Hasini's Views
Human knowledge belongs to the world...
Monday, August 17, 2015
RahasNym: Protecting against Linkability in the Digital Identity Eco System
›
This is the poster paper published and presented on the $subject in IEEE International Conference on Distributed Computing Systems (ICDCS 2...
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
›
This is my first research paper from grad school. This was published in the 8th International Conference on Network and System Security ( N...
Friday, March 28, 2014
Global Cafe this week: Japan - a country of sushi eating samurai
›
Global Cafe is a very interesting weekly event held at International Center of Purdue University on Friday from 5.30-7.30 PM where students...
Tuesday, February 4, 2014
Presenting Algorithms/Protocols in a neat way using Latex
›
Latex is a very useful tool for scientific writings. It has many cool features to present our writings in a neat manner. I use the TeX Liv...
Monday, October 21, 2013
Random Secrets in Cryptographic Operations
›
Often we might need to generate random secrets and use them in cryptographic operations when we are implementing cryptographic protocols. ...
›
Home
View web version