Ewa Syta

Computer Science Department
Trinity College


Publications

New!

  • CTng: Secure Certificate and Revocation Transparency, J. Kong, D. James, H. Leibowitz, E. Syta, and A Herzberg, Network and Distributed System Security Symposium (NDSS 2026), Abstract PDF

  • Unveiling Privacy Risks in Quantum Optimization Services, M. Lesniak, M. Wronski, E. Syta, and M. Kutylowski, ACM Asia Conference on Computer and Communications Security (Asia CCS 2025) Abstract PDF

Journal Papers

  • E. Syta, A. Johnson, H. Corrigan-Gibbs, S. Weng, D. Wolinsky, and B. Ford, Security Analysis of Accountable Anonymous Group Communication in Dissent, ACM Transactions on Information and System Security (TISSEC), Volume 17 Issue 1 Article No. 4, August 2014. Abstract PDF (extended version) Journal version

  • S. Kurkovsky and E. Syta, Continuous RFID-based Authentication and its Privacy Implications, IEEE Technology and Society Magazine, Summer 2011 (extended version of S. Kurkovsky and E. Syta, Continuous RFID-based Authentication and its Privacy Implications, IEEE International Symposium on Technology and Society: Social Implications of Emerging Technologies)

Conference and Workshop Papers

  • CTng: Secure Certificate and Revocation Transparency, J. Kong, D. James, H. Leibowitz, E. Syta, and A Herzberg, Network and Distributed System Security Symposium (NDSS 2026), Abstract PDF

  • Unveiling Privacy Risks in Quantum Optimization Services, M. Lesniak, M. Wronski, E. Syta, and M. Kutylowski, ACM Asia Conference on Computer and Communications Security (Asia CCS 2025) Abstract PDF

  • Provably Secure PKI Schemes, S. Wrotniak, H. Leibowitz, E. Syta, A. Herzberg, ACM Conference on Computer and Communications Security (CCS 2024), Abstract PDF

  • Baxos: Backing off for Robust and Efficient Consensus, P. Tennage, C. Basescu, E. Kokoris Kogias, E. Syta, P. Jovanovic, B. Ford, ACM Symposium on Operating Systems Principles (SOSP 2023), Abstract PDF

  • H. Leibowitz, A. Herzberg, E. Syta and S. Wrotniak, MoSS: Modular Specifications Security Framework, Annual International Cryptology Conference, August 2021 (CRYPTO 2021) Abstract PDF

  • E. Kokoris-Kogias, E. Ceyhun Alp, L. Gasser, P. Jovanovic, E. Syta and B. Ford, Calypso: Private Data Management for Decentralized Ledgers, 47th International Conference on Very Large Data Bases (VLDB 2021), August 2021 Abstract PDF

  • E. Kokoris-Kogias, P. Jovanovic, L. Gasser, N. Gailly, E. Syta and B. Ford. OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding, 39th IEEE Symposium on Security and Privacy (SSP 2018), May 2018. Abstract PDF

  • E. Kokoris-Kogias, P. Jovanovic, L. Gasser, N. Gailly, E. Syta, B. Ford, Scalable and Efficient Distributed Ledgers, 1st Crypto Economics Security Conference (CESC 2017), UC Berkeley, October 2017 (no proceedings)

  • E. Syta, P. Jovanovic, E. Kokoris Kogias, N. Gailly, L. Gasser, I. Khoffi, M. Fischer, and B. Ford, Scalable Bias-Resistant Distributed Randomness, 1st Crypto Economics Security Conference (CESC 2017), UC Berkeley, October 2017 (no proceedings)

  • E. Syta, P. Jovanovic, E. Kokoris Kogias, N. Gailly, L. Gasser, I. Khoffi, M. Fischer, and B. Ford, Scalable Bias-Resistant Distributed Randomness 38th IEEE Symposium on Security and Privacy (SSP 2017), May 2017. Abstract PDF

  • E. Syta, I. Tamas, D. Visher, D. Wolinsky, L. Gasser, N. Gailly and B. Ford, Keeping Authorities "Honest or Bust'' with Decentralized Witness Cosigning, 37th IEEE Symposium on Security and Privacy (SSP 2016), May 2016. Abstract PDF

  • E. Zhai, D. Wolinsky, R. Chen, E. Syta, C. Teng and B. Ford, AnonRep: Towards Tracking-Resistant Anonymous Reputation, 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2016), March 2016. Abstract PDF

  • E. Syta, M. Fischer, D. Wolinsky, A. Silberschatz, G. Gallegos Garcia and B. Ford, Private Eyes: Secure Remote Biometric Authentication, 12th International Conference on Security and Cryptography (SECRYPT 2015), July 2015. PDF

  • E. Syta, I. Tamas, D. Visher, D. Wolinsky, and B. Ford, Certificate Cothority: Towards Trustworthy Collective CAs, 8th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2015), July 2015. PDF

  • D. Wolinsky, E. Syta, and B. Ford, Hang With Your Buddies to Resist Intersection Attacks, 20th ACM Conference on Computer and Communications Security (CCS 2013). Abstract PDF

  • S. Kurkovsky and E. Syta, Monitoring of Electronic Communications at Universities: Policies and Perceptions of Privacy, 44th Hawaii International Conference on System Sciences (HICSS 2010).

  • S. Kurkovsky and E. Syta, Approaches and Issues in Location-Aware Continuous Authentication, IEEE International Conference on Computational Science and Engineering (2010).

  • S. Kurkovsky and E. Syta, Continuous RFID-based Authentication and its Privacy Implications, IEEE International Symposium on Technology and Society: Social Implications of Emerging Technologies, Wollongong, New South Wales, Australia, June 2010. IEEE Xplore Digital Library, DOI: 10.1109/ISTAS.2010.5514648

  • S. Kurkovsky and E. Syta, Digital Natives and Mobile Phones: A Survey of Practices and Attitudes about Privacy and Security, IEEE International Symposium on Technology and Society: Social Implications of Emerging Technologies, Wollongong, New South Wales, Australia, June 2010. IEEE Xplore Digital Library, DOI: 10.1109/ISTAS.2010.5514610

  • E. Syta, S. Kurkovsky and B. Casano, RFID-based Authentication Middleware for Mobile Devices, 43rd Hawaii International Conference on System Sciences, Koloa, Kauai, Hawaii, January 2010. IEEE Computer Society Digital Library, DOI: 10.1109/HICSS.2010.320

Posters and Talks

  • Talk: E. Syta, CALYPSO: Private Data Management for Decentralized Ledgers, Japan-America Frontiers of Engineering Symposium, Irvine, CA, June 2021

  • Talk: E. Syta, CALYPSO: Private Data Management for Decentralized Ledgers, Carnegie Mellon University Distinguished Blockchain Seminar Series, April 2021

  • Talk: E. Syta, Scaling Decentralized Ledgers via Sharding, EPFL, ETHZ and IC3 Swiss Blockchain Winter School, Interlaken, Switzerland, February 2019

  • Talk: E. Syta, Scaling Blockchains via Public Randomness, Blockchain Workshop Series, Master Workshop Amsterdam, Research Institute, Amsterdam, Netherlands, November 2018

  • Talk: E. Syta, Scalable Bias-Resistant Distributed Randomness, Warsaw University of Technology, Warsaw, Poland, March 2018

  • Talk: E. Syta, Scalable Bias-Resistant Distributed Randomness, Military University of Technology, Warsaw, Poland, March 2018

  • Talk: E. Syta, Scalable Bias-Resistant Distributed Randomness, University of Connecticut, March 2018

  • Talk: E. Syta, Scalable Bias-Resistant Distributed Randomness, 2017 Summer Research Institute: Security and Privacy, \'Ecole Polytechnique F\'ed\'erale de Lausanne (EPFL), Switzerland, June 2017

  • Talk: E. Syta, Certificate Cothority: Towards Trustworthy Collective CAs, Trinity College, February 2016

  • Poster: E. Syta, Certificate Cothority: Towards Trustworthy Collective CAs, Rising Stars in EECS Workshop, MIT, November 2015

  • Talk: E. Syta, Decentralizing Authorities into Scalable Strongest-Link Cothorities, Yale University, April 2015

  • Talk: E. Syta, Collective Co-Signing for Scalable Decentralized Services, Mini-Workshop on Ongoing Research Activities Related to Privacy and Security, EPFL, Switzerland, March 2015

  • Poster: E. Syta and B. Ford, Deniable Anonymous Group Authentication, 2013 IEEE Symposium Security and Privacy, May 2013

  • Poster: E. Syta and S. Kurkovsky, RFID-Based Continuous Authentication Framework, Submitted to the IEEE-CT Computing in Connecticut and Beyond Symposium, April 2011.

  • Presentation: E. Syta, RFID-based Authentication Middleware for Mobile Device, 13th Annual Faculty Research Conference "Looking Towards the Future of CSUS Research", Central Connecticut State University, April 17, 2010.

  • Poster: E. Syta, Authentication Methods for Mobile Devices, Graduate Research and Creative Presentation Day at Central Connecticut State University, May, 2009.

  • Poster: E. Syta, Constraint Satisfaction Problem: An Overview and Applications in Artificial Intelligence and Cryptology, Graduate Research and Creative Presentation Day at Central Connecticut State University, May 2008.

  • Presentation: An Application of Zero Knowledge Proofs in the Process of Authentication, Institute of Mathematics of the Polish Academy of Sciences, April 2007. More information:www.impan.pl/Kryptologia