All Stories

  1. A scalable approach to verify complete vehicle software
  2. Hybrid de-anonymization across real-world heterogeneous social networks
  3. Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext