Adam Bender
YOU?
Author Swipe
View article: Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles
Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles Open
View article: A Secure DHT via the Pigeonhole Principle
A Secure DHT via the Pigeonhole Principle Open
The standard Byzantine attack model assumes no more than some xed fraction of the participants are faulty. This assumption does not accurately apply to peer-to-peer settings, where Sybil attacks and botnets are realistic threats. We propos…
View article: Ring Signatures: Stronger Definitions, and Constructions without Random Oracles
Ring Signatures: Stronger Definitions, and Constructions without Random Oracles Open
View article: THE DESIGN OF THE MIRAGE SPATIAL WIKI
THE DESIGN OF THE MIRAGE SPATIAL WIKI Open