Omniledger: A secure, scale-out, decentralized ledger via sharding E Kokoris-Kogias, P Jovanovic, L Gasser, N Gailly, E Syta, B Ford 2018 IEEE symposium on security and privacy (SP), 583-598, 2018 | 1310 | 2018 |
Scalable bias-resistant distributed randomness E Syta, P Jovanovic, EK Kogias, N Gailly, L Gasser, I Khoffi, MJ Fischer, ... 2017 IEEE Symposium on Security and Privacy (SP), 444-460, 2017 | 383 | 2017 |
Keeping authorities" honest or bust" with decentralized witness cosigning E Syta, I Tamas, D Visher, DI Wolinsky, P Jovanovic, L Gasser, N Gailly, ... 2016 IEEE Symposium on Security and Privacy (SP), 526-545, 2016 | 369 | 2016 |
The tail at store: A revelation from millions of hours of disk and {SSD} deployments M Hao, G Soundararajan, D Kenchammana-Hosekote, AA Chien, ... 14th USENIX Conference on File and Storage Technologies (FAST 16), 263-276, 2016 | 226* | 2016 |
Digital natives and mobile phones: A survey of practices and attitudes about privacy and security S Kurkovsky, E Syta 2010 IEEE International Symposium on Technology and Society, 441-449, 2010 | 89 | 2010 |
Calypso: Auditable Sharing of Private Data over Blockchains E Kokoris-Kogias, EC Alp, SD Siby, N Gailly, L Gasser, P Jovanovic, ... Cryptology ePrint Archive: 209 https://eprint. iacr. org/2018/209. pdf, 2018 | 60* | 2018 |
Hang with your buddies to resist intersection attacks DI Wolinsky, E Syta, B Ford Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 59 | 2013 |
Calypso: Private data management for decentralized ledgers E Kokoris Kogias, EC Alp, L Gasser, PS Jovanovic, E Syta, BA Ford Proceedings of the VLDB Endowment 14 (4), 586-599, 2021 | 52 | 2021 |
Security Analysis of Accountable Anonymity in Dissent E Syta, H Corrigan-Gibbs, SC Weng, D Wolinsky, B Ford, A Johnson ACM Transactions on Information and System Security (TISSEC) 17 (1094-9224 …, 2014 | 34 | 2014 |
RFID-based authentication middleware for mobile devices E Syta, S Kurkovsky, B Casano 2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010 | 20 | 2010 |
Continuous RFID-enabled authentication: Privacy implications S Kurkovsky, E Syta, B Casano IEEE Technology and Society Magazine 30 (3), 34-41, 2011 | 17 | 2011 |
Monitoring of electronic communications at universities: Policies and perceptions of privacy S Kurkovsky, E Syta 2011 44th Hawaii International Conference on System Sciences, 1-10, 2011 | 17 | 2011 |
Verifiable management of private data under byzantine failures E Kokoris-Kogias, EC Alp, SD Siby, N Gailly, L Gasser, P Jovanovic, ... IACR ePrint 209, 2018, 2018 | 14 | 2018 |
Continuous RFID-enabled authentication and its privacy implications S Kurkovsky, E Syta, B Casano 2010 IEEE International Symposium on Technology and Society, 103-110, 2010 | 13 | 2010 |
Decentralizing authorities into scalable strongest-link cothorities E Syta, I Tamas, D Visher, DI Wolinsky, B Ford CoRR, abs/1503.08768, 2015 | 12 | 2015 |
Certificate cothority: Towards trustworthy collective cas E Syta, I Tamas, D Visher, DI Wolinsky, BA Ford Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETS), 2015 | 10 | 2015 |
CTng: Secure Certificate and Revocation Transparency HLHGESA Herzberg Cryptology ePrint Archive, 2021 | 8* | 2021 |
Deniable anonymous group authentication E Syta, B Peterson, DI Wolinsky, M Fischer, B Ford Retrieved from cpsc. yale. edu, 2014 | 8 | 2014 |
Provably Model-Secure PKI Schemes H Leibowitz, A Herzberg, E Syta https://eprint.iacr.org/2019/807, 2019 | 7* | 2019 |
Approaches and issues in location-aware continuous authentication S Kurkovsky, E Syta 2010 13th IEEE International Conference on Computational Science and …, 2010 | 7 | 2010 |