Cliptography: Clipping the Power of Kleptographic Attacks Jan 1, 2015· Alexander Russell , Qiang Tang , Moti Yung , Hong-Sheng Zhou · 0 min read Cite Type 4 Last updated on Jan 1, 2015 ← Asynchronous Neighbor Discovery on Duty-cycled Mobile Devices: Integer and Non-Integer Schedules Jan 1, 2015 Dealing with undependable workers in decentralized network supercomputing Jan 1, 2015 →