Vanesa Daza

Orcid: 0000-0003-0583-7929

According to our database1, Vanesa Daza authored at least 67 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Private, Anonymous, Collateralizable Commitments vs. MEV.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

A Blockchain-Based Decentralized and Incentive Compatible Distributed Computing Protocol.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

Accelerating Prolly Trees: Simplified Chunking for Rapid Updates.
Proceedings of the Sixth Distributed Ledger Technology Workshop (DLT 2024), 2024

2023
Dynamic, Private, Anonymous, Collateralizable Commitments vs. MEV.
CoRR, 2023

An Approach for Intelligent Behaviour-Based Threat Modelling with Explanations.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2023

An Automated Market Maker Minimizing Loss-Versus-Rebalancing.
Proceedings of the Mathematical Research for Blockchain Economy: 4th International Conference MARBLE 2023, 2023

Not Enough IoT After All: Visiting Transactional Characteristics of IoT Blockchains.
Proceedings of the Fifth Distributed Ledger Technology Workshop (DLT 2023), 2023

An AMM minimizing user-level extractable value and loss-versus-rebalancing.
Proceedings of the Fifth Distributed Ledger Technology Workshop (DLT 2023), 2023

2022
New Privacy Practices for Blockchain Software.
IEEE Softw., 2022

Offline Scaling of IoT Devices in IOTA Blockchain.
Sensors, 2022

AToM: Active topology monitoring for the bitcoin peer-to-peer network.
Peer-to-Peer Netw. Appl., 2022

Clover: An anonymous transaction relay protocol for the bitcoin P2P network.
Peer-to-Peer Netw. Appl., 2022

Diamonds are Forever, Loss-Versus-Rebalancing is Not.
IACR Cryptol. ePrint Arch., 2022

FairTraDEX: A Decentralised Exchange Preventing Value Extraction.
IACR Cryptol. ePrint Arch., 2022

Do not rug on me: zero-dimensional scam detection.
IACR Cryptol. ePrint Arch., 2022

Leveled Multikey FHE with constant-size ciphertexts from RLWE.
IACR Cryptol. ePrint Arch., 2022

Marvel DC: A Blockchain-Based Decentralized and Incentive-Compatible Distributed Computing Protocol.
CoRR, 2022

FORT: Right-proving and Attribute-blinding Self-sovereign Authentication.
CoRR, 2022

SoK: Network-Level Attacks on the Bitcoin P2P Network.
IEEE Access, 2022

FairTraDEX: A Decentralised Exchange Preventing Value Extraction.
Proceedings of the 2022 ACM CCS Workshop on Decentralized Finance and Security, 2022

Price of MEV: Towards a Game Theoretical Approach to MEV.
Proceedings of the 2022 ACM CCS Workshop on Decentralized Finance and Security, 2022

2021
ZPiE: Zero-knowledge Proofs in Embedded systems.
IACR Cryptol. ePrint Arch., 2021

Mutual Accountability Layer: Accountable Anonymity within Accountable Trust.
IACR Cryptol. ePrint Arch., 2021

A trust module for the interaction with virtual characters.
Proceedings of the 7th International Conference on Systems and Informatics, 2021

Achieving state machine replication without honest players.
Proceedings of the AFT '21: 3rd ACM Conference on Advances in Financial Technologies, Arlington, Virginia, USA, September 26, 2021

2020
SANS: Self-Sovereign Authentication for Network Slices.
Secur. Commun. Networks, 2020

Achieving State Machine Replication without Honesty Assumptions.
IACR Cryptol. ePrint Arch., 2020

Updateable Inner Product Argument with Logarithmic Verifier and Applications.
IACR Cryptol. ePrint Arch., 2020

Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems.
Proceedings of the Financial Cryptography and Data Security, 2020

Improving Bitcoin Transaction Propagation by Leveraging Unreachable Nodes.
Proceedings of the IEEE International Conference on Blockchain, 2020

2019
Shorter Quadratic QA-NIZK Proofs.
IACR Cryptol. ePrint Arch., 2019

LASER: Lightweight And SEcure Remote keyless entry protocol (Extended version).
CoRR, 2019

LASER: Lightweight and Secure Remote Keyless Entry Protocol.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2017
Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions.
IACR Cryptol. ePrint Arch., 2017

CONNECT: CONtextual NamE disCovery for blockchain-based services in the IoT.
Proceedings of the IEEE International Conference on Communications, 2017

CoLLIDE: CLoud Latency-based IDEntification.
Proceedings of the 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2017) / The 7th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2017) / Affiliated Workshops, 2017

2016
FRoDO: Fraud Resilient Device for Off-Line Micro-Payments.
IEEE Trans. Dependable Secur. Comput., 2016

2015
A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs).
RFC, January, 2015

Smart User Authentication for an Improved Data Privacy.
Proceedings of the Advanced Research in Data Privacy, 2015

Exploring the Effectiveness of Video Viewing in an Introductory x-MOOC of Algebra.
Proceedings of the Trends in Digital Education: Selected papers from EC-TEL 2015 Workshops CHANGEE, 2015

2014
Performance analysis of a Multiuser Multi-Packet Transmission system for WLANs in non-saturation conditions.
Comput. Networks, 2014

FORCE - Fully Off-line secuRe CrEdits for Mobile Micro Payments.
Proceedings of the SECRYPT 2014, 2014

SOLDI: Secure Off-Line Disposable CredIts to Secure Mobile Micro Payments.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

2012
Queueing Analysis in Multiuser Multi-Packet Transmission Systems Using Spatial Multiplexing
CoRR, 2012

2011
An Approximate Queueing Model for Multi-Rate Multi-User MIMO Systems.
IEEE Commun. Lett., 2011

Buffer Sizing in TxSDMA Systems.
Proceedings of the Multiple Access Communications - 4th International Workshop, 2011

2010
Extensions of access structures and their cryptographic applications.
Appl. Algebra Eng. Commun. Comput., 2010

2009
Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2009

Flaws in some self-healing key distribution schemes with revocation.
Inf. Process. Lett., 2009

2008
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes.
IEEE Trans. Inf. Theory, 2008

On the Computational Security of a Distributed Key Distribution Scheme.
IEEE Trans. Computers, 2008

Extended Access Structures and Their Cryptographic Applications.
IACR Cryptol. ePrint Arch., 2008

2007
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts.
IACR Cryptol. ePrint Arch., 2007

Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts.
Proceedings of theThird Workshop on Cryptography for Ad-hoc Networks, 2007

A distributed architecture for scalable private RFID tag identification.
Comput. Networks, 2007

Cryptographic techniques for mobile ad-hoc networks.
Comput. Networks, 2007

An Incentive-Based System for Information Providers over Peer-to-Peer Mobile Ad-Hoc Networks.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2007

On Partial Anonymity in Secret Sharing.
Proceedings of the Public Key Infrastructure, 2007

2006
On Dynamic Distribution of Private Keys over MANETs.
Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, 2006

Privacy homomorphisms for e-gambling and mental poker.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

2004
Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures.
Theor. Comput. Sci., 2004

Protocols useful on the Internet from distributed signature schemes.
Int. J. Inf. Sec., 2004

On codes, matroids and secure multi-party computation from linear secret sharing schemes.
IACR Cryptol. ePrint Arch., 2004

2003
Some Protocols Useful on the Internet from Threshold Signature Schemes.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Some Applications of Threshold Signature Schemes to Distributed Protocols.
IACR Cryptol. ePrint Arch., 2002

A Distributed and Computationally Secure Key Distribution Scheme.
IACR Cryptol. ePrint Arch., 2002


  Loading...