Search
Now showing items 1-3 of 3
Formalizing swarm security
(2022-01-24)
Cheap, capable processors are becoming readily available,
and these are being deployed to a wide variety of applications, ranging
from internet-enabled refrigerators to swarms of specialised drones. As
often is the case ...
Security for Autonomous and Unmanned Devices: Cryptography and its Limits
(2022-02-07)
We survey existing literature on protecting resource constrained autonomous and unmanned devices. The goal is to secure data both during transmission and at rest, also when facing highly skilled and motivated adversaries. ...
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing
(2022-10-22)
Anonymous single-use tokens have seen recent applications in private Internet browsing and anonymous statistics collection. We develop new schemes in order to include public metadata such as expiration dates for tokens. ...