 2013,
note = {\url{https://pressfreedomfoundation.org/blog/2013/10/freedom-press-foundation-launches-securedrop}}
}
@article{reutov2018ethereumprngs,
author = {Arseny Reutov},
title = {\href{https://blog.positive.com/predicting-random-numbers-in-ethereum-smart-contracts-e5358c6b8620}{Predicting Random Numbers in Ethereum Smart Contracts}},
year={2018}
}
@article{risen13nsa,
author = {Risen, James and Poitras, Laura},
title = {{NSA} Report Outlined Goals for More Power},
journal = {The New York Times},
month = Nov # {~22,},
year = {2013}
}
@inproceedings{ ristenpart10good,
title = {When good randomness goes bad:
Virtual machine reset vulnerabilities and hedging deployed cryptography},
author = {Ristenpart, Thomas and Yilek, Scott},
booktitle = {Network and Distributed System Security Symposium},
year = {2010},
}
@techreport{rivest96time,
author = {Ronald L. Rivest and Adi Shamir and David A. Wagner},
title={\href{https://dl.acm.org/citation.cfm?id=888615}{Time-lock puzzles and timed-release crypto}},
month=mar,
year={1996},
publisher={Massachusetts Institute of Technology},
address = {Cambridge, MA, USA},
}
@article{rivest78rsa,
title={A method for obtaining digital signatures and public-key cryptosystems},
author={Rivest, Ronald L and Shamir, Adi and Adleman, Len},
journal={Communications of the ACM},
year={1978},
}
@inproceedings{rivest06how,
author = {Ronald Rivest and
Adi Shamir and
Yael Tauman},
title = {How to Leak a Secret: Theory and Applications of Ring Signatures},
booktitle = {Essays in Memory of Shimon Even},
year = {2006},
pages = {164-186},
ee = {http://dx.doi.org/10.1007/11685654_7},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{rogaway02authenticated,
title={Authenticated-encryption with associated-data},
author={Rogaway, Phillip},
booktitle={Proceedings of the 9th ACM conference on Computer and communications security},
pages={98--107},
year={2002}
}
@inproceedings{ roesner12user,
author = {Franziska Roesner and Tadayoshi Kohno and
Alexander Moshchuk and Bryan Parno and Helen J. Wang and
Crispin Cowan},
title = {User-Driven Access Control:
Rethinking Permission Granting in Modern Operating Systems},
booktitle = {IEEE Symposium on Security and Privacy},
month = may,
year = 2012,
location = {San Francisco, CA},
}
@incollection{ roosta07time,
author = {Tanya Roosta and Mike Manzo and Shankar Sastry},
title = {\href{https://link.springer.com/chapter/10.1007%2F978-0-387-46276-9_14}{Time Synchronization Attacks in Sensor Networks}},
booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks},
editor = {Radha Poovendran and Cliff Wang and Sumit Roy},
publisher = {Springer},
year = 2007,
pages = {325-345},
}
@inproceedings{ roth13secure,
title={A Secure Submission System for Online Whistleblowing Platforms},
author={Roth, Volker and G{\"u}ldenring, Benjamin and
Rieffel, Eleanor and Dietrich, Sven and Ries, Lars},
year = 2013,
month = apr,
booktitle = {\bibconf[17th]{FC}{Financial Cryptography and Data Security}}
}
@article{rosenblatt15superfish,
author = {Seth Rosenblatt},
title = {\href{http://www.cnet.com/news/superfish-torments-lenovo-owners-with-more-than-adware/}{Lenovo's Superfish security snafu blows up in its face}},
journal = {CNET},
month = february,
year = 2015,
day = 20,
}
@inproceedings{ruffing14coinshuffle,
author = {Tim Ruffing and Pedro Moreno{-}Sanchez and
Aniket Kate},
title = {\href{https://petsymposium.org/2014/papers/Ruffing.pdf}{{CoinShuffle}: {P}ractical Decentralized Coin Mixing for {Bitcoin}}},
booktitle = {Privacy Enhancing Technologies Symposium (PETS)},
month = jul,
year = 2014,
location = {Amsterdam, Netherlands},
url = {https://petsymposium.org/2014/papers/Ruffing.pdf},
}
@inproceedings{ ryan14enhanced,
author = {Mark D. Ryan},
title = {Enhanced Certificate Transparency and
End-to-end Encrypted Mail},
booktitle = {\bibconf{NDSS}{Network and Distributed System
Security Symposium}},
month = feb,
year = 2014,
}
@article{ ryge16most,
author = {Leif Ryge},
title = {\href{http://arstechnica.com/security/2016/02/most-software-already-has-a-golden-key-backdoor-its-called-auto-update/}{Most software already has a ``golden key'' backdoor: the system update}},
journal = {arstechnica},
month = feb,
year = 2016,
}
%S
%FC 2016 citation pending
@misc{safeTSA,
key={Safe creative TSA},
title = {Safe {C}reative {T}imestamping {A}uthority {(TSA)} server},
howpublished = {\url{http://tsa.safecreative.org/}}
}
@misc{saia:2014:scalable-mpc,
author = {Jared Saia and Mahdi Zamani},
title = {\href{http://eprint.iacr.org/2014/872}{Recent Results in Scalable Multi-Party Computation}},
howpublished = {Cryptology ePrint Archive, Report 2014/872},
year = {2014},
}
@inproceedings{ samuel10survivable,
author = {Justin Samuel and Nick Mathewson and Justin Cappos
and Roger Dingledine},
title = {\href{http://justinsamuel.com/papers/survivable-key-compromise-ccs2010.pdf}{Survivable Key Compromise in Software Update Systems}},
booktitle={\bibconf[17th]{CCS}{ACM Conference on
Computer and Communications security}},
month = oct,
year = 2010,
location = {Chicago, IL},
}
@inproceedings{ sandler07casting,
author = {Daniel Sandler and Dan S. Wallach},
title = {Casting Votes in the {Auditorium}},
booktitle = {\bibconf{EVT}{USENIX/ACCURATE Electronic
Voting Technology Workshop}},
month = aug,
year = 2007,
location = {Boston, MA},
}
@inproceedings{sapirshtein15optimal,
title={Optimal Selfish Mining Strategies in {Bitcoin}},
author={Sapirshtein, Ayelet and Sompolinsky, Yonatan and Zohar, Aviv},
booktitle={Financial Cryptography and Data Security},
month=feb,
year={2016},
url={http://fc16.ifca.ai/preproceedings/30_Sapirshtein.pdf},
}
@inproceedings{sasson2014zerocash,
title={\href{https://ieeexplore.ieee.org/abstract/document/6956581/}{Zerocash: Decentralized anonymous payments from {B}itcoin}},
author={Sasson, Eli Ben and Chiesa, Alessandro and Garman, Christina and Green, Matthew and Miers, Ian and Tromer, Eran and Virza, Madars},
booktitle={Security and Privacy (SP), 2014 IEEE Symposium on},
pages={459--474},
year={2014},
organization={IEEE}
}
@inproceedings{schechter99auth,
author = {Schechter, Stuart and Parnell, Todd and Hartemink, Alexander},
title = {Anonymous Authentication of Membership in Dynamic Groups},
booktitle = {Proceedings of the Third International Conference on Financial Cryptography},
series = {FC '99},
year = {1999},
pages = {184--195},
publisher = {Springer-Verlag},
address = {London, UK, UK},
}
@inproceedings{schiffner11limits,
author = {Stefan Schiffner and
Andreas Pashalidis and
Elmar Tischhauser},
title = {On the limits of privacy in reputation systems},
booktitle = {\bibconf{WPES}{Workshop on Privacy in the Electronic Society}},
location = {Chicago, IL},
month = oct,
year = 2011
}
@article{schlichting83fail,
title={Fail-stop processors: an approach to designing fault-tolerant computing systems},
author={Schlichting, Richard D and Schneider, Fred B},
journal={ACM Transactions on Computer Systems (TOCS)},
volume={1},
number={3},
pages={222--238},
year={1983},
publisher={ACM New York, NY, USA}
}
% journal version: schneier99secure
@inproceedings{ schneier98cryptographic,
author = {Bruce Schneier and John Kelsey},
title = {Cryptographic Support for Secure Logs on Untrusted Machines},
booktitle = {7th USENIX Security Symposium},
month = jan,
year = 1998,
location = {San Antonio, Texas},
}
@article{ schneier99secure,
author = {Bruce Schneier and John Kelsey},
title = {Secure Audit Logs to Support Computer Forensics},
journal = {ACM Transactions on Information and System Security},
volume = 2,
number = 2,
year = 1999,
}
% month = may,
% pages = {159-176},
@article{ schneier13attacking,
author = {Bruce Schneier},
title = {Attacking {Tor}: how the {NSA} targets users' online anonymity},
journal = {The Guardian},
month = oct,
day = 4,
year = 2013,
}
@article{ schneier09tigers,
author = {Bruce Schneier},
title = {\href{https://www.theguardian.com/technology/2009/jan/08/identity-fraud-security-biometrics-schneier-id}{Tigers use scent, birds use calls -- biometrics are just animal instinct}},
journal = {The Guardian},
month = jan,
year = 2009,
}
@article{ schneier13nsa,
author = {Bruce Schneier},
title = {NSA surveillance: A guide to staying secure},
journal = {The Guardian},
month = sep,
day = 6,
year = 2013,
}
@article{schneier13offensive,
author = {Bruce Schneier},
title = {\href{https://www.schneier.com/blog/archives/2013/06/us_offensive_cy.html}{US Offensive Cyberwar Policy}},
journal = {Schneier on Security},
month = jun,
year = 2013,
day = 21,
}
@article{ schnorr91efficient,
title = {\href{https://www.researchgate.net/profile/Claus_Schnorr/publication/227088517_Efficient_signature_generation_by_smart_cards/links/0046353849579ce09c000000.pdf}{Efficient signature generation by smart cards}},
author = {Schnorr, Claus P.},
journal = {Journal of Cryptology},
volume = {4},
number = {3},
pages = {161--174},
year = {1991},
publisher = {Springer},
url = {https://www.researchgate.net/profile/Claus_Schnorr/publication/227088517_Efficient_signature_generation_by_smart_cards/links/0046353849579ce09c000000.pdf},
}
@inproceedings{ schoenmakers99simple,
title = {\href{https://link.springer.com/chapter/10.1007/3-540-48405-1_10}{A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting}},
author = {Schoenmakers, Berry},
booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}},
pages = {784--784},
month = aug,
year = {1999},
}
@article{ schryen09security,
author = {Guido Schryen and Eliot Rich},
title = {\href{https://ieeexplore.ieee.org/document/5272405}{Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland}},
journal = {IEEE Transactions on Information Forensics and Security},
volume = 4,
number = 4,
month = dec,
year = 2009,
pages = {729-744},
}
@article{schwartz14ripple,
title={\href{https://ripple.com/files/ripple_consensus_whitepaper.pdf}{The Ripple protocol consensus algorithm}},
author={Schwartz, David and Youngs, Noah and Britto, Arthur},
journal={Ripple Labs Inc White Paper},
pages={5},
year={2014}
}
@misc{secbit18fomo3d,
author = {SECBIT},
title = {\href{https://medium.com/coinmonks/how-the-winner-got-fomo3d-prize-a-detailed-explanation-b30a69b7813f}{How the winner got Fomo3D prize - A Detailed Explanation}},
month = aug,
year = 2018,
}
@misc{ sedgwick08charlie,
year={2008},
month = {May},
howpublished = {\url{http://www.bostonmagazine.com/articles/2008/04/the-shaggy-god/}},
author = {John Sedgwick},
title = {The Shaggy God},
}
@inproceedings{ segal14catching,
author = {Aaron Segal and Bryan Ford and Joan Feigenbaum},
title = {Catching Bandits and Only Bandits:
Privacy-Preserving Intersection Warrants
for Lawful Surveillance},
booktitle = {4th USENIX Workshop on Free and Open Communications
on the Internet (FOCI'14)},
month = aug,
year = 2014,
}
@inproceedings{ segal16privacy,
author = {Aaron Segal and Joan Feigenbaum and Bryan Ford},
title = {\href{https://dedis.cs.yale.edu/dissent/papers/wpes16-chaining-abs/}{Privacy-Preserving Lawful Contact Chaining}},
booktitle = {\bibconf{WPES}{Workshop on Privacy in the Electronic Society}},
month = oct,
year = 2016,
}
@article{seres18evoting,
author = {István András Seres},
title = {\href{https://medium.com/coinmonks/implementing-an-e-voting-protocol-with-blind-signatures-on-ethereum-411e88af044a}{Implementing an e-voting protocol with blind signatures on Ethereum}},
year={2018}
}
@article{sermersheim06lightweight,
title={Lightweight directory access protocol (LDAP): The protocol},
author={Sermersheim, Jim},
year={2006}
}
@article{serjantov05passive,
year={2005},
journal={International Journal of Information Security},
title={Passive-attack analysis for connection-based anonymity systems},
author={Serjantov, Andrei and Sewell, Peter},
pages={172-180},
}
@inproceedings{serjantov02metric,
author = {Serjantov, Andrei and Danezis, George},
title = {Towards an information theoretic metric for anonymity},
booktitle = {Proceedings of the 2nd international conference on Privacy enhancing technologies},
series = {PET'02},
year = {2003},
}
@inproceedings{ sethi18security,
author = {Tegjyot Singh Sethi and Mehmed Kantardzic and Joung Woo Ryu},
title = {\href{https://www.springerprofessional.de/en/security-theater-on-the-vulnerability-of-classifiers-to-explorat/12276254}{`Security Theater': On the Vulnerability of Classifiers to Exploratory Attacks}},
booktitle = {\bibconf[12th]{PAISI}{Pacific Asia Workshop on Intelligence and Security Informatics}},
month = may,
year = 2017,
location = {Jeju Island, South Korea},
}
@inproceedings{ setty12taking,
title={Taking proof-based verified computation a few steps closer to practicality},
author={Setty, Srinath and Vu, Victor and Panpalia, Nikhil and Braun, Benjamin and Blumberg, Andrew J. and Walfish, Michael},
booktitle={USENIX Security Symposium},
year={2012}
}
@article{sfox19eth2,
author = {SFOX},
title = {\href{https://blog.sfox.com/ethereum-2-0-what-the-next-three-years-of-ethereum-will-look-like-b366a46f9704}{Ethereum 2.0: What the Next Three Years of Ethereum Will Look Like}},
year={2019}
}
@inproceedings{shafagh2017towards,
title={\href{https://dl.acm.org/citation.cfm?id=3140656}{Towards Blockchain-based Auditable Storage and Sharing of IoT Data}},
author={Shafagh, Hossein and Burkhalter, Lukas and Hithnawi, Anwar and
Duquennoy, Simon},
booktitle={Proceedings of the 2017 on Cloud Computing Security Workshop},
pages={45--50},
year={2017},
organization={ACM}
}
@article{shah08privacy,
author = {Mehul A. Shah and
Ram Swaminathan and
Mary Baker},
title = {Privacy-Preserving Audit and Extraction of
Digital Contents},
journal = {IACR Cryptology ePrint Archive},
volume = {2008},
year = {2008},
pages = {186}
}
% was incorrectly labeled shamir85ibe
@inproceedings{shamir84identity,
title = {\href{https://link.springer.com/chapter/10.1007/3-540-39568-7_5}{Identity-Based Cryptosystems and Signature Schemes}},
author = {Shamir, Adi},
booktitle = {\bibconf{CRYPTO}{Advances in Cryptology}},
month = aug,
year = 1984,
pages = {47-53},
}
@article{shamir79share,
author = {Adi Shamir},
title = {\href{https://cs.jhu.edu/~sdoshi/crypto/papers/shamirturing.pdf}{How to Share a Secret}},
journal = {Communications of the ACM},
volume = {22},
number = {11},
year = {1979},
pages = {612-613}
}
@inproceedings{shamir79mental,
title = {Mental Poker},
author = {Adi Shamir and
Ron Rivest and
Leonard Adleman},
booktitle = {{MIT} {R}eport, {LCS/TM}-125},
month = feb,
year = 1979
}
@inproceedings{shelat2011two,
author={shelat, abhi and Shen, Chih-Hao},
title={Two-output secure computation with malicious adversaries},
booktitle={International Conference on Theory and Applications of Cryptographic Techniques},
publisher={Springer},
month={March},
year={2011}
}
@article{shen11blind,
author = {Victor R. L. Shen and
Yu fang Chung and
Tzer Shyong Chen and
Yu An Lin},
title = {A blind signature based on discrete logarithm problem},
journal = {ICIC},
volume = 7,
number = 9,
month = sep,
year = 2011
}
@INPROCEEDINGS{sherwood02p5,
author={Sherwood, R. and Bhattacharjee, B. and Srinivasan, A.},
booktitle={Security and Privacy},
title={P5 : a protocol for scalable anonymous communication},
year={2002},
pages={58-70},
}
@inproceedings{ shmatikov06measuring,
author = {Vitaly Shmatikov and Ming-Hsiu Wang},
title = {Measuring Relationship Anonymity in Mix Networks},
booktitle = {WPES},
month = oct,
year = 2006,
location = {Alexandria, VA},
}
@inproceedings{ shmatikov06timing,
title={\href{https://www.cs.cornell.edu/~shmat/shmat_esorics06.pdf}{Timing analysis in low-latency mix networks: Attacks and defenses}},
author={Shmatikov, Vitaly and Wang, Ming-Hsiu},
booktitle={European Symposium on Research in Computer Security},
month = sep,
year={2006}
}
@article{shor99polynomial,
title={\href{https://epubs.siam.org/doi/10.1137/S0036144598347011}{Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer}},
author={Shor, Peter W},
journal={SIAM review},
volume={41},
number={2},
pages={303--332},
year={1999},
publisher={SIAM}
}
@article{shoup98securing,
title={\href{https://link.springer.com/chapter/10.1007/BFb0054113}{Securing threshold cryptosystems against chosen ciphertext attack}},
author={Shoup, Victor and Gennaro, Rosario},
journal={Advances in Cryptology --- EUROCRYPT'98},
pages={1--16},
year={1998},
publisher={Springer}
}
@inproceedings{ shue13street,
author = {Craig A. Shue and Nathanael Paul and Curtis R. Taylor},
title = {From an {IP} Address to a Street Address:
Using Wireless Signals to Locate a Target},
booktitle = {\bibbrev[7th]{WOOT}{USENIX Workshop
on Offensive Technologies}},
month = aug,
year = 2013,
}
@misc{shumow07dualec,
author = {Dan Shumow and Niels Ferguson},
title = {\href{http://rump2007.cr.yp.to/15-shumow.pdf}{On the Possibility of a Back Door in the NIST SP800-90 Dual EC PRNG}},
howpublished = {CRYPTO 2007 Rump Session},
year = {2007},
note = {\url{http://rump2007.cr.yp.to/15-shumow.pdf}}
}
@inproceedings{singh06eclipse,
author = {Atul Singh and Tseun Ngan and Peter Druschel and Dan Wallach},
title = {Eclipse Attacks on Overlay Networks: Threats and Defenses},
booktitle = {Proceedings of IEEE INFOCOM},
year = {2006},
month = {April},
address = {Barcelona, Spain}
}
@misc{simoens10pvdkg,
author = {Koen Simoens and Roel Peeters and Bart Preneel},
title = {{Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares}},
howpublished = {Cryptology ePrint Archive, Report 2010/207},
year = {2010},
note = {\url{http://eprint.iacr.org/2010/207}},
}
@misc{ sirer13introducing,
author = {Emin G\"un Sirer},
title = {\href{http://hackingdistributed.com/2013/06/20/virtual-notary-intro/}{Introducing Virtual Notary}},
month = jun,
year = 2013,
}
@inproceedings{ smith98secure,
author = {Geoffrey Smith and
Dennis M. Volpano},
title = {Secure information flow in a multi-threaded imperative language},
booktitle = {\bibconf[25th]{POPL}{Symposium on Principles of Programming
Languages}},
month = jan,
year = 1998,
}
@article{snow14factom,
title={Factom Business Processes Secured by Immutable Audit Trails on the Blockchain},
author={Snow, Paul and Deery, Brian and Lu, Jack and Johnston, David and Kirby, Peter},
journal={Whitepaper, Factom, November},
year={2014}
}
@article{ soghoian12petraeus,
title = {Surveillance and Security Lessons From the {Petraeus} Scandal},
author = {Soghoian, Chris},
journal = {ACLU Blog},
month = nov # "~13,",
year = {2012},
url = {http://www.aclu.org/blog/technology-and-liberty-national-security/surveillance-and-security-lessons-petraeus-scandal},
}
@inproceedings{ soghoian11certified,
author = {Soghoian, Christopher and Stamm, Sid},
title = {\href{https://s3.amazonaws.com/files.cloudprivacy.net/ssl-mitm.pdf}{Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL}},
booktitle = {Proceedings of the 15th International Conference on Financial Cryptography and Data Security},
series = {FC'11},
year = {2012},
numpages = {10},
publisher = {Springer-Verlag}
}
@article{soltani13new,
author={Soltani, Ashkan and Gellman, Barton},
title={\href{http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/new-documents-show-how-the-nsa-infers-relationships-based-on-mobile-location-data/}{New documents show how the {NSA} infers relationships based on mobile location data}},
journal = {The Washington Post},
year = 2013,
month = dec # {~10,},
}
@misc{sompolinsky13fastbitcoin,
author = {Yonatan Sompolinsky and Aviv Zohar},
title = {\href{http://eprint.iacr.org/2013/881}{Accelerating {Bitcoin}'s Transaction Processing.
Fast Money Grows on Trees, Not Chains}},
month = dec,
year = {2013},
url = {http://eprint.iacr.org/2013/881},
}
@inproceedings{son2010dnscache,
title={\href{https://www.cs.cornell.edu/~shmat/shmat_securecomm10.pdf}{The
Hitchhikers Guide to DNS Cache Poisoning}},
author={Son, Sooel and Shmatikov, Vitaly},
booktitle={International Conference on Security and Privacy in Communication
Systems},
pages={466--483},
year={2010},
organization={Springer}
}
@misc{song18guess,
author = {Jonghyuk Song},
title =
{\href{https://medium.com/coinmonks/attack-on-pseudo-random-number-generator-prng-used-in-1000-guess-an-ethereum-lottery-game-7b76655f953d}{Attack
on Pseudo-random number generator (PRNG) used in 1000 Guess, an
Ethereum lottery game (CVE-201812454)}},
month = jul,
year = 2018,
}
@article{sonnino18coconut,
title={\href{https://arxiv.org/abs/1802.07344}{Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers}},
author={Sonnino, Alberto and Al-Bassam, Mustafa and Bano, Shehar and Danezis, George},
journal={arXiv preprint arXiv:1802.07344},
year={2018}
}
@article{ sputnik15russia,
key = {Sputnik},
title = {\href{http://sputniknews.com/business/20150918/1027204933/russian-national-cryptocurrency.html}{Russia's Bitruble to be World's First State-Controlled Cryptocurrency}},
journal = {Sputnik},
month = sep,
year = 2015,
}
@inproceedings{ spycher10coercion,
author = {Oliver Spycher and Rolf Haenni and Eric Dubuis},
title = {\href{https://dl.gi.de/handle/20.500.12116/19498}{Coercion-Resistant Hybrid Voting Systems}},
booktitle = {4th International Conference on Electronic Voting},
month = jul,
year = 2010,
}
@inproceedings{ srinivasan08protecting,
author = {Vijay Srinivasan and John Stankovic and Kamin Whitehouse},
title = {Protecting your Daily In-Home Activity Information from a
Wireless Snooping Attack},
booktitle = {UbiComp},
month = sep,
year = 2008,
}
@inproceedings{ stark09symmetric,
title = {Symmetric cryptography in {JavaScript}},
author = {Stark, Emily and Hamburg, Michael and Boneh, Dan},
booktitle = {Computer Security Applications Conference},
pages = {373--381},
year = {2009},
organization = {{IEEE}}
}
@inproceedings{stefanov12policy,
author = {Emil Stefanov and
Elaine Shi and
Dawn Song},
title = {Policy-Enhanced Private Set Intersection: {S}haring Information While Enforcing Privacy Policies},
booktitle = {Public Key Cryptography},
year = {2012}
}
@article{subramanian17decentralized,
title={\href{https://dl.acm.org/citation.cfm?id=3158333}{Decentralized blockchain-based electronic marketplaces}},
author={Subramanian, Hemang},
journal={Communications of the ACM},
volume={61},
number={1},
pages={78--84},
year={2017},
publisher={ACM}
}
@book{swan15blockchain,
title={\href{http://shop.oreilly.com/product/0636920037040.do}{Blockchain: Blueprint for a new economy}},
author={Swan, Melanie},
year={2015},
publisher={O'Reilly Media, Inc.}
}
@misc{ swende17frontrunning,
author = {Martin Holst Swende},
title = {\href{http://swende.se/blog/Frontrunning.html}{Blockchain Frontrunning}},
month = oct,
year = 2017,
}
@article{ sweeney96replacing,
author = {Latanya Sweeney},
title = {Replacing personally-identifying information in medical records, the scrub system},
journal = {Journal of the American Medical Informatics Association},
year = {1996}
}
@article{ syta14security,
author = {Ewa Syta and Aaron Johnson and Henry Corrigan-Gibbs and
Shu-Chun Weng and David Isaac Wolinsky and Bryan Ford},
title = {Security Analysis of Accountable Anonymity in {Dissent}},
journal = {\bibconf{TISSEC}{ACM Transactions on Information and System Security}},
month = aug,
year = 2014,
}
@misc{ syta14deniable,
author = {Ewa Syta and Benjamin Peterson and David Isaac Wolinsky and
Michael Fischer and Bryan Ford},
title = {\href{https://cpsc.yale.edu/sites/default/files/files/TR1486.pdf}{Deniable Anonymous Group Authentication}},
institution = {Yale University},
number = {YALEU/DCS/TR-1486},
month = feb,
year = 2014,
}
% formerly used incorrect key syta15decentralizing
@inproceedings{ syta16keeping,
title={\href{http://dedis.cs.yale.edu/dissent/papers/witness-abs}{Keeping Authorities ``Honest or Bust'' with Decentralized Witness Cosigning}},
author={Syta, Ewa and Tamas, Iulia and Visher, Dylan and Wolinsky, David Isaac and Jovanovic, Philipp and Gasser, Linus and Gailly, Nicolas and Khoffi, Ismail and Ford, Bryan},
booktitle = {37th IEEE Symposium on Security and Privacy},
month = may,
year={2016},
}
% formerly syta16scalable
@inproceedings{syta17scalable,
author = {Ewa Syta and Philipp Jovanovic and Eleftherios Kokoris-Kogias and Nicolas Gailly and Linus Gasser and Ismail Khoffi and Michael J. Fischer and Bryan Ford},
title = {\href{https://www.ieee-security.org/TC/SP2017/papers/413.pdf}{Scalable Bias-Resistant Distributed Randomness}},
booktitle = {38th IEEE Symposium on Security and Privacy},
month = may,
year = {2017},
location = {San Jose, CA},
}
@inproceedings{syverson09entropist,
author = {Paul Syverson},
title = {Why {I'm} not an entropist},
booktitle = {17th International Workshop on Security Protocols},
month = apr,
year = {2009},
}
% later published version: szabo97formalizing
@article{szabo94smart,
title={Smart contracts},
author={Szabo, Nick},
journal={Unpublished manuscript},
year={1994}
}
@article{ szabo97formalizing,
author = {Nick Szabo},
title = {\href{https://firstmonday.org/ojs/index.php/fm/article/view/548}{Formalizing and Securing Relationships on Public Networks}},
journal = {First Monday},
month = sep,
year = 1997,
volume = 2,
number = 9,
}
@inproceedings{ szalachowski14policert,
author = {Pawel Szalachowski and Stephanos Matsumoto and Adrian Perrig},
title = {\href{http://www.netsec.ethz.ch/publications/papers/ccsfp512-szalachowskiA.pdf}{{PoliCert}: Secure and Flexible {TLS} Certificate Management}},
booktitle = {\bibconf{CCS}{ACM Conference on Computer and
Communications Security}},
year = 2014,
}
@inproceedings{ szalachowski16pkisn,
author = {Pawel Szalachowski and Laurent Chuat and Adrian Perrig},
title = {\href{http://arxiv.org/abs/1601.03874}{{PKI} Safety Net {(PKISN):} Addressing the Too-Big-to-Be-Revoked Problem of the {TLS} Ecosystem}},
booktitle = {1st IEEE European Symposium on Security and Privacy},
month = mar,
year = {2016},
}
@inproceedings{ szalachowski18towards,
author = {Pawel Szalachowski},
title = {\href{https://ieeexplore.ieee.org/document/8525399}{Towards More Reliable Bitcoin Timestamps}},
booktitle = {Crypto Valley Conference},
month = jun,
year = 2018,
location = {Zug, Switzerland}
}
%T
@article{ taylor11behind,
author = {Taylor, Greg and Cox, George},
title = {Behind Intel's New Random-Number Generator},
year = 2011,
month = sep,
journal = {{IEEE} Spectrum},
}
@article{thomas15interledger,
title={\href{https://interledger.org/interledger.pdf}{A protocol for interledger payments}},
author={Thomas, Stefan and Schwartz, Evan},
url={https://interledger.org/interledger.pdf},
year={2015}
}
@article{thompson84reflections,
author = {Thompson, Ken},
title = {\href{https://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf}{Reflections on Trusting Trust}},
journal = {Commun. ACM},
volume = {27},
number = {8},
month = aug,
year = {1984},
pages = {761--763},
publisher = {ACM},
}
@article{ thomsen15ashley,
author = {Simon Thomsen},
title = {\href{http://uk.businessinsider.com/cheating-affair-website-ashley-madison-hacked-user-data-leaked-2015-7?r=US&IR=T}{Ashley Madison data breach
}},
month = jul,
year = 2015,
}
@inproceedings{tomescu17catena,
author={Alin Tomescu and Srini Devadas},
title={\href{https://people.csail.mit.edu/devadas/pubs/catena.pdf}{Catena: Efficient Non-equivocation via Bitcoin}},
booktitle={38th IEEE Symposium on Security and Privacy},
year={2017},
pages={393-409},
doi={10.1109/SP.2017.19},
month={May},
}
@inproceedings{ topalovic12towards,
author = {Emin Topalovic and Brennan Saeta and Lin-Shung Huang and
Collin Jackson and Dan Boneh},
title = {\href{http://www.ieee-security.org/TC/W2SP/2012/papers/w2sp12-final9.pdf}{Towards Short-Lived Certificates}},
booktitle = {\bibconf{W2SP}{Web 2.0 Security \& Privacy}},
month = may,
year = 2012,
location = {San Francisco, CA, USA},
}
@inproceedings{torres16omitting,
author = {Santiago Torres-Arias and Anil Kumar Ammula and Reza Curtmola
and Justin Cappos},
title =
{\href{https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_torres-arias.pdf}
{On Omitting Commits and Committing Omissions: Preventing Git Metadata
Tampering That (Re)introduces Software Vulnerabilities}},
booktitle = {\bibconf[25th]{USENIX Security 16}{USENIX Security Symposium}},
year = {2016},
month=aug
}
@misc{ tsakalaki13ensure,
author = {Elpiniki Tsakalaki},
title = {{MSC32-C}. Ensure your random number generator is properly seeded},
howpublished = {\url{https://www.securecoding.cert.org/confluence/display/seccode/MSC32-C.+Ensure+your+random+number+generator+is+properly+seeded}},
}
@inproceedings{tsang07blacklistable,
title={Blacklistable anonymous credentials: {B}locking
misbehaving users without {TTP}s},
author={Tsang, Patrick P and Au, Man Ho and Kapadia, Apu and Smith, Sean W},
booktitle={\bibconf[14th]{CCS}{Proceedings of the 14th
ACM conference on Computer and communications security}},
month=oct,
year=2007
}
@inproceedings{ tsang10blac,
author = {Patrick P. Tsang and Man Ho Au and Apu Kapadia and
Sean W. Smith},
title = {BLAC: Revoking Repeatedly Misbehaving Anonymous Users
Without Relying on TTPs},
journal = {ACM Transactions on Information and System Security (TISSEC)},
volume = 13,
number = 4,
month = dec,
year = 2010,
}
@inproceedings{tsang08perea,
author = {Tsang, Patrick P. and Au, Man Ho and Kapadia, Apu and Smith, Sean W.},
title = {PEREA: towards practical TTP-free revocation in anonymous authentication},
booktitle = {Proceedings of the 15th ACM conference on Computer and communications security},
booktitle = {\bibconf{CCS}{ACM conference on computer and
communications security}},
year = {2008},
pages = {333--344},
numpages = {12},
publisher = {ACM},
address = {New York, NY, USA},
}
@incollection{ tsiounis98security,
year = {1998},
booktitle = {Public Key Cryptography},
volume = {1431},
series = {Lecture Notes in Computer Science},
editor = {Imai, Hideki and Zheng, Yuliang},
title = {On the security of {ElGamal} based encryption},
publisher = {Springer Berlin Heidelberg},
author = {Tsiounis, Yiannis and Yung, Moti},
pages ={117-134}
}
@article{ tsujii89ibe,
title={An {ID}-based cryptosystem based on the discrete logarithm problem},
author={Tsujii, Shigeo and Itoh, Toshiya},
journal={{IEEE} Journal on Selected Areas in Communications},
year={1989},
}
@misc{tor-directory,
key={Tor directory protocol},
title = {Tor directory protocol, version 3},
howpublished = {\url{https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt}},
year = 2014,
}
@article{ tung15google,
author = {Liam Tung},
title = {\href{http://www.zdnet.com/article/google-banishes-chinas-main-digital-certificate-authority-cnnic/}{Google boots China's main digital certificate authority CNNIC}},
journal = {ZDNet},
month = apr,
day = 2,
year = 2015,
}
%V
@article{ vaas13use,
author = {Lisa Vaas},
title = {\href{http://nakedsecurity.sophos.com/2013/12/20/use-of-tor-pointed-fbi-to-harvard-university-bomb-hoax-suspect/}{Use of Tor pointed FBI to Harvard University bomb hoax suspect}},
journal = {Naked Security},
month = dec # "~20,",
year = 2013,
}
@article{vaidya05secure,
author = {Jaideep Vaidya and Chris Clifton},
title = {Secure set intersection cardinality with application to
association rule mining},
journal = {Journal of Computer Security},
volume = {13},
number = {4},
year = 2005,
pages = {593-622}
}
@misc{ valverde15replay,
author = {Thiago Valverde},
title = {\href{http://blog.valverde.me/2015/12/07/bad-life-advice/}{Bad life advice -- Replay attacks against {HTTPS}}},
month = dec,
year = 2015,
note = {Blog},
}
@inproceedings{van2018foreshadow,
title={Foreshadow: Extracting the Keys to the Intel $\{$SGX$\}$ Kingdom with Transient Out-of-Order Execution},
author={Van Bulck, Jo and Minkin, Marina and Weisse, Ofir and Genkin, Daniel and Kasikci, Baris and Piessens, Frank and Silberstein, Mark and Wenisch, Thomas F and Yarom, Yuval and Strackx, Raoul},
booktitle={27th $\{$USENIX$\}$ Security Symposium ($\{$USENIX$\}$ Security 18)},
pages={991--1008},
year={2018}
}
@article{van15paxos,
title={Paxos made moderately complex},
author={Van Renesse, Robbert and Altinbuken, Deniz},
journal={ACM Computing Surveys (CSUR)},
volume={47},
number={3},
pages={1--36},
year={2015},
publisher={ACM New York, NY, USA}
}
@misc{ venkatanarayanan17enrolment,
author = {Anand Venkatanarayanan},
title = {\href{https://medium.com/karana/aadhaar-enrollment-rejections-are-accelerating-5aa76191d9a9}{Enrolment rejections are accelerating}},
howpublished = {Medium},
month = nov,
year = 2017,
}
@inproceedings{venkatadri18privacy,
title={\href{https://mislove.org/publications/PII-Oakland.pdf}{Privacy Risks with Facebooks PII-based Targeting: Auditing a Data Brokers Advertising Interface}},
author={Venkatadri, Giridhari and Andreou, Athanasios and Liu, Yabing and Mislove, Alan and Gummadi, Krishna P and Loiseau, Patrick and Goga, Oana},
booktitle={IEEE Symposium on Security and Privacy (SP)},
pages={221--239},
year={2018}
}
@inproceedings{ verde14no,
author = {Nino Vincenzo Verde and Giuseppe Ateniese
and Emanuele Gabrielli and Luigi Vincenzo Mancini
and Angelo Spognardi},
title = {``No NAT'd User left Behind'': Fingerprinting Users
behind {NAT} from {NetFlow} Records alone},
booktitle = {\bibconf[34th]{ICDCS}{International Conference on Distributed Computing Systems}},
month = jul,
year = 2014,
}
@inproceedings{ verkamp12inferring,
author = {John-Paul Verkamp and Minaxi Gupta},
title = {Inferring Mechanics of {Web} Censorship Around the World},
booktitle = {\bibconf[2nd]{FOCI}{USENIX Workshop on
Free and Open Communications on the Internet}},
month = aug,
year = 2012,
location = {Bellevue, WA},
}
@inproceedings{ viswanath10analysis,
author = {Bimal Viswanath and Ansley Post},
title = {\href{http://ccr.sigcomm.org/online/files/p363.pdf}{An Analysis of Social Network-Based Sybil Defenses}},
booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}},
month = aug,
year = 2010,
location = {New Delhi, India},
}
@misc{ voisin13mat,
year = {2013},
month = {may},
title = {The Metadata Anonymization Toolkit},
howpublished = {\url{http://arxiv.org/abs/1212.3648}},
author = {Julien Voisin and Christophe Guyeux and Jacques M. Bahi},
}
@inproceedings{ volpano97eliminating,
author = {Dennis M. Volpano and
Geoffrey Smith},
title = {Eliminating covert flows with minimum typings},
booktitle = {\bibconf[10th]{CSFW}{Computer Security Foundations Workshop}},
month = jun,
year = 1997,
}
@misc{ vorick18state,
author = {David Vorick},
title = {\href{https://blog.sia.tech/the-state-of-cryptocurrency-mining-538004a37f9b}{The State of Cryptocurrency Mining}},
month = may,
year = 2018,
url = {https://blog.sia.tech/the-state-of-cryptocurrency-mining-538004a37f9b},
}
@inproceedings{von06selectively,
title={Selectively traceable anonymity},
author={von Ahn, Luis and Bortz, Andrew and Hopper, Nicholas J and O?eill, Kevin},
booktitle={Privacy Enhancing Technologies},
pages={208--222},
year={2006},
organization={Springer}
}
@inproceedings{ vratonjic11inconvenient,
author = {Nevena Vratonjic and Julien Freudiger and Vincent Bindschaedler and Jean-Pierre Hubaux},
title = {\href{https://link.springer.com/chapter/10.1007%2F978-1-4614-1981-5_5}{The Inconvenient Truth about Web Certificates}},
booktitle = {\bibconf[10th]{WEIS}{Workshop on Economics of Information Security}},
month = jun,
year = 2011,
pages = {79-117},
}
@inproceedings{vukolic15quest,
title={\href{http://vukolic.com/iNetSec_2015.pdf}{The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication}},
author={Vukoli{\'c}, Marko},
booktitle={International Workshop on Open Problems in Network Security},
pages={112--125},
year={2015},
organization={Springer}
}
%W
@inproceedings{wang08cache,
author = {Zhenhong Wang and
Ruby B. Lee},
title = {A novel cache architecture with enhanced performance and security},
booktitle = {IEEE/ACM \bibconf[41th]{Micro}{International Symposium on Microarchitecture}},
year = 2008
}
@inproceedings{wang10privacy,
author = {Cong Wang and
Qian Wang and
Kui Ren and
Wenjing Lou},
title = {Privacy-Preserving Public Auditing for Data Storage Security
in Cloud Computing},
booktitle = {\bibconf[29th]{INFOCOM}{IEEE INFOCOM}},
location = {San Deigo, CA},
month = mar,
year = 2010
}
@article{wang10publicly,
author = {Cong Wang and
Kui Ren and
Wenjing Lou and
Jin Li},
title = {Toward publicly auditable secure
cloud data storage services},
journal = {IEEE Network},
volume = {24},
number = {4},
year = {2010},
pages = {19-24}
}
@article{wang11enabling,
author = {Qian Wang and
Cong Wang and
Kui Ren and
Wenjing Lou and
Jin Li},
title = {Enabling Public Auditability and Data Dynamics for Storage
Security in Cloud Computing},
journal = {IEEE Transactions on Parallel and Distributed Systems},
volume = {22},
number = {5},
year = {2011},
pages = {847-859}
}
@article{wang13privacy,
author = {Cong Wang and
Sherman S. M. Chow and
Qian Wang and
Kui Ren and
Wenjing Lou},
title = {Privacy-Preserving Public Auditing for
Secure Cloud Storage},
journal = {IEEE Transactions on Computers},
volume = {62},
number = {2},
year = {2013},
pages = {362-375}
}
@inproceedings{ wang12censorspoofer,
author = {Qiyan Wang and Xun Gong and Giang T. K. Nguyen and
Amir Houmansadr and Nikita Borisov},
title = {{CensorSpoofer}: Asymmetric Communication using {IP} Spoofing
for Censorship-Resistant Web Browsing},
booktitle = {\bibconf[19th]{CCS}{ACM Conference on
Computer and Communications Security}},
location = {Raleigh, NC},
month = oct,
year = 2012,
}
@inproceedings{ wang14effective,
author = {Tao Wang and Xiang Cai and Rishab Nithyanand and Rob
Johnson and Ian Goldberg},
title =
{\href{https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/wang_tao}
{Effective Attacks and Provable Defenses for Website Fingerprinting}},
booktitle = {{USENIX} Security Symposium},
month = aug,
year = 2014
}
@article{watanabe11signature,
title={Account Management Method with Blind Signature Scheme},
author={Watanabe, Ryu and Miyake, Yutaka},
journal={Engineering and Technology, World of Science},
year={2011}
}
@inproceedings{waters04dosresistance,
author = {Waters, Brent and Juels, Ari and Halderman, J. Alex and Felten, Edward W.},
title = {{New Client Puzzle Outsourcing Techniques for DoS Resistance}},
booktitle = {Proceedings of the 11th ACM Conference on Computer and Communications Security},
series = {CCS '04},
year = {2004},
isbn = {1-58113-961-6},
location = {Washington DC, USA},
pages = {246--256},
numpages = {11},
url = {http://doi.acm.org/10.1145/1030083.1030117},
doi = {10.1145/1030083.1030117},
acmid = {1030117},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {DoS, client puzzles, denial-of-service},
}
@inproceedings{ waters05efficient,
author = {Brent Waters},
title = {\href{https://link.springer.com/chapter/10.1007%2F11426639_7}{Efficient Identity-Based Encryption Without Random Oracles}},
booktitle = {Eurocrypt},
month = may,
year = 2005,
}
@article{ watts13rowling,
author = {Robert Watts},
title = {{JK Rowling} unmasked as author of acclaimed detective novel},
journal = {The Telegraph},
month = jul # "~13,",
year = 2013,
url = {http://www.telegraph.co.uk/culture/books/10178344/JK-Rowling-unmasked-as-author-of-acclaimed-detective-novel.html}
}
@article{ weissman15how,
author = {Cale Guthrie Weissman},
title = {\href{https://www.businessinsider.in/How-a-man-who-worked-for-the-Lottery-Association-may-have-hacked-the-system-for-a-winning-ticket/articleshow/46913403.cms}{How a man who worked for the Lottery Association may have hacked the system for a winning ticket}},
journal = {Business Insider},
month = apr,
day = 13,
year = 2015,
}
@inproceedings{ wesolowski19efficient,
author = {Benjamin Wesolowski},
title = {\href{https://link.springer.com/chapter/10.1007%2F978-3-030-17659-4_13}{Efficient Verifiable Delay Functions}},
booktitle = {Eurocrypt},
month = may,
year = 2019,
}
@article{ wen15face,
author = {Di Wen and Hu Hanand Anil K. Jain},
title = {\href{https://ieeexplore.ieee.org/document/7031384}{Face Spoof Detection With Image Distortion Analysis}},
journal = {IEEE Transactions on Information Forensics and Security},
volume = 10,
number = 4,
month = apr,
year = 2015,
}
@inproceedings{ wendlandt08perspectives,
author = {Dan Wendlandt and David G. Andersen and Adrian Perrig},
title = {Perspectives: Improving {SSH}-style Host Authentication
with Multi-Path Probing},
booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}},
month = jun,
year = 2008,
location = {Boston, MA},
}
@inproceedings{ whitten99johnny,
author = {Whitten, Alma and Tygar, J. D.},
title = {Why Johnny can't encrypt: a usability evaluation of PGP 5.0},
booktitle = {Proceedings of the 8th conference on USENIX Security Symposium - Volume 8},
series = {SSYM'99},
year = {1999},
location = {Washington, D.C.},
pages = {14--14},
publisher = {USENIX Association},
address = {Berkeley, CA, USA},
}
@inproceedings{ wikstrom05sender,
author = {Douglas Wikstr\"om},
title = {\href{https://link.springer.com/chapter/10.1007/11593447_15}{A Sender Verifiable Mix-Net and a New Proof of a Shuffle}},
booktitle = {Advances in Cryptology -- ASIACRYPT},
month = dec,
year = 2005,
location = {Chennai, India},
}
@book{william04recommendation,
title={Recommendation for the triple data encryption algorithm ({TDEA}) block cipher},
author={Barker, William Curt},
year={2004},
publisher={US Department of Commerce, Technology Administration, National Institute of Standards and Technology}
}
@inproceedings{wolchok10defeating,
title={Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.},
author={Wolchok, Scott and Hofmann, Owen S and Heninger, Nadia and Felten, Edward W and Halderman, J Alex and Rossbach, Christopher J and Waters, Brent and Witchel, Emmett},
booktitle={NDSS},
year={2010}
}
@inproceedings{ wolinsky14managing,
author = {David Isaac Wolinsky and Daniel Jackowitz and Bryan Ford},
title = {Managing {NymBoxes} for Identity and Tracking Protection},
booktitle = {USENIX Conference on Timely Results in Operating Systems},
month = oct,
year = 2014,
location = {Broomfield, CO},
}
@inproceedings{wong02verifiable,
title={\href{https://dl.acm.org/citation.cfm?id=830217}{Verifiable secret redistribution for archive systems}},
author={Wong, Theodore M and Wang, Chenxi and Wing, Jeannette M},
booktitle={Security in Storage Workshop, 2002. Proceedings. First International IEEE},
pages={94--105},
year={2002},
organization={IEEE}
}
@article{wood14ethereum,
title={\href{https://github.com/ethereum/wiki/wiki/White-Paper}{Ethereum: A Secure Decentralised Generalised Transaction Ledger}},
author={Wood, Gavin},
journal={Ethereum Project Yellow Paper},
year={2014}
}
@inproceedings{ wright03defending,
author = {Matthew Wright and Micah Adler and Brian N. Levine
and Clay Shields},
title = {Defending Anonymous Communications Against
Passive Logging Attacks},
booktitle = {IEEE Security and Privacy},
month = may,
year = 2003,
}
@inproceedings{wright18crypto,
title={\href{https://web.cecs.pdx.edu/~cvwright/papers/crumplezones.pdf}{Crypto Crumple Zones: Enabling limited Access without Mass Surveillance}},
author={Wright, Charles and Varia, Mayank},
booktitle={2018 IEEE European Symposium on Security and Privacy (EuroS\&P)},
pages={288--306},
year={2018},
organization={IEEE}
}
@article{wright08passive,
author = {Wright, Matthew K. and Adler, Micah and Levine, Brian Neil and Shields, Clay},
title = {Passive-Logging Attacks Against Anonymous Communications Systems},
journal = {\bibbrev{TISSEC}{ACM Transactions on Information and System Security}},
month = may,
year = {2008},
}
@inproceedings{ wu15deterland,
author = {Weiyi Wu and Bryan Ford},
title = {\href{https://dedis.cs.yale.edu/cloud/papers/trios15-deterland-abs/}{Deterministically Deterring Timing Attacks in Deterland}},
booktitle = {Conference on Timely Results in Operating Systems (TRIOS)},
month = oct,
year = 2015,
}
%X
@article{xia17bbds,
title={BBDS: Blockchain-based data sharing for electronic medical records in cloud environments},
author={Xia, Qi and Sifah, Emmanuel Boateng and Smahi, Abla and Amofa, Sandro and Zhang, Xiaosong},
journal={Information},
volume={8},
number={2},
pages={44},
year={2017},
publisher={Multidisciplinary Digital Publishing Institute}
}
@article{xia17medshare,
title={MeDShare: Trust-Less Medical Data Sharing Among Cloud Service
Providers via Blockchain},
author={Xia, Qi and Sifah, Emmanuel Boateng and Asamoah, Kwame Omono and Gao,
Jianbin and Du, Xiaojiang and Guizani, Mohsen},
journal={IEEE Access},
volume={5},
pages={14757--14767},
year={2017},
publisher={IEEE}
}
@inproceedings{xiao13structural,
author = {Hongda Xiao and
Bryan Ford and
Joan Feigenbaum},
title = {Structural Cloud Audits that Protect Private Information},
booktitle = {\bibconf{CCSW}{ACM Cloud Computing Security Workshop}},
location = {Berlin, Germany},
month = nov,
year = 2013
}
%Y
@inproceedings{yao82protocols,
author = {Andrew Chi-Chih Yao},
title = {Protocols for Secure Computations ({E}xtended Abstract)},
booktitle = {\bibconf[23rd]{FOCS}{Annual Symposium on Foundations of
Computer Science}},
location = {Chicago, IL},
month = nov,
year = 1982
}
@article{yermack17corporate,
title={\href{https://academic.oup.com/rof/article/21/1/7/2888422}{Corporate governance and blockchains}},
author={Yermack, David},
journal={Review of Finance},
volume={21},
number={1},
pages={7--31},
year={2017},
publisher={Oxford University Press}
}
@inproceedings{ yilek09private,
author = {Scott Yilek and Eric Rescorla and Hovav Shacham and
Brandon Enright and Stefan Savage},
title = {When Private Keys are Public: Results From the 2008
{Debian} {OpenSSL} Vulnerability},
booktitle = {Proceedings of IMC},
year = 2009,
editor = {Anja Feldmann and Laurent Mathy},
month = nov,
publisher = {ACM Press},
pages = {15-27}
}
@inproceedings{ yin19hotstuff,
author = {Maofan Yin and Dahlia Malkhi and Michael K. Reiter and Guy Golan Gueta and Ittai Abraham},
title = {\href{https://research.vmware.com/files/attachments/0/0/0/0/0/7/7/podc.pdf}{HotStuff: BFT Consensus with Linearity and Responsiveness}},
booktitle = {\bibconf{PODC}{Principles of Distributed Computing}},
month = jul,
year = 2019,
location = {Toronto, Ontario, Canada},
}
@article{ylonen06secure,
title={The secure shell (SSH) protocol architecture},
author={Ylonen, Tatu and Lonvick, Chris},
year={2006}
}
@inproceedings{ young97kleptography,
title = {Kleptography: Using cryptography against cryptography},
author = {Young, Adam and Yung, Moti},
booktitle = {{EUROCRYPT}},
pages = {62--74},
year = {1997},
}
@inproceedings{ yu08sybillimit,
author = {Haifeng Yu and Phillip B. Gibbons and Michael Kaminsky
and Feng Xiao},
title = {\href{https://www.iscs.nus.edu.sg/~yuhf/sybillimit-tr.pdf}{{SybilLimit}: {A} Near-Optimal Social Network Defense
against Sybil Attacks}},
booktitle = {\bibconf[29th]{S{\&}P}{IEEE Symposium on Security and
Privacy}},
location = {Oakland, CA},
month = may,
year = 2008,
url = {https://www.iscs.nus.edu.sg/~yuhf/sybillimit-tr.pdf},
}
@inproceedings{yu09dsybil,
author = {Haifeng Yu and
Chenwei Shi and
Michael Kaminsky and
Phillip B. Gibbons and
Feng Xiao},
title = {D{S}ybil: {O}ptimal Sybil-resistance for recommendation systems},
booktitle = {\bibconf[30th]{S{\&}P}{IEEE Symposium on Security and Privacy}},
location = {Oakland, CA},
month = may,
year = 2009
}
%Z
@misc{zamani14mpc,
author = {Mahdi Zamani and Mahnush Movahedi and Jared Saia},
title = {\href{https://eprint.iacr.org/2014/149.pdf}{Millions of Millionaires: Multiparty Computation in Large Networks}},
howpublished = {Cryptology ePrint Archive, Report 2014/149},
year = {2014},
}
@inproceedings{zander13scalable,
author = {Sebastian Zander and
Lachlan L. H. Andrew and
Grenville Armitage},
title = {Scalable private set intersection cardinality for
capture-recapture with multiple private datasets},
booktitle = {Centre for Advanced Internet Architectures, Technical
Report 130930A},
year = 2013
}
@inproceedings{zhai16anonrep,
author = {Ennan Zhai and
David Isaac Wolinsky and
Ruichuan Chen and
Ewa Syta and
Chao Teng and
Bryan Ford},
title = {Anon{R}ep: {T}owards tracking-resistant anonymous
reputation},
booktitle = {\bibconf[13th]{NSDI}{USENIX Symposium on Networked
Systems Design and Implementation}},
location = {Santa Clara, CA},
month = mar,
year = 2016
}
@inproceedings{ zhang11inferring,
author = {Zhang, Fan and He, Wenbo and Liu, Xue and Bridges, Patrick G. Bridges},
title =
{\href{http://www.math.unipd.it/~conti/teaching/CNS1415/atpapers/Profiling/profiling.pdf}
{Inferring Users' Online Activities Through Traffic Analysis}},
booktitle = {WiSec},
month = jun,
year = 2011
}
@inproceedings{ zhang16towncrier,
author = {Zhang, Fan and Cecchetti, Ethan and Croman, Kyle and Juels, Ari and Shi, Elaine},
title = {\href{https://dl.acm.org/citation.cfm?id=2978326}{Town Crier: An Authenticated Data Feed for Smart Contracts}},
booktitle = {2016 ACM SIGSAC Conference on Computer and Communications Security},
series = {CCS '16},
year = {2016},
month = nov,
location = {Vienna, Austria},
pages = {270--282},
numpages = {13},
}
@misc{zhang17rem,
author = {Fan Zhang and Ittay Eyal and Robert Escriva and Ari Juels and Robbert van Renesse},
title = {\href{http://eprint.iacr.org/2017/179.pdf}{REM: Resource-Efficient Mining for Blockchains}},
howpublished = {Cryptology ePrint Archive, Report 2017/179},
year = {2017},
note = {\url{http://eprint.iacr.org/2017/179}},
}
@inproceedings{zhang2013picco,
author={Zhang, Yihua and Steele, Aaron and Blanton, Marina},
title={Picco: A general-purpose compiler for private distributed computation},
booktitle={{ACM} Conference on Computer and Communications Security},
month={November},
year={2013}
}
@inproceedings{ zhang19statement,
author = {Bingsheng Zhang and Hong-Sheng Zhou},
title = {\href{https://fc19.ifca.ai/preproceedings/97-preproceedings.pdf}{Statement Voting}},
booktitle = {\bibconf[23rd]{FC}{International Conference on Financial Cryptography and Data Security 2019}},
month = feb,
year = 2019,
location = {St. Kitts},
}
@article{zhang2019deco,
title={\href{https://arxiv.org/pdf/1909.00938.pdf}{DECO: Liberating Web Data
Using Decentralized Oracles for TLS}},
author={Zhang, Fan and Maram, Sai Krishna Deepak and Malvai, Harjasleen and Goldfeder, Steven and Juels, Ari},
journal={arXiv preprint arXiv:1909.00938},
year={2019}
}
@article{zhou02coca,
title={\href{http://www.cs.cornell.edu/fbs/publications/cocaTOCS.pdf}{COCA: A Secure Distributed Online Certification Authority}},
author={Zhou, Lidong and Schneider, Fred B and Van Renesse, Robbert},
journal={ACM Transactions on Computer Systems (TOCS)},
volume={20},
number={4},
pages={329--368},
year={2002},
publisher={ACM}
}
@article{ zhou05apss,
author = {Lidong Zhou and Fred B. Schneider and Robbert Van Renesse},
title = {\href{https://dl.acm.org/citation.cfm?id=1085127}{APSS: Proactive Secret Sharing in Asynchronous Systems}},
journal = {ACM Transactions on Information and System Security (TISSEC)},
volume = 8,
number = 3,
month = aug,
year = 2005,
pages = {259-286},
}
@inproceedings{ zhou12droidranger,
series = {CODASPY '12},
title =
{\href{https://www.internetsociety.org/sites/default/files/07_5.pdf}{Hey,
{{You}},
{{Get Off}} of {{My Market}}: {{Detecting Repackaged
Smartphone Applications}} in {{Third}}-party {{Android Marketplaces}}}},
booktitle = {Proceedings of the {{Second ACM Conference}} on {{Data}} and
{{Application Security}} and {{Privacy}}},
publisher = {{ACM}},
author = {Zhou, Wu and Zhou, Yajin and Jiang, Xuxian and Ning, Peng},
year = {2012}
}
@techreport{zamyatin19sok,
title={Sok: Communication across distributed ledgers},
author={Zamyatin, Alexei and Al-Bassam, Mustafa and Zindros, Dionysis and Kokoris-Kogias, Eleftherios and Moreno-Sanchez, Pedro and Kiayias, Aggelos and Knottenbelt, William J},
year={2019},
institution={IACR Cryptology ePrint Archive, 2019: 1128}
}
@article{zyskind2015enigma,
title={\href{https://arxiv.org/pdf/1506.03471.pdf}{Enigma: Decentralized computation platform with guaranteed privacy}},
author={Zyskind, Guy and Nathan, Oz and Pentland, Alex},
journal={arXiv preprint arXiv:1506.03471},
year={2015}
}
@inproceedings{zyskind2015decentralizing,
title={\href{https://ieeexplore.ieee.org/abstract/document/7163223/}{Decentralizing privacy: Using blockchain to protect personal data}},
author={Zyskind, Guy and Nathan, Oz and others},
booktitle={Security and Privacy Workshops (SPW), 2015 IEEE},
pages={180--184},
year={2015},
organization={IEEE}
}
% Misc...
@misc{bbc12cispa,
author = {{BBC}},
month = {April},
year = {2012},
title = {Cyber-security bill Cispa passes US House},
howpublished = {\url{http://www.bbc.co.uk/news/world-us-canada-17864539}}
}
@misc{cnn12wikileaks,
author = {Laura Smith-Spark},
month = {July},
year = {2012},
title = {Extradition deadline passes for WikiLeaks' Assange},
booktitle = {{CNN}},
howpublished = {\url{http://articles.cnn.com/2012-07-07/world/world_europe_uk-sweden-assange_1_julian-assange-swedish-prosecution-authority-wikileaks-assange}}
}
@misc{ debian-snapshots,
author = {Debian},
key = {debian-snapshots},
title = {\href{http://snapshot.debian.org/} {snapshot.debian.org}}
}
@misc{ debian16repository,
author = {Debian},
title =
{\href{https://wiki.debian.org/DebianRepository}{Debian Repository}},
month = aug,
year = 2016
}
@misc{ git-notes,
key = {Gitnotes},
title = {\href{https://git-scm.com/docs/git-notes}{Git-notes Documentation}},
month = sep,
year = 2016
}
@misc{ google16play,
author = {Google Inc.},
title =
{\href{https://play.google.com/store?hl=en}{Google Play}},
month = sep,
year = 2016
}
@misc{ intercept15strawhorse,
author = {The Intercept},
title =
{\href{https://theintercept.com/document/2015/03/10/strawhorse-attacking-macos-ios-software-development-kit/}
{Strawhorse: Attacking the macOS and iOS Software Development Kit}},
day = 10,
month = mar,
year = {2015}
}
@misc{ keybase,
key = {Keybase},
title = {\href{https://keybase.io/}{Keybase -- Public Key Crypto for Everyone, Publicly Auditable Proofs of Identity}},
year = {2016}
}
@misc{ mozilla-cors,
title = {{HTTP} access control ({CORS})},
author = {{Mozilla Developer Network}},
howpublished = {\url{https://developer.mozilla.org/en-US/docs/HTTP/Access_control_CORS}}
}
@misc{ openpgpjs,
title = {{OpenPGP.js}},
key = {OpenPGP.js},
howpublished = {\url{http://openpgpjs.github.io/}},
}
@misc{pbc,
author = {Stanford University},
title = {The Pairing-Based Cryptography Library},
howpublished = {\url{http://crypto.stanford.edu/pbc/}}
}
@misc{perry11firefox,
author = {Mike Perry},
month = {May},
year = {2011},
howpublished = {\url{https://blog.torproject.org/blog/toggle-or-not-toggle-end-torbutton}},
title = {To Toggle, or not to Toggle: The End of Torbutton},
}
@misc{ python-pypi,
author = {Python Community},
title = {\href{https://pypi.python.org/pypi}{PyPI - the Python Package Index}},
month = sep,
year = 2016
}
@misc{ sjcl-ecc,
title = {Stanford {Javascript} Crypto Library - {ECC} branch},
key = {Stanford {Javascript} Crypto Library - {ECC} branch},
howpublished = {\url{https://github.com/bitwiseshiftleft/sjcl/tree/ecc}},
}
@misc{ sourceforge,
author = {SourceFroge},
key = {sourceforge},
note = {\url{https://sourceforge.net/}}
}
@misc{ ubuntu16repositories,
author = {Canonical Ltd.},
title = {\href{https://help.ubuntu.com/community/Repositories/Ubuntu}{Ubuntu Repositories}},
month = sep,
year = 2016
}
@misc{ windows16store,
author = {Microsoft Inc.},
title =
{\href{https://www.microsoft.com/en-us/store/apps/windows}{Windows Apps
- Microsoft Store}},
month = sep,
year = 2016
}
@misc{ www13cross,
title = {Cross-Origin Resource Sharing},
editor = {Anne van Kesteren},
year = 2013,
month = jan,
day = 29,
publisher = {{W3C}},
key = {van Kesteren},
howpublished = {\url{http://www.w3.org/TR/2013/CR-cors-20130129/}},
}
% To fix POSITION
@misc{ frields08fedora,
title = {\href{https://www.redhat.com/archives/fedora-announce-list/2008-August/msg00012.html}{Infrastructure Report}},
author = {{Frields, Paul W.}},
month = aug,
year = {2008}
}
@misc{ freebsd12incident,
title = {\href{https://www.freebsd.org/news/2012-compromise.html}{Security
Incident on FreeBSD Infrastructure}},
author = {{The FreeBSD Project}},
month =nov,
year={2012},
}
@misc{ quintin16canary,
title =
{\href{https://www.eff.org/deeplinks/2016/05/canary-watch-one-year-later}{Canary
Watch One Year Later}},
author = {{Quintin, Cooper}},
month = may,
year = {2016},
}
@misc{ redhat08openssh,
title = {\href{https://rhn.redhat.com/errata/RHSA-2008-0855.html} {Critical: OpenSSH Security Update}},
author = {Red Hat},
month = aug,
year = {2008}
}
@misc{ zetter13flame,
title =
{\href{https://www.wired.com/2013/03/flame-windows-update-copycat/}
{Flame {{Windows Update Attack Could Have Been Repeated}} in 3
{{Days}}, {{Says Microsoft}}}},
journaltitle = {WIRED},
author = {Zetter, Kim},
month = mar,
year = {2013}
}
@article{ zetter19experts,
author = {Kim Zetter},
title = {\href{https://motherboard.vice.com/en_us/article/vbwz94/experts-find-serious-problems-with-switzerlands-online-voting-system-before-public-penetration-test-even-begins}{Experts Find Serious Problems With Switzerland's Online Voting System Before Public Penetration Test Even Begins}},
journal = {Motherboard},
month = feb,
day = 21,
year = 2019,
}
@misc{libreoffice,
title = {\href{https://www.libreoffice.org/about-us/who-are-we/} {LibreOffice}},
author = {The Document Foundation},
month = sep,
year = 2016
}
@misc{ gimp,
author = {The GIMP Team},
title = {\href{http://www.gimp.org/}{GNU Image Manipulation Program}},
month = sep,
year = 2016
}
@misc{string16introducing,
title = {\href{http://string.technology/2016/09/14/threshold-relay-random-beacon.en/}{Intoducing Random Beascons Using Threshold Relay Chains}},
author = {Timo Hanke and Dominic Williams},
month= sep,
year= 2016
}
@misc{scaling,
title = {\href{https://en.bitcoin.it/wiki/Scalability}{Scalability}},
author = {{Bitcoin Wiki}},
url = {https://en.bitcoin.it/wiki/Scalability},
year = {2016},
}
@misc{uport,
title = "UPORT: A PLATFORM FOR SELF-SOVEREIGN IDENTITY",
author = "Dr. Christian Lundkvist and Rouven Heck and Joel Torstensson and Zac Mitton and Michael Sena",
url = {\href{https://whitepaper.uport.me/uPort_whitepaper_DRAFT20170221.pdf}},
year = "2017",
}
@misc{civic,
title = "Civic",
author = "Civic team",
url = {\href{https://tokensale.civic.com/CivicTokenSaleWhitePaper.pdf}},
year = "2017",
}
@misc{VISA,
title = {\href{https://usa.visa.com/dam/VCOM/download/corporate/media/visa-fact-sheet-Jun2015.pdf}{Visa Inc. at a Glance}},
author = {{Visa}},
year = {2017},
}
@misc{murmur,
title = {Murmur Hash},
note = {\url{http://en.wikipedia.org/wiki/MurmurHash}}
}
@misc{health16blockchain,
author = {{The Office of the National Coordinator for Health Information Technology}},
title = {Use of Blockchain in Health IT and Health-related Research Challenge},
year = {2016},
month = {Sep},
}
@misc{PoE,
author = {{Wikipedia}},
title = {\href{http://en.wikipedia.org/wiki/Proof_of_Existence}{Proof of Existence}},
year = {2017},
month = {April},
}
@misc{securedrop,
title = {{SecureDrop}},
key = {SecureDrop},
note = {\url{https://pressfreedomfoundation.org/securedrop/}},
}
@misc{random-org,
author = {{Randomness and Integrity Services Ltd.}},
title = {\url{random.org}},
year = 1998,
},
@misc{ debian16APT,
author = {Debian},
title = {\href{https://wiki.debian.org/Apt}{Advanced Package Tool}},
month = may,
year = 2016
}
@misc{ yum16YUM,
author = {YUM},
title = {\href{http://yum.baseurl.org/}{Yellowdog Updater Modified}},
month = may,
year = 2016
}
@misc{ homebrew16BREW,
author = {Max Howell},
title = {\href{http://brew.sh/}{Homebrew -- The Missing Packet Manager for macOS}},
month = may,
year = 2016
}
@misc{ easyinstall16python,
author = {Python Community},
title = {\href{https://wiki.python.org/moin/EasyInstall}{EasyInstall Module}},
month = may,
year = 2016,
}
%%%%%%
% Vulnerabilites from the CVD
@misc{ cve-2000-0357,
key = {cve-2000-0357},
title = {{CVE-2000-0357}: {ORBit} and esound in
{Red Hat Linux} do not use sufficiently random numbers},
year = 1999,
month = dec,
}
@misc{ cve-2001-0950,
key = {cve-2001-0950},
title = {{CVE-2001-0950}: {ValiCert Enterprise Validation Authority}
uses insufficiently random data},
year = 2001,
month = jan,
}
@misc{ cve-2001-1141,
key = {cve-2001-1141},
title = {{CVE-2001-1141}: {PRNG} in {SSLeay} and {OpenSSL}
could be used by attackers to predict future pseudo-random numbers},
year = 2001,
month = jul,
}
@misc{ cve-2001-1467,
key = {cve-2001-1467},
title = {{CVE-2001-1467}: mkpasswd, as used by {Red Hat Linux},
seeds its random number generator with its process {ID}},
year = 2001,
month = apr,
}
@misc{ cve-2003-1376,
key = {cve-2003-1376},
title = {{CVE-2003-1376}: {WinZip} uses weak random number generation
for password protected {ZIP files}},
year = 2003,
month = dec,
}
@misc{ cve-2005-3087,
key = {cve-2005-3087},
title = {{CVE-2005-3087}: {SecureW2 TLS} implementation uses weak random
number generators during generation of the pre-master secret},
year = 2005,
month = sep,
}
@misc{ cve-2006-1378,
key = {cve-2006-1378},
title = {{CVE-2006-1378}: {PasswordSafe} uses a weak random number generator},
year = 2006,
month = mar,
}
@misc{ cve-2006-1833,
key = {cve-2006-1833},
title = {{CVE-2006-1833}: {Intel RNG Driver} in {NetBSD} may
always generate the same random number},
year = 2006,
month = apr,
}
@misc{ cve-2007-2453,
key = {cve-2007-2453},
title = {{CVE-2007-2453}: Random number feature in {Linux} kernel
does not properly seed pools when there is no entropy},
year = 2007,
month = jun,
}
@misc{ cve-2008-0141,
key = {cve-2008-0141},
title = {{CVE-2008-0141}: {WebPortal CMS} generates
predictable passwords containing only the time of day},
year = 2008,
month = jan,
}
@misc{ cve-2008-0166,
key = {cve-2008-0166},
title = {{CVE-2008-0166}: {OpenSSL} on {Debian}-based operating
systems uses a random number generator
that generates predictable numbers},
year = 2008,
month = jan,
}
@misc{ cve-2008-2108,
key = {cve-2008-2108},
title = {{CVE-2008-2108}: {GENERATE\_SEED} macro in PHP
produces 24 bits of entropy and simplifies brute force attacks against
the rand and mt\_rand functions},
year = 2008,
month = may,
}
@misc{ cve-2008-5162,
key = {cve-2008-5162},
title = {{CVE-2008-5162}: The arc4random function in {FreeBSD}
does not have a proper entropy source
for a short time period immediately after boot},
year = 2008,
month = nov,
}
@misc{ cve-2009-0255,
key = {cve-2009-0255},
title = {{CVE-2009-0255}: {TYPO3} creates the encryption key with an insufficiently random seed},
year = 2009,
month = jan,
}
@misc{ cve-2009-3238,
key = {cve-2009-3238},
title = {{CVE-2009-3238}: {Linux} kernel produces insufficiently random numbers},
year = 2009,
month = sep,
}
@misc{ cve-2009-3278,
key = {cve-2009-3278},
title = {{CVE-2009-3278}: {QNAP} uses rand library function to generate a certain recovery key},
year = 2009,
month = sep,
}
@misc{ cve-2011-3599,
key = {cve-2011-3599},
title = {{CVE-2011-3599}: {Crypt::DSA} for Perl, when /dev/random is absent,
uses the {Data::Random} module},
year = 2011,
month = oct,
}
%%%%% FIPS
@misc{ dsa,
author = {{Federal Information Processing Standards Publication}},
title = {Digital Signature Standard ({DSS})},
year = {2013},
month = {July},
note = {FIPS 186-4},
}