-
WDYT? Is this publication in scope?
```
@article{Mollakuqe_2024,
author = {Mollakuqe, Elissa and Parduzi, Arber and Rexhepi, Shasivar and Dimitrova, Vesna and Jakupi, Samir and Muharremi, Rilind and …
aewag updated
15 hours ago
-
I see many papers are using Garbled Circuits instead of Secret Sharing. Why did they use the costly GC instead of SS?
-
I want to warn that use of side channels like Lightning and Raiden are not as secure as using Ethereum. If there is any attack you could all of the transaction amount. If you are going to use it, I'd …
-
## Description
This issue proposes investigating Zero-Knowledge Proofs (ZKPs) as a potential replacement for Web3Auth in `Adena` login process and transaction authorization on the blockchain. While W…
-
**Requested feature**
Change enclave shutdown conditions to make the shutdown command more secure.
A way to do that would be to specify who can issue that command or shutdown the enclave after a tim…
-
This is an open discussion of security considerations between a Crestron processor and Crescendo Cloud.
## Communication
All servers, production and development, accept IPSec connections. A demonstra…
-
As far as I can tell the current thread model does not cover attackers who get unauthorized access to a device. Let Alice be the device owner and Bob the Adversary. Once Bob learns `SK_t`, he can imme…
-
Private registry:
* Need a way to let people download directly from a private registry, providing credentials either on the machine or as part of job definition
* Nice to have: Have this all go thro…
-
Here is a low effort ai whitepaper abstracting the idea of a consensus protocol for enhancing the protocol, akin to Paxos:
---
# Whitepaper: Meta Protocol for Self-Applying Software Verification wit…
-
### Singleton kinds
I've added the following papers.
- Deciding type equivalence in a language with singleton kinds (POPL, January 2000) https://doi.org/10.1145/325694.325724
- Deciding Type E…