SoK: Security and privacy in implantable medical devices and body area networks M Rushanan, AD Rubin, DF Kune, CM Swanson Security and Privacy (SP), 2014 IEEE Symposium on, 524-539, 2014 | 373 | 2014 |
TapDance: End-to-Middle Anticensorship without Flow Blocking. E Wustrow, C Swanson, JA Halderman USENIX Security Symposium, 159-174, 2014 | 100 | 2014 |
Security in key agreement: Two-party certificateless schemes CM Swanson University of Waterloo, 2008 | 78 | 2008 |
A study of two-party certificateless authenticated key-agreement protocols CM Swanson, D Jao Progress in Cryptology-INDOCRYPT 2009, 57-71, 2009 | 73 | 2009 |
SOK: Making sense of censorship resistance systems S Khattak, T Elahi, L Simon, CM Swanson, SJ Murdoch, I Goldberg Proceedings on Privacy Enhancing Technologies 2016 (4), 37-61, 2016 | 72 | 2016 |
Unconditionally secure signature schemes revisited CM Swanson, D Stinson Information Theoretic Security, 100-116, 2011 | 48* | 2011 |
Combinatorial solutions providing improved security for the generalized Russian cards problem CM Swanson, DR Stinson Designs, Codes and Cryptography 72 (2), 345-367, 2014 | 25 | 2014 |
Naïve Security in a Wi-Fi World CM Swanson, R Urner, E Lank Trust Management IV, 32-47, 2010 | 19 | 2010 |
Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval. CM Swanson, DR Stinson Advances in Mathematics of Communications 6 (4), 2012 | 14 | 2012 |
Extended results on privacy against coalitions of users in user-private information retrieval protocols CM Swanson, DR Stinson Cryptography and Communications 7 (4), 415-437, 2015 | 12 | 2015 |
Slipping past the cordon: A systematization of Internet censorship resistance T Elahi, CM Swanson, I Goldberg Centre for Applied Cryptographic Research (CACR), University of Waterloo …, 2015 | 10 | 2015 |
Additional Constructions to Solve the Generalized Russian Cards Problem using Combinatorial Designs CM Swanson, DR Stinson arXiv preprint arXiv:1401.1526, 2014 | 9 | 2014 |
Efficient Hierarchical Quorums in Unstructured Peer-to-Peer Networks K Henry, CM Swanson, Q Xie, K Daudjee On the Move to Meaningful Internet Systems: OTM 2009, 183-200, 2009 | 8 | 2009 |
A new look at an old construction: constructing (simple) 3-designs from resolvable 2-designs DR Stinson, CM Swanson, T Van Trung Discrete Mathematics 325, 23-31, 2014 | 7 | 2014 |
Unconditionally secure signature schemes revisited CM Swanson, DR Stinson Journal of Mathematical Cryptology 10 (1), 35-67, 2016 | 2 | 2016 |
Unconditionally Secure Cryptography: Signature Schemes, User-Private Information Retrieval, and the Generalized Russian Cards Problem CM Swanson University of Waterloo, 2013 | 1 | 2013 |
User-private information retrieval DR Stinson, CM Swanson Ninth Annual Conference on Privacy, Security and Trust (PST2011), 2011 | 1 | 2011 |
An Evaluation of {ECG} use in Cryptography for Implantable Medical Devices and Body Area Networks M Rushanan, DF Kune, DE Holcomb, CM Swanson USENIX} Association}, 2014 | | 2014 |
Algebraic Number Fields and Codes CM Swanson Mount Holyoke College, 2006 | | 2006 |
Crypto,⋆-Veillance, and the Preservation of Dissent CM Swanson | | |