All Stories

  1. A More Realistic Analysis of Mass Surveillance - Security in Multi-Surveillant Settings
  2. Revocable hierarchical identity-based broadcast encryption
  3. Publicly evaluable pseudorandom functions and their applications