Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kate, Aniket
add a person with the name Kate, Aniket
 

Other publications of authors with the same name

PathShuffle: Credit Mixing and Anonymous Payments for Ripple., , and . PoPETs, 2017 (3): 110 (2017)Pairing-Based Onion Routing with Improved Forward Secrecy., , and . ACM Trans. Inf. Syst. Secur., 13 (4): 29:1-29:32 (2010)Mind Your Credit: Assessing the Health of the Ripple Credit Network., , , , and . WWW, page 329-338. ACM, (2018)Lime: Data Lineage in the Malicious Environment., , and . STM, volume 8743 of Lecture Notes in Computer Science, page 183-187. Springer, (2014)Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions., , , and . NDSS, The Internet Society, (2018)BackRef: Accountability in Anonymous Communication Networks., , , , and . ACNS, volume 8479 of Lecture Notes in Computer Science, page 380-400. Springer, (2014)Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup., , , , and . Public Key Cryptography (1), volume 11442 of Lecture Notes in Computer Science, page 286-313. Springer, (2019)Distributed Private-Key Generators for Identity-Based Cryptography., and . SCN, volume 6280 of Lecture Notes in Computer Science, page 436-453. Springer, (2010)Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two., , , and . IEEE Symposium on Security and Privacy, page 108-126. IEEE Computer Society, (2018)A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains., , , , , and . CoRR, (2019)