All Stories

  1. Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Email Service Provider
  2. A Worldwide View on the Reachability of Encrypted DNS Services
  3. An Accuracy-Lossless Perturbation Method for Defending Privacy Attacks in Federated Learning
  4. Efficient multiple sources network coding signature in the standard model
  5. Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
  6. Multi-Use Unidirectional Proxy Re-Encryption
  7. Unidirectional Identity-Based Proxy Re-Signature
  8. Identity-Based Conditional Proxy Re-Encryption
  9. Anonymous proxy re-encryption
  10. Proxy re-encryption with keyword search
  11. An improved deniable authentication protocol