Ewa Syta

Computer Science Department
Trinity College

Publications


New!

  • Conference: E. Syta, P. Jovanovic, E. Kokoris Kogias, N. Gailly, L. Gasser, I. Khoffi, M. Fischer, and B. Ford, Scalable Bias-Resistant Distributed Randomness, Accepted for S&P (Oakland) 2017 Abstract PDF

Journal Papers

  • E. Syta, A. Johnson, H. Corrigan-Gibbs, S. Weng, D. Wolinsky, and B. Ford, Security Analysis of Accountable Anonymous Group Communication in Dissent, ACM Transactions on Information and System Security (TISSEC), Volume 17 Issue 1 Article No. 4, August 2014. Abstract PDF (extended version) Journal version

  • S. Kurkovsky and E. Syta, Continuous RFID-based Authentication and its Privacy Implications, IEEE Technology and Society Magazine, Summer 2011 (extended version of S. Kurkovsky and E. Syta, Continuous RFID-based Authentication and its Privacy Implications, IEEE International Symposium on Technology and Society: Social Implications of Emerging Technologies)

Peer-reviewed Conference and Workshop Papers

  • E. Syta, P. Jovanovic, E. Kokoris Kogias, N. Gailly, L. Gasser, I. Khoffi, M. Fischer, and B. Ford, Scalable Bias-Resistant Distributed Randomness 38th IEEE Symposium on Security and Privacy (SSP 2017), May 2017. Abstract PDF

  • E. Syta, I. Tamas, D. Visher, D. Wolinsky, L. Gasser, N. Gailly and B. Ford, Keeping Authorities "Honest or Bust'' with Decentralized Witness Cosigning, 37th IEEE Symposium on Security and Privacy (SSP 2016), May 2016. Abstract PDF

  • E. Zhai, D. Wolinsky, R. Chen, E. Syta, C. Teng and B. Ford, AnonRep: Updating Your Reputation Without Identity 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2016), March 2016. Abstract PDF

  • E. Syta, M. Fischer, D. Wolinsky, A. Silberschatz, G. Gallegos Garcia and B. Ford, Private Eyes: Secure Remote Biometric Authentication, 12th International Conference on Security and Cryptography (SECRYPT 2015), July 2015. PDF

  • E. Syta, I. Tamas, D. Visher, D. Wolinsky, and B. Ford, Certificate Cothority: Towards Trustworthy Collective CAs, 8th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2015), July 2015. PDF

  • D. Wolinsky, E. Syta, and B. Ford, Hang With Your Buddies to Resist Intersection Attacks, 20th ACM Conference on Computer and Communications Security (CCS 2013), Berlin, Germany, November 2013. Abstract PDF

  • S. Kurkovsky and E. Syta, Monitoring of Electronic Communications at Universities: Policies and Perceptions of Privacy, 44th Hawaii International Conference on System Sciences, Koloa, Kauai, Hawaii, January 2010.

  • S. Kurkovsky and E. Syta, Approaches and Issues in Location-Aware Continuous Authentication, IEEE International Conference on Computational Science and Engineering, Hong Kong, China, December 2010.

  • S. Kurkovsky and E. Syta, Continuous RFID-based Authentication and its Privacy Implications, IEEE International Symposium on Technology and Society: Social Implications of Emerging Technologies, Wollongong, New South Wales, Australia, June 2010. IEEE Xplore Digital Library, DOI: 10.1109/ISTAS.2010.5514648

  • S. Kurkovsky and E. Syta, Digital Natives and Mobile Phones: A Survey of Practices and Attitudes about Privacy and Security, IEEE International Symposium on Technology and Society: Social Implications of Emerging Technologies, Wollongong, New South Wales, Australia, June 2010. IEEE Xplore Digital Library, DOI: 10.1109/ISTAS.2010.5514610

  • E. Syta, S. Kurkovsky and B. Casano, RFID-based Authentication Middleware for Mobile Devices, 43rd Hawaii International Conference on System Sciences, Koloa, Kauai, Hawaii, January 2010. IEEE Computer Society Digital Library, DOI: 10.1109/HICSS.2010.320

Technical Reports

  • E. Syta, I. Tamas, D. Visher, D. Wolinsky, and B. Ford, Decentralizing Authorities into Scalable Strongest-Link Cothorities, arXiv:1503.08768 March 2015.

  • E. Syta, M. Fischer, D. Wolinsky, A. Silberschatz, G. Gallegos Garcia and B. Ford, Private Eyes: Secure Remote Biometric Authentication (Extended Version) Yale University Technical Report 1510, March 2015.

  • E. Syta, B. Peterson, D. Wolinsky, M. Fischer, and B. Ford, TrustiLeaks: Deniable Anonymous Group Authentication, Yale University Technical Report, January 2013.

  • E. Syta, H. Corrigan-Gibbs, S. Weng, D. Wolinsky, B. Ford and A. Johnson, Security Analysis of Accountable Anonymous Group Communication in Dissent (Extended Version), Yale University Technical Report TR1472, January, 2013. Abstract PDF

  • E. Syta, D. Wolinsky, M. Fischer, A. Silberschatz, B. Ford and G. Gallegos Garcia, Efficient and Privacy-Preserving Biometric Authentication, Yale University Technical Report TR1469, November 14, 2012.

  • M. Fischer, M. Paterson and E. Syta, On Backtracking Resistance in Pseudorandom Bit Generation, Yale University Technical Report TR1466, October 24, 2012.

  • E. Syta, M. Fischer, A. Silberschatz, G. Gallegos Garcia and B. Ford, Strong Theft-Proof Privacy-Preserving Biometric Authentication, Yale University Technical Report TR1455, May 25, 2012.

Posters and Talks

  • Talk: E. Syta, Certificate Cothority: Towards Trustworthy Collective CAs, Trinity College, February 2016

  • Poster: E. Syta, Certificate Cothority: Towards Trustworthy Collective CAs, Rising Stars in EECS Workshop, MIT, November 2015

  • Talk: E. Syta, Decentralizing Authorities into Scalable Strongest-Link Cothorities, Yale University, April 2015

  • Talk: E. Syta, Collective Co-Signing for Scalable Decentralized Services, Mini-Workshop on Ongoing Research Activities Related to Privacy and Security, EPFL, Switzerland, March 2015

  • Poster: E. Syta and B. Ford, Deniable Anonymous Group Authentication, 2013 IEEE Symposium Security and Privacy, May 2013

  • Poster: E. Syta and S. Kurkovsky, RFID-Based Continuous Authentication Framework, Submitted to the IEEE-CT Computing in Connecticut and Beyond Symposium, April 2011.

  • Presentation: E. Syta, RFID-based Authentication Middleware for Mobile Device, 13th Annual Faculty Research Conference "Looking Towards the Future of CSUS Research", Central Connecticut State University, April 17, 2010.

  • Poster: E. Syta, Authentication Methods for Mobile Devices, Graduate Research and Creative Presentation Day at Central Connecticut State University, May, 2009.

  • Poster: E. Syta, Constraint Satisfaction Problem: An Overview and Applications in Artificial Intelligence and Cryptology, Graduate Research and Creative Presentation Day at Central Connecticut State University, May 2008.

  • Presentation: An Application of Zero Knowledge Proofs in the Process of Authentication, Institute of Mathematics of the Polish Academy of Sciences, April 2007. More information:www.impan.pl/Kryptologia