Hasini's Views

Human knowledge belongs to the world...

Monday, August 17, 2015

RahasNym: Protecting against Linkability in the Digital Identity Eco System

›
This is the poster paper published and presented on the $subject in IEEE International Conference on Distributed Computing Systems (ICDCS 2...

Privacy Preserving Biometrics-Based and User Centric Authentication Protocol

›
This is my first research paper from grad school. This was published in the 8th International Conference on Network and System Security ( N...
Friday, March 28, 2014

Global Cafe this week: Japan - a country of sushi eating samurai

›
Global Cafe is a very interesting weekly event held at International Center of Purdue University on Friday from 5.30-7.30 PM where students...
Tuesday, February 4, 2014

Presenting Algorithms/Protocols in a neat way using Latex

›
Latex is a very useful tool for scientific writings. It has many cool features to present our writings in a neat manner. I use the TeX Liv...
Monday, October 21, 2013

Random Secrets in Cryptographic Operations

›
Often we might need to generate random secrets and use them in cryptographic operations when we are implementing cryptographic protocols. ...
›
Home
View web version

About Me

Hasini
View my complete profile
Powered by Blogger.