Ewa Syta

Orcid: 0000-0003-0860-0927

Affiliations:
  • Trinity College, Hartford, USA


According to our database1, Ewa Syta authored at least 22 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
QuePaxa: Escaping the tyranny of timeouts in consensus.
Proceedings of the 29th Symposium on Operating Systems Principles, 2023

2022
Baxos: Backing off for Robust and Efficient Consensus.
CoRR, 2022

2021
CTng: Secure Certificate and Revocation Transparency.
IACR Cryptol. ePrint Arch., 2021

MoSS: Modular Security Specifications Framework.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
CALYPSO: Private Data Management for Decentralized Ledgers.
Proc. VLDB Endow., 2020

The Modular Specifications Security Framework.
IACR Cryptol. ePrint Arch., 2020

Que Sera Consensus: Simple Asynchronous Agreement with Private Coins and Threshold Logical Clocks.
CoRR, 2020

2019
Provable Security for PKI Schemes.
IACR Cryptol. ePrint Arch., 2019

2018
OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2016
Scalable Bias-Resistant Distributed Randomness.
IACR Cryptol. ePrint Arch., 2016

Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

AnonRep: Towards Tracking-Resistant Anonymous Reputation.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

2015
Decentralizing Authorities into Scalable Strongest-Link Cothorities.
CoRR, 2015

Private Eyes: Secure Remote Biometric Authentication.
Proceedings of the SECRYPT 2015, 2015

2014
Security Analysis of Accountable Anonymity in Dissent.
ACM Trans. Inf. Syst. Secur., 2014

2013
Hang with your buddies to resist intersection attacks.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2011
Continuous RFID-Enabled Authentication: Privacy Implications.
IEEE Technol. Soc. Mag., 2011

Monitoring of Electronic Communications at Universities: Policies and Perceptions of Privacy.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
Continuous RFID-enabled authentication and its privacy implications.
Proceedings of the 2010 IEEE International Symposium on Technology and Society, 2010

Digital natives and mobile phones: A survey of practices and attitudes about privacy and security.
Proceedings of the 2010 IEEE International Symposium on Technology and Society, 2010

RFID-Based Authentication Middleware for Mobile Devices.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Approaches and Issues in Location-Aware Continuous Authentication.
Proceedings of the 13th IEEE International Conference on Computational Science and Engineering, 2010


  Loading...