关注
Megumi Ando
Megumi Ando
在 tufts.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Information technology security assessment system
SW Boyer, N Venna, M Ando
US Patent 10,805,331, 2020
1452020
Information technology security assessment system
S Boyer, N Venna, M Ando
US Patent 9,973,524, 2018
322018
Secret key generation
M Ando
US Patent 9,319,877, 2016
252016
Hash-based TPM signatures for the quantum world
M Ando, JD Guttman, AR Papaleo, J Scire
Applied Cryptography and Network Security: 14th International Conference …, 2016
162016
Practical and provably secure onion routing
M Ando, A Lysyanskaya, E Upfal
arXiv preprint arXiv:1706.05367, 2017
142017
On the complexity of anonymous communication through public networks
M Ando, A Lysyanskaya, E Upfal
arXiv preprint arXiv:1902.06306, 2019
102019
Cryptographic shallots: A formal treatment of repliable onion encryption
M Ando, A Lysyanskaya
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021
82021
On the cost of suppressing volume for encrypted multi-maps
M Ando, M George
Proceedings on Privacy Enhancing Technologies, 2022
42022
Poly onions: Achieving anonymity in the presence of churn
M Ando, M Christ, A Lysyanskaya, T Malkin
Theory of Cryptography Conference, 715-746, 2022
22022
The use of a logistic map for key generation
M Ando
Massachusetts Institute of Technology, 2010
22010
Composable Bounds on Information Flow from Distribution Differences
M Ando, JD Guttman
Data Privacy Management, and Security Assurance: 10th International Workshop …, 2016
12016
Information technology security assessment system
SW Boyer, N Venna, M Ando
US Patent 12,010,137, 2024
2024
Information technology security assessment system
SW Boyer, N Venna, M Ando
US Patent 11,882,146, 2024
2024
Bruisable Onions: Anonymous Communication in the Asynchronous Model
M Ando, A Lysyanskaya, E Upfal
Cryptology ePrint Archive, 2024
2024
Information technology security assessment system
SW Boyer, N Venna, M Ando
US Patent 11,777,976, 2023
2023
Minimizing operational cost for zero information leakage
M Ando, E Upfal
2017 IEEE International Conference on Communications (ICC), 1-7, 2017
2017
From Chaos to Secret Key Agreement
M Ando
2011 IEEE International Conference on Communications (ICC), 1-5, 2011
2011
Estimating Normal Vectors of Polyhedral Surfaces
M Ando
系统目前无法执行此操作,请稍后再试。
文章 1–18