For the past three decades, a wide variety of cryptographic protocols have been proposed to solve secure communication problems even in the presence of adver-saries. The range of this work varies from developing basic security primitives pro-viding confidentiality and authenticity to solving more complex, application-specific problems. However, when these protocols are deployed in practice, a significant challenge is to ensure not just security but also privacy throughout these protocols’ lifetime. As computer-based devices are more widely used and the Internet is more globally accessible, new types of applications and new types of privacy threats are being introduced. In addition, user privacy (or equivalently, key privacy) is more likely ...
The Internet has consolidated itself as a very powerful platform that has changed the communication ...
The Internet has consolidated itself as a very powerful platform that has changed the communication ...
The increasingly distributed nature of many current and future technologies has introduced many chal...
For the past three decades, a wide variety of cryptographic protocols have been proposed to solve se...
Cryptographic protocols aim at securing communications over insecure networks such as the Internet, ...
With the advancement in Internet-based technologies, network applications are no longer just limited...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
In distributed systems users often need to share sensitive data with other users based on the latter...
• Two papers published with partial results of this dissertation [1], [2]. • Laureated for the achie...
My research interests lie at the intersection of cryptographic research, and systems security and pr...
The modern internet and phone networks offer very little security, privacy, or accountability to the...
The increasingly distributed nature of many current and future technologies has introduced many chal...
The Internet has consolidated itself as a very powerful platform that has changed the communication ...
The Internet has consolidated itself as a very powerful platform that has changed the communication ...
The increasingly distributed nature of many current and future technologies has introduced many chal...
For the past three decades, a wide variety of cryptographic protocols have been proposed to solve se...
Cryptographic protocols aim at securing communications over insecure networks such as the Internet, ...
With the advancement in Internet-based technologies, network applications are no longer just limited...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
In distributed systems users often need to share sensitive data with other users based on the latter...
• Two papers published with partial results of this dissertation [1], [2]. • Laureated for the achie...
My research interests lie at the intersection of cryptographic research, and systems security and pr...
The modern internet and phone networks offer very little security, privacy, or accountability to the...
The increasingly distributed nature of many current and future technologies has introduced many chal...
The Internet has consolidated itself as a very powerful platform that has changed the communication ...
The Internet has consolidated itself as a very powerful platform that has changed the communication ...
The increasingly distributed nature of many current and future technologies has introduced many chal...