Colleen M. Swanson
Colleen M. Swanson
Onbekend partnerschap
Geverifieerd e-mailadres voor travellingcryptographer.com - Homepage
Geciteerd door
Geciteerd door
SoK: Security and privacy in implantable medical devices and body area networks
M Rushanan, AD Rubin, DF Kune, CM Swanson
Security and Privacy (SP), 2014 IEEE Symposium on, 524-539, 2014
TapDance: End-to-Middle Anticensorship without Flow Blocking.
E Wustrow, C Swanson, JA Halderman
USENIX Security Symposium, 159-174, 2014
Security in key agreement: Two-party certificateless schemes
CM Swanson
University of Waterloo, 2008
A study of two-party certificateless authenticated key-agreement protocols
CM Swanson, D Jao
Progress in Cryptology-INDOCRYPT 2009, 57-71, 2009
SOK: Making sense of censorship resistance systems
S Khattak, T Elahi, L Simon, CM Swanson, SJ Murdoch, I Goldberg
Proceedings on Privacy Enhancing Technologies 2016 (4), 37-61, 2016
Unconditionally secure signature schemes revisited
CM Swanson, D Stinson
Information Theoretic Security, 100-116, 2011
Combinatorial solutions providing improved security for the generalized Russian cards problem
CM Swanson, DR Stinson
Designs, Codes and Cryptography 72 (2), 345-367, 2014
Naïve Security in a Wi-Fi World
CM Swanson, R Urner, E Lank
Trust Management IV, 32-47, 2010
Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval.
CM Swanson, DR Stinson
Advances in Mathematics of Communications 6 (4), 2012
Slipping past the cordon: A systematization of Internet censorship resistance
T Elahi, CM Swanson, I Goldberg
Centre for Applied Cryptographic Research (CACR), University of Waterloo …, 2015
Extended results on privacy against coalitions of users in user-private information retrieval protocols
CM Swanson, DR Stinson
Cryptography and Communications 7 (4), 415-437, 2015
Efficient Hierarchical Quorums in Unstructured Peer-to-Peer Networks
K Henry, CM Swanson, Q Xie, K Daudjee
On the Move to Meaningful Internet Systems: OTM 2009, 183-200, 2009
A new look at an old construction: constructing (simple) 3-designs from resolvable 2-designs
DR Stinson, CM Swanson, T Van Trung
Discrete Mathematics 325, 23-31, 2014
Additional Constructions to Solve the Generalized Russian Cards Problem using Combinatorial Designs
CM Swanson, DR Stinson
arXiv preprint arXiv:1401.1526, 2014
Unconditionally secure signature schemes revisited
CM Swanson, DR Stinson
Journal of Mathematical Cryptology 10 (1), 35-67, 2016
Unconditionally Secure Cryptography: Signature Schemes, User-Private Information Retrieval, and the Generalized Russian Cards Problem
CM Swanson
University of Waterloo, 2013
User-private information retrieval
DR Stinson, CM Swanson
Ninth Annual Conference on Privacy, Security and Trust (PST2011), 2011
An Evaluation of {ECG} use in Cryptography for Implantable Medical Devices and Body Area Networks
M Rushanan, DF Kune, DE Holcomb, CM Swanson
USENIX} Association}, 2014
Algebraic Number Fields and Codes
CM Swanson
Mount Holyoke College, 2006
Crypto,⋆-Veillance, and the Preservation of Dissent
CM Swanson
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20