Follow
Colleen M. Swanson
Colleen M. Swanson
Unknown affiliation
Verified email at travellingcryptographer.com - Homepage
Title
Cited by
Cited by
Year
SoK: Security and privacy in implantable medical devices and body area networks
M Rushanan, AD Rubin, DF Kune, CM Swanson
Security and Privacy (SP), 2014 IEEE Symposium on, 524-539, 2014
3542014
TapDance: End-to-Middle Anticensorship without Flow Blocking.
E Wustrow, C Swanson, JA Halderman
USENIX Security Symposium, 159-174, 2014
942014
Security in key agreement: Two-party certificateless schemes
CM Swanson
University of Waterloo, 2008
792008
A study of two-party certificateless authenticated key-agreement protocols
CM Swanson, D Jao
Progress in Cryptology-INDOCRYPT 2009, 57-71, 2009
752009
SOK: Making sense of censorship resistance systems
S Khattak, T Elahi, L Simon, CM Swanson, SJ Murdoch, I Goldberg
Proceedings on Privacy Enhancing Technologies 2016 (4), 37-61, 2016
632016
Unconditionally secure signature schemes revisited
CM Swanson, D Stinson
Information Theoretic Security, 100-116, 2011
47*2011
Combinatorial solutions providing improved security for the generalized Russian cards problem
CM Swanson, DR Stinson
Designs, Codes and Cryptography 72 (2), 345-367, 2014
252014
Naïve Security in a Wi-Fi World
CM Swanson, R Urner, E Lank
Trust Management IV, 32-47, 2010
192010
Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval.
CM Swanson, DR Stinson
Advances in Mathematics of Communications 6 (4), 2012
122012
Extended results on privacy against coalitions of users in user-private information retrieval protocols
CM Swanson, DR Stinson
Cryptography and Communications 7 (4), 415-437, 2015
102015
Slipping past the cordon: A systematization of Internet censorship resistance
T Elahi, CM Swanson, I Goldberg
Centre for Applied Cryptographic Research (CACR), University of Waterloo …, 2015
102015
Additional Constructions to Solve the Generalized Russian Cards Problem using Combinatorial Designs
CM Swanson, DR Stinson
arXiv preprint arXiv:1401.1526, 2014
92014
Efficient Hierarchical Quorums in Unstructured Peer-to-Peer Networks
K Henry, CM Swanson, Q Xie, K Daudjee
On the Move to Meaningful Internet Systems: OTM 2009, 183-200, 2009
82009
A new look at an old construction: constructing (simple) 3-designs from resolvable 2-designs
DR Stinson, CM Swanson, T Van Trung
Discrete Mathematics 325, 23-31, 2014
72014
Unconditionally secure signature schemes revisited
CM Swanson, DR Stinson
Journal of Mathematical Cryptology 10 (1), 35-67, 2016
22016
Unconditionally Secure Cryptography: Signature Schemes, User-Private Information Retrieval, and the Generalized Russian Cards Problem
CM Swanson
University of Waterloo, 2013
12013
User-private information retrieval
DR Stinson, CM Swanson
Ninth Annual Conference on Privacy, Security and Trust (PST2011), 2011
12011
An Evaluation of {ECG} use in Cryptography for Implantable Medical Devices and Body Area Networks
M Rushanan, DF Kune, DE Holcomb, CM Swanson
USENIX} Association}, 2014
2014
Algebraic Number Fields and Codes
CM Swanson
Mount Holyoke College, 2006
2006
Crypto,⋆-Veillance, and the Preservation of Dissent
CM Swanson
The system can't perform the operation now. Try again later.
Articles 1–20