All Stories

  1. Understanding and Characterizing Intermediate Paths of Email Delivery: The Hidden Dependencies
  2. Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Email Service Provider
  3. A Worldwide View on the Reachability of Encrypted DNS Services
  4. An Accuracy-Lossless Perturbation Method for Defending Privacy Attacks in Federated Learning
  5. Efficient multiple sources network coding signature in the standard model
  6. Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
  7. Multi-Use Unidirectional Proxy Re-Encryption
  8. Unidirectional Identity-Based Proxy Re-Signature
  9. Identity-Based Conditional Proxy Re-Encryption
  10. Anonymous proxy re-encryption
  11. Proxy re-encryption with keyword search
  12. An improved deniable authentication protocol