Time-Lock Puzzles (TLPs) are cryptographic protocols that enable a clien...
In Private Set Intersection protocols (PSIs), a non-empty result always
...
Two-factor authentication (2FA) schemes that rely on a combination of
kn...
Fair exchange protocols let two mutually distrustful parties exchange di...
The malware and botnet phenomenon is among the most significant threats ...
Cybercrime is a complex phenomenon that spans both technical and human
a...
The sharing of personal data has the potential to bring substantial bene...