Colleen M. Swanson
Colleen M. Swanson
Zugehörigkeit unbekannt
Bestätigte E-Mail-Adresse bei travellingcryptographer.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
SoK: Security and privacy in implantable medical devices and body area networks
M Rushanan, AD Rubin, DF Kune, CM Swanson
Security and Privacy (SP), 2014 IEEE Symposium on, 524-539, 2014
2152014
Security in key agreement: Two-party certificateless schemes
CM Swanson
University of Waterloo, 2008
692008
A study of two-party certificateless authenticated key-agreement protocols
CM Swanson, D Jao
Progress in Cryptology-INDOCRYPT 2009, 57-71, 2009
642009
TapDance: End-to-Middle Anticensorship without Flow Blocking.
E Wustrow, C Swanson, JA Halderman
USENIX Security Symposium, 159-174, 2014
632014
Unconditionally secure signature schemes revisited
CM Swanson, D Stinson
Information Theoretic Security, 100-116, 2011
35*2011
SOK: Making sense of censorship resistance systems
S Khattak, T Elahi, L Simon, CM Swanson, SJ Murdoch, I Goldberg
Proceedings on Privacy Enhancing Technologies 2016 (4), 37-61, 2016
292016
Combinatorial solutions providing improved security for the generalized Russian cards problem
CM Swanson, DR Stinson
Designs, Codes and Cryptography 72 (2), 345-367, 2014
192014
Naïve Security in a Wi-Fi World
CM Swanson, R Urner, E Lank
Trust Management IV, 32-47, 2010
142010
Slipping past the cordon: A systematization of Internet censorship resistance
T Elahi, CM Swanson, I Goldberg
Centre for Applied Cryptographic Research (CACR), University of Waterloo …, 2015
82015
Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval.
CM Swanson, DR Stinson
Advances in Mathematics of Communications 6 (4), 2012
82012
A new look at an old construction: constructing (simple) 3-designs from resolvable 2-designs
DR Stinson, CM Swanson, T Van Trung
Discrete Mathematics 325, 23-31, 2014
72014
Efficient Hierarchical Quorums in Unstructured Peer-to-Peer Networks
K Henry, CM Swanson, Q Xie, K Daudjee
On the Move to Meaningful Internet Systems: OTM 2009, 183-200, 2009
72009
Additional Constructions to Solve the Generalized Russian Cards Problem using Combinatorial Designs
CM Swanson, DR Stinson
arXiv preprint arXiv:1401.1526, 2014
62014
Extended results on privacy against coalitions of users in user-private information retrieval protocols
CM Swanson, DR Stinson
Cryptography and Communications 7 (4), 415-437, 2015
42015
Unconditionally Secure Cryptography: Signature Schemes, User-Private Information Retrieval, and the Generalized Russian Cards Problem
CM Swanson
University of Waterloo, 2013
12013
User-private information retrieval
DR Stinson, CM Swanson
Ninth Annual Conference on Privacy, Security and Trust (PST2011), 2011
12011
Unconditionally secure signature schemes revisited
CM Swanson, DR Stinson
Journal of Mathematical Cryptology 10 (1), 35-67, 2016
2016
An Evaluation of {ECG} use in Cryptography for Implantable Medical Devices and Body Area Networks
M Rushanan, DF Kune, DE Holcomb, CM Swanson
USENIX} Association}, 2014
2014
Algebraic Number Fields and Codes
CM Swanson
Mount Holyoke College, 2006
2006
Crypto,⋆-Veillance, and the Preservation of Dissent
CM Swanson
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20