Colleen Swanson

According to our database1, Colleen Swanson authored at least 14 papers between 2009 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
SoK: Making Sense of Censorship Resistance Systems.
Proc. Priv. Enhancing Technol., 2016

Unconditionally secure signature schemes revisited.
J. Math. Cryptol., 2016

2015
Extended results on privacy against coalitions of users in user-private information retrieval protocols.
Cryptogr. Commun., 2015

2014
A new look at an old construction: Constructing (simple) 3-designs from resolvable 2-designs.
Discret. Math., 2014

Combinatorial solutions providing improved security for the generalized Russian cards problem.
Des. Codes Cryptogr., 2014

Additional Constructions to Solve the Generalized Russian Cards Problem using Combinatorial Designs.
Electron. J. Comb., 2014

TapDance: End-to-Middle Anticensorship without Flow Blocking.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

2013
Unconditionally Secure Cryptography: Signature Schemes, User-Private Information Retrieval, and the Generalized Russian Cards Problem.
PhD thesis, 2013

2012
Extended combinatorial constructions for peer-to-peer user-private information retrieval.
Adv. Math. Commun., 2012

2011
Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieva
CoRR, 2011

2010
Naïve Security in a Wi-Fi World.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

2009
Efficient Hierarchical Quorums in Unstructured Peer-to-Peer Networks.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols.
Proceedings of the Progress in Cryptology, 2009


  Loading...