Media reports show an alarming increase of data breaches at providers of...
Authorization is challenging in distributed systems that cannot rely on ...
Privacy preference signals allow users to express preferences over how t...
We mine the leaked history of trades on Mt. Gox, the dominant Bitcoin
ex...
Boundary samples are special inputs to artificial neural networks crafte...
Deep fakes became extremely popular in the last years, also thanks to th...
Privacy preference signals are digital representations of how users want...
We propose methods to infer properties of the execution environment of
m...
A key component of security in decentralized blockchains is proof of
opp...
We propose protocols to resolve the tension between anonymity and
accoun...
TR-069 is a standard for the remote management of end-user devices by se...
We outline a metacircular argument explaining why it is rational to be
i...
The European Union's General Data Protection Regulation (GDPR) requires ...
We build a bridge between the notions of Byzantine and Nakamoto consensu...
Efficient transfers to many recipients present a host of issues on Ether...
We propose and compare two approaches to identify smart contracts as tok...
Adversarial classification is the task of performing robust classificati...