Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1905.13369
Cited By
v1
v2 (latest)
JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT
31 May 2019
Sam Kumar
Yuncong Hu
Michael P. Andersen
Raluca A. Popa
David Culler
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT"
6 / 6 papers shown
Title
IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures
Yohei Watanabe
Naoto Yanai
Junji Shikata
57
1
0
07 Aug 2022
Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA
Ivan De Oliveira Nunes
Seoyeon Hwang
Sashidhar Jakkamsetti
Gene Tsudik
53
8
0
05 May 2022
Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors
Panagiotis Chatzigiannis
Foteini Baldimtsi
C. Kolias
Angelos Stavrou
60
4
0
06 Mar 2021
SafetyPin: Encrypted Backups with Human-Memorable Secrets
Emma Dauterman
Henry Corrigan-Gibbs
David Mazières
31
17
0
13 Oct 2020
Sovereign: User-Controlled Smart Homes
Zhiyi Zhang
Tianyuan Yu
Xinyu Ma
Yuanfeng Guan
Philipp Moll
Lixia Zhang
25
16
0
11 Jun 2020
TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control
Shuai Guo
Anwar Hithnawi
Alexander Viand
Mingming Zhang
Sylvia Ratnasamy
AI4TS
50
34
0
08 Nov 2018
1