Follow
Ewa Syta
Title
Cited by
Cited by
Year
Omniledger: A secure, scale-out, decentralized ledger via sharding
E Kokoris-Kogias, P Jovanovic, L Gasser, N Gailly, E Syta, B Ford
2018 IEEE symposium on security and privacy (SP), 583-598, 2018
14292018
Scalable bias-resistant distributed randomness
E Syta, P Jovanovic, EK Kogias, N Gailly, L Gasser, I Khoffi, MJ Fischer, ...
2017 IEEE Symposium on Security and Privacy (SP), 444-460, 2017
4082017
Keeping authorities" honest or bust" with decentralized witness cosigning
E Syta, I Tamas, D Visher, DI Wolinsky, P Jovanovic, L Gasser, N Gailly, ...
2016 IEEE Symposium on Security and Privacy (SP), 526-545, 2016
3932016
The tail at store: A revelation from millions of hours of disk and {SSD} deployments
M Hao, G Soundararajan, D Kenchammana-Hosekote, AA Chien, ...
14th USENIX Conference on File and Storage Technologies (FAST 16), 263-276, 2016
241*2016
Digital natives and mobile phones: A survey of practices and attitudes about privacy and security
S Kurkovsky, E Syta
2010 IEEE International Symposium on Technology and Society, 441-449, 2010
962010
Hang with your buddies to resist intersection attacks
DI Wolinsky, E Syta, B Ford
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
622013
Calypso: Private data management for decentralized ledgers
E Kokoris Kogias, EC Alp, L Gasser, PS Jovanovic, E Syta, BA Ford
Proceedings of the VLDB Endowment 14 (4), 586-599, 2021
602021
Calypso: Auditable Sharing of Private Data over Blockchains
E Kokoris-Kogias, EC Alp, SD Siby, N Gailly, L Gasser, P Jovanovic, ...
Cryptology ePrint Archive: 209 https://eprint. iacr. org/2018/209. pdf, 2018
60*2018
Security Analysis of Accountable Anonymity in Dissent
E Syta, H Corrigan-Gibbs, SC Weng, D Wolinsky, B Ford, A Johnson
ACM Transactions on Information and System Security (TISSEC) 17 (1094-9224 …, 2014
352014
RFID-based authentication middleware for mobile devices
E Syta, S Kurkovsky, B Casano
2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010
212010
Continuous RFID-enabled authentication: Privacy implications
S Kurkovsky, E Syta, B Casano
IEEE Technology and Society Magazine 30 (3), 34-41, 2011
192011
Monitoring of electronic communications at universities: Policies and perceptions of privacy
S Kurkovsky, E Syta
2011 44th Hawaii International Conference on System Sciences, 1-10, 2011
182011
Verifiable management of private data under byzantine failures
E Kokoris-Kogias, EC Alp, SD Siby, N Gailly, L Gasser, P Jovanovic, ...
IACR ePrint 209, 2018, 2018
142018
Continuous RFID-enabled authentication and its privacy implications
S Kurkovsky, E Syta, B Casano
2010 IEEE International Symposium on Technology and Society, 103-110, 2010
132010
Decentralizing authorities into scalable strongest-link cothorities
E Syta, I Tamas, D Visher, DI Wolinsky, B Ford
CoRR, abs/1503.08768, 2015
122015
Certificate cothority: Towards trustworthy collective cas
E Syta, I Tamas, D Visher, DI Wolinsky, BA Ford
Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETS), 2015
112015
CTng: Secure Certificate and Revocation Transparency
HLHGESA Herzberg
Cryptology ePrint Archive, 2021
9*2021
Provably Model-Secure PKI Schemes
H Leibowitz, A Herzberg, E Syta
https://eprint.iacr.org/2019/807, 2019
8*2019
Deniable anonymous group authentication
E Syta, B Peterson, DI Wolinsky, M Fischer, B Ford
Retrieved from cpsc. yale. edu, 2014
82014
Approaches and issues in location-aware continuous authentication
S Kurkovsky, E Syta
2010 13th IEEE International Conference on Computational Science and …, 2010
82010
The system can't perform the operation now. Try again later.
Articles 1–20