- Blockchain Technology Applications and Security
- Cryptography and Data Security
- User Authentication and Security Systems
- Cardiac electrophysiology and arrhythmias
- Heart Failure Treatment and Management
- Art History and Market Analysis
- Complexity and Algorithms in Graphs
- Security in Wireless Sensor Networks
- Cardiac pacing and defibrillation studies
- Museums and Cultural Heritage
- Advanced Steganography and Watermarking Techniques
Meta (United States)
2021
Non-fungible tokens (NFTs) make it technically possible for digital assets to be owned and traded, introducing the concept of scarcity in realm first time. Resulting from this technical development, paper asks question, do they provide an opportunity fundraising galleries, libraries, archives museums (GLAM), by selling ownership copies their collections? Although NFTs current format were invented 2017 as a means game players trade virtual goods, reached mainstream 2021, when auction house...
For many users, a private key based wallet serves as the primary entry point to blockchains. Commonly recommended authentication methods, such mnemonics or hardware wallets, can be cumbersome. This difficulty in user onboarding has significantly hindered adoption of blockchain-based applications.We develop zkLogin, novel technique that leverages identity tokens issued by popular platforms (any OpenID Connect enabled platform e.g., Google, Facebook, etc.) authenticate transactions. At heart...
For many users, a private key based wallet serves as the primary entry point to blockchains. Commonly recommended authentication methods, such mnemonics or hardware wallets, can be cumbersome. This difficulty in user onboarding has significantly hindered adoption of blockchain-based applications. We develop zkLogin, novel technique that leverages identity tokens issued by popular platforms (any OpenID Connect enabled platform e.g., Google, Facebook, etc.) authenticate transactions. At heart...
In the rapidly evolving fields of encryption and blockchain technologies, efficiency security cryptographic schemes significantly impact performance. This paper introduces a comprehensive framework for continuous benchmarking in one most popular cryptography Rust libraries, \textttfastcrypto. What makes our analysis unique is realization that automated not just performance monitor optimization tool, but it can be used cryptanalysis innovation discovery as well. Surprisingly, benchmarks...