Mixnets on a Tightrope: Quantifying the Leakage of Mix Networks Using a Provably Optimal Heuristic Adversary
View More Papers
Optimizing Trust-Centric Authentication in Matter-enabled IoT Devices with PUF...
Chandranshu Gupta, Gaurav Varshney (IIT Jammu)
Read MoreOn the Robustness of LDP Protocols for Numerical Attributes...
Xiaoguang Li (Xidian University, Purdue University), Zitao Li (Alibaba Group (U.S.) Inc.), Ninghui Li (Purdue University), Wenhai Sun (Purdue University, West Lafayette, USA)
Read MoreNDSS Symposium 2025 Welcome and Opening Remarks
General Chairs: David Balenson, USC Information Sciences Institute and Heng Yin, University of California, Riverside Program Chairs: Christina Pöpper, New York University Abu Dhabi and Hamed Okhravi, MIT Lincoln Laboratory Artifact Evaluation Chairs: Daniele Cono D’Elia, Sapienza University and Mathy Vanhoef, KU Leuven
Read More