Cited By
View all- Rosenberg MMopuri THafezi HMiers IMishra PLuo BLiao XXu JKirda ELie D(2024)Hekaton: Horizontally-Scalable zkSNARKs Via Proof AggregationProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690282(929-940)Online publication date: 2-Dec-2024
- Johnson MSinganamalla SDurand NJang ESevilla SHeimerl KSekar VYu MSeneviratne AVeitch D(2024)dAuth: A Resilient Authentication Architecture for Federated Private Cellular NetworksProceedings of the ACM SIGCOMM 2024 Conference10.1145/3651890.3672263(373-391)Online publication date: 4-Aug-2024
- Alatawi MSaxena NVilela JSchulmann HLi N(2024)Automating Key Fingerprint Comparisons in Secure Mobile Messaging Apps: A Case Study of SignalProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653251(277-288)Online publication date: 19-Jun-2024
- Show More Cited By