ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2504.19566
  4. Cited By
Metadata-private Messaging without Coordination

Metadata-private Messaging without Coordination

28 April 2025
Peipei Jiang
Yihao Wu
Lei Xu
Wentao Dong
Peiyuan Chen
Yulong Ming
Cong Wang
Xiaohua Jia
Qian Wang
ArXivPDFHTML

Papers citing "Metadata-private Messaging without Coordination"

9 / 9 papers shown
Title
The Effect of False Positives: Why Fuzzy Message Detection Leads to
  Fuzzy Privacy Guarantees?
The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees?
István András Seres
Balázs Pejó
P. Burcsi
44
17
0
14 Sep 2021
An Off-Chip Attack on Hardware Enclaves via the Memory Bus
An Off-Chip Attack on Hardware Enclaves via the Memory Bus
Dayeol Lee
D. Jung
Ian T. Fang
Chia-Che Tsai
Raluca A. Popa
21
92
0
03 Dec 2019
XRD: Scalable Messaging System with Cryptographic Privacy
XRD: Scalable Messaging System with Cryptographic Privacy
Albert Kwon
David Lu
S. Devadas
16
67
0
14 Jan 2019
CacheZoom: How SGX Amplifies The Power of Cache Attacks
CacheZoom: How SGX Amplifies The Power of Cache Attacks
A. Moghimi
Gorka Irazoqui Apecechea
T. Eisenbarth
18
333
0
20 Mar 2017
The Loopix Anonymity System
The Loopix Anonymity System
Ania M. Piotrowska
Jamie Hayes
T. Elahi
Sebastian Meiser
G. Danezis
31
175
0
01 Mar 2017
Software Grand Exposure: SGX Cache Attacks Are Practical
Software Grand Exposure: SGX Cache Attacks Are Practical
Ferdinand Brasser
Urs Müller
Alexandra Dmitrienko
Kari Kostiainen
Srdjan Capkun
A. Sadeghi
AAML
56
606
0
24 Feb 2017
Atom: Horizontally Scaling Strong Anonymity
Atom: Horizontally Scaling Strong Anonymity
Albert Kwon
Henry Corrigan-Gibbs
S. Devadas
Bryan Ford
20
104
0
23 Dec 2016
Access Control Encryption: Enforcing Information Flow with Cryptography
Access Control Encryption: Enforcing Information Flow with Cryptography
I. Damgård
Helene Haagh
Claudio Orlandi
14
86
0
11 Feb 2016
Accountable Anonymous Group Messaging
Accountable Anonymous Group Messaging
Henry Corrigan-Gibbs
Bryan Ford
58
231
0
18 Apr 2010
1