


Остановите войну!
for scientists:


default search action
Ian Goldberg
Person information

- affiliation: University of Waterloo, Canada
- award (2011): EFF Pioneer Award
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j21]Lindsey Tulloch, Ian Goldberg:
Lox: Protecting the Social Graph in Bridge Distribution. Proc. Priv. Enhancing Technol. 2023(1): 494-509 (2023) - [c90]Thomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum:
Investigating Membership Inference Attacks under Data Dependencies. CSF 2023: 473-488 - [c89]Adithya Vadapalli, Ryan Henry, Ian Goldberg:
Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation. USENIX Security Symposium 2023 - [i28]Chelsea Komlo, Ian Goldberg, Douglas Stebila:
A Formal Treatment of Distributed Key Generation, and New Constructions. IACR Cryptol. ePrint Arch. 2023: 292 (2023) - [i27]Sajin Sasy, Ian Goldberg:
SoK: Metadata-Protecting Communication Systems. IACR Cryptol. ePrint Arch. 2023: 313 (2023) - [i26]Sajin Sasy, Aaron Johnson, Ian Goldberg:
Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks. IACR Cryptol. ePrint Arch. 2023: 1236 (2023) - 2022
- [c88]Edward Eaton, Sajin Sasy, Ian Goldberg:
Improving the Privacy of Tor Onion Services. ACNS 2022: 273-292 - [c87]Yuhao Dong, Ian Goldberg, Sergey Gorbunov, Raouf Boutaba:
Astrape: Anonymous Payment Channels with Boring Cryptography. ACNS 2022: 748-768 - [c86]Sajin Sasy, Aaron Johnson, Ian Goldberg:
Fast Fully Oblivious Compaction and Shuffling. CCS 2022: 2565-2579 - [c85]Stan Gurtler, Ian Goldberg:
PRSONA: Private Reputation Supporting Ongoing Network Avatars. WPES@CCS 2022: 55-68 - [i25]Edward Eaton, Sajin Sasy, Ian Goldberg:
Improving the Privacy of Tor Onion Services. IACR Cryptol. ePrint Arch. 2022: 407 (2022) - [i24]Yuhao Dong, Ian Goldberg, Sergey Gorbunov, Raouf Boutaba:
Astrape: Anonymous Payment Channels with Boring Cryptography. IACR Cryptol. ePrint Arch. 2022: 450 (2022) - [i23]Sajin Sasy, Aaron Johnson, Ian Goldberg:
Fast Fully Oblivious Compaction and Shuffling. IACR Cryptol. ePrint Arch. 2022: 1333 (2022) - [i22]Adithya Vadapalli, Ryan Henry, Ian Goldberg:
Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation. IACR Cryptol. ePrint Arch. 2022: 1747 (2022) - 2021
- [j20]Stan Gurtler, Ian Goldberg:
SoK: Privacy-Preserving Reputation Systems. Proc. Priv. Enhancing Technol. 2021(1): 107-127 (2021) - [c84]Steven Engler, Ian Goldberg:
Weaving a Faster Tor: A Multi-Threaded Relay Architecture for Improved Throughput. ARES 2021: 9:1-9:11 - [c83]Rob Jansen, Justin Tracey, Ian Goldberg:
Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation. USENIX Security Symposium 2021: 3415-3432 - [c82]Akshaya Mani, Ian Goldberg:
ZXAD: High-volume Attack Mitigation for Tor. WPES@CCS 2021: 1-16 - [c81]Miti Mazmudar, Stan Gurtler, Ian Goldberg:
Do You Feel a Chill?: Using PIR against Chilling Effects for Censorship-resistant Publishing. WPES@CCS 2021: 53-57 - [c80]Anna Harbluk Lorimer, Lindsey Tulloch, Cecylia Bocovich, Ian Goldberg:
OUStralopithecus: Overt User Simulation for Censorship Circumvention. WPES@CCS 2021: 137-150 - [i21]Rob Jansen, Justin Tracey, Ian Goldberg:
Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation. CoRR abs/2102.05196 (2021) - [i20]Akshaya Mani, Ian Goldberg:
ZXAD: Zero-knowledge Exit Abuse Detection for Tor. IACR Cryptol. ePrint Arch. 2021: 374 (2021) - [i19]Miti Mazmudar, Stan Gurtler, Ian Goldberg:
Do you feel a chill? Using PIR against chilling effects for censorship-resistant publishing. IACR Cryptol. ePrint Arch. 2021: 1195 (2021) - 2020
- [j19]Bailey Kacsmar, Chelsea Komlo, Florian Kerschbaum, Ian Goldberg:
Mind the Gap: Ceremonies for Applied Secret Sharing. Proc. Priv. Enhancing Technol. 2020(2): 397-415 (2020) - [j18]Miti Mazmudar, Ian Goldberg:
Mitigator: Privacy policy compliance using trusted hardware. Proc. Priv. Enhancing Technol. 2020(3): 204-221 (2020) - [c79]Chelsea Komlo, Ian Goldberg:
FROST: Flexible Round-Optimized Schnorr Threshold Signatures. SAC 2020: 34-65 - [c78]Matthew Lakier, Dimcho Karakashev, Yixin Wang, Ian Goldberg:
Augmented Unlocking Techniques for Smartphones Using Pre-Touch Information. SUI 2020: 17:1-17:5 - [c77]Chelsea Komlo, Nick Mathewson, Ian Goldberg:
Walking Onions: Scaling Anonymity Networks while Protecting Users. USENIX Security Symposium 2020: 1003-1020 - [i18]Thomas Humphries, Matthew Rafuse, Lindsey Tulloch, Simon Oya, Ian Goldberg, Florian Kerschbaum:
Differentially Private Learning Does Not Bound Membership Inference. CoRR abs/2010.12112 (2020) - [i17]Chelsea Komlo, Ian Goldberg:
FROST: Flexible Round-Optimized Schnorr Threshold Signatures. IACR Cryptol. ePrint Arch. 2020: 852 (2020)
2010 – 2019
- 2019
- [j17]Sajin Sasy, Ian Goldberg:
ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments. Proc. Priv. Enhancing Technol. 2019(3): 331-349 (2019) - [e3]Ian Goldberg, Tyler Moore:
Financial Cryptography and Data Security - 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11598, Springer 2019, ISBN 978-3-030-32100-0 [contents] - [i16]Matthew Lakier, Dimcho Karakashev, Yixin Wang, Ian Goldberg:
Augmented Unlocking Techniques for Smartphones Using Pre-Touch Information. CoRR abs/1908.09165 (2019) - 2018
- [j16]Nik Unger, Ian Goldberg:
Improved Strongly Deniable Authenticated Key Exchanges for Secure Messaging. Proc. Priv. Enhancing Technol. 2018(1): 21-66 (2018) - [j15]Cecylia Bocovich, Ian Goldberg:
Secure asymmetry and deployability for decoy routing systems. Proc. Priv. Enhancing Technol. 2018(3): 43-62 (2018) - [j14]Alex Davidson, Ian Goldberg, Nick Sullivan, George Tankersley, Filippo Valsorda:
Privacy Pass: Bypassing Internet Challenges Anonymously. Proc. Priv. Enhancing Technol. 2018(3): 164-180 (2018) - [j13]Navid Nasr Esfahani, Ian Goldberg
, Douglas R. Stinson
:
Some Results on the Existence of t-All-or-Nothing Transforms Over Arbitrary Alphabets. IEEE Trans. Inf. Theory 64(4): 3136-3143 (2018) - [c76]Brittany Postnikoff, Ian Goldberg:
Robot Social Engineering: Attacking Human Factors with Non-Human Actors. HRI (Companion) 2018: 313-314 - [c75]Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, Ian Goldberg:
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. NDSS 2018 - [c74]Erinn Atwater, Ian Goldberg:
Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices. Security Protocols Workshop 2018: 289-294 - [c73]Erinn Atwater, Ian Goldberg:
Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion). Security Protocols Workshop 2018: 295-303 - [c72]Justin Tracey, Rob Jansen, Ian Goldberg:
High Performance Tor Experimentation from the Magic of Dynamic ELFs. CSET @ USENIX Security Symposium 2018 - [c71]Christopher McKnight, Ian Goldberg:
Style Counsel: Seeing the (Random) Forest for the Trees in Adversarial Code Stylometry. WPES@CCS 2018: 138-142 - 2017
- [c70]Cecylia Bocovich, John A. Doucette, Ian Goldberg:
Lavinia: An Audit-Payment Protocol for Censorship-Resistant Storage. Financial Cryptography 2017: 601-620 - [c69]Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ian Goldberg:
Live Lesson: Netsim: Network simulation and hacking for high schoolers. ASE @ USENIX Security Symposium 2017 - [c68]Tao Wang, Ian Goldberg:
Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks. USENIX Security Symposium 2017: 1375-1390 - [i15]Navid Nasr Esfahani, Ian Goldberg, Douglas R. Stinson:
Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets. CoRR abs/1702.06612 (2017) - [i14]Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, Ian Goldberg:
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. CoRR abs/1709.05748 (2017) - [i13]Navid Nasr Esfahani, Ian Goldberg, Douglas R. Stinson:
Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets. IACR Cryptol. ePrint Arch. 2017: 177 (2017) - 2016
- [j12]Mashael AlSabah, Ian Goldberg:
Performance and Security Improvements for Tor: A Survey. ACM Comput. Surv. 49(2): 32:1-32:36 (2016) - [j11]Tao Wang, Ian Goldberg:
On Realistically Attacking Tor with Website Fingerprinting. Proc. Priv. Enhancing Technol. 2016(4): 21-36 (2016) - [j10]Sheharbano Khattak, Tariq Elahi
, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch
, Ian Goldberg:
SoK: Making Sense of Censorship Resistance Systems. Proc. Priv. Enhancing Technol. 2016(4): 37-61 (2016) - [j9]Tariq Elahi
, John A. Doucette, Hadi Hosseini, Steven J. Murdoch
, Ian Goldberg:
A Framework for the Game-theoretic Analysis of Censorship Resistance. Proc. Priv. Enhancing Technol. 2016(4): 83-101 (2016) - [j8]Raphael R. Toledo, George Danezis
, Ian Goldberg:
Lower-Cost ∈-Private Information Retrieval. Proc. Priv. Enhancing Technol. 2016(4): 184-201 (2016) - [c67]Ian Goldberg, Graeme Jenkinson, Frank Stajano:
Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token. ACNS 2016: 36-57 - [c66]Cecylia Bocovich, Ian Goldberg:
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement. CCS 2016: 1702-1714 - [c65]Ian Goldberg, Graeme Jenkinson, David Llewellyn-Jones, Frank Stajano:
Red Button and Yellow Button: Usable Security for Lost Security Tokens. Security Protocols Workshop 2016: 165-171 - [c64]Nik Unger, Sahithi Thandra, Ian Goldberg:
Elxa: Scalable Privacy-Preserving Plagiarism Detection. WPES@CCS 2016: 153-164 - [i12]Raphael R. Toledo, George Danezis, Ian Goldberg:
Lower-Cost epsilon-Private Information Retrieval. CoRR abs/1604.00223 (2016) - 2015
- [j7]Nikita Borisov, George Danezis, Ian Goldberg:
DP5: A Private Presence Service. Proc. Priv. Enhancing Technol. 2015(2): 4-24 (2015) - [c63]Nik Unger, Ian Goldberg:
Deniable Key Exchanges for Secure Messaging. CCS 2015: 1211-1223 - [c62]Wouter Lueks, Ian Goldberg:
Sublinear Scaling for Multi-Client Private Information Retrieval. Financial Cryptography 2015: 168-186 - [c61]Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ed Lank, Ian Goldberg:
Leading Johnny to Water: Designing for Usability and Trust. SOUPS 2015: 69-88 - [c60]Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Goldberg, Matthew Smith:
SoK: Secure Messaging. IEEE Symposium on Security and Privacy 2015: 232-249 - [i11]Mashael AlSabah, Ian Goldberg:
Performance and Security Improvements for Tor: A Survey. IACR Cryptol. ePrint Arch. 2015: 235 (2015) - 2014
- [c59]Xiang Cai, Rishab Nithyanand, Tao Wang, Rob Johnson, Ian Goldberg:
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses. CCS 2014: 227-238 - [c58]Tariq Elahi
, George Danezis
, Ian Goldberg:
PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks. CCS 2014: 1068-1079 - [c57]Juan Pablo Hourcade, Ann Cavoukian, Ronald J. Deibert, Lorrie Faith Cranor
, Ian Goldberg:
Electronic privacy and surveillance. CHI Extended Abstracts 2014: 1075-1080 - [c56]Casey Devet, Ian Goldberg:
The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency. Privacy Enhancing Technologies 2014: 63-82 - [c55]Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg:
Effective Attacks and Provable Defenses for Website Fingerprinting. USENIX Security Symposium 2014: 143-157 - [i10]Tariq Elahi, Steven J. Murdoch, Ian Goldberg:
Censorship Resistance: Let a Thousand Flowers Bloom? CoRR abs/1412.1859 (2014) - 2013
- [j6]Ian Goldberg, Douglas Stebila, Berkant Ustaoglu
:
Anonymity and one-way authentication in key exchange protocols. Des. Codes Cryptogr. 67(2): 245-269 (2013) - [j5]Maxwell Young, Aniket Kate, Ian Goldberg, Martin Karsten:
Towards Practical Communication in Byzantine-Resistant DHTs. IEEE/ACM Trans. Netw. 21(1): 190-203 (2013) - [c54]Ryan Henry
, Ian Goldberg:
Batch Proofs of Partial Knowledge. ACNS 2013: 502-517 - [c53]Mashael AlSabah, Ian Goldberg:
PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks. CCS 2013: 349-360 - [c52]Ryan Henry, Yizhou Huang, Ian Goldberg:
One (Block) Size Fits All: PIR and SPIR with Variable-Length Records via Multi-Block Queries. NDSS 2013 - [c51]Mashael AlSabah, Kevin S. Bauer, Tariq Elahi
, Ian Goldberg:
The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting. Privacy Enhancing Technologies 2013: 143-163 - [c50]Ryan Henry
, Ian Goldberg:
Thinking inside the BLAC box: smarter protocols for faster anonymous blacklisting. WPES 2013: 71-82 - [c49]Yizhou Huang, Ian Goldberg:
Outsourced private information retrieval. WPES 2013: 119-130 - [c48]Tao Wang, Ian Goldberg:
Improved website fingerprinting on Tor. WPES 2013: 201-212 - 2012
- [c47]Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft:
Adding query privacy to robust DHTs. AsiaCCS 2012: 30-31 - [c46]Mashael AlSabah, Kevin S. Bauer, Ian Goldberg:
Enhancing Tor's performance using real-time traffic classification. CCS 2012: 73-84 - [c45]Hooman Mohajeri Moghaddam, Baiyu Li, Mohammad Derakhshani, Ian Goldberg:
SkypeMorph: protocol obfuscation for Tor bridges. CCS 2012: 97-108 - [c44]Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi:
Provably Secure and Practical Onion Routing. CSF 2012: 369-385 - [c43]Tao Wang, Kevin S. Bauer, Clara Forero, Ian Goldberg:
Congestion-Aware Path Selection for Tor. Financial Cryptography 2012: 98-113 - [c42]Casey Devet, Ian Goldberg, Nadia Heninger:
Optimally Robust Private Information Retrieval. USENIX Security Symposium 2012: 269-283 - [c41]Tariq Elahi
, Kevin S. Bauer, Mashael AlSabah, Roger Dingledine, Ian Goldberg:
Changing of the guards: a framework for understanding and improving entry guard selection in tor. WPES 2012: 43-54 - [i9]Casey Devet, Ian Goldberg, Nadia Heninger:
Optimally Robust Private Information Retrieval. IACR Cryptol. ePrint Arch. 2012: 83 (2012) - [i8]Aniket Kate, Yizhou Huang, Ian Goldberg:
Distributed Key Generation in the Wild. IACR Cryptol. ePrint Arch. 2012: 377 (2012) - 2011
- [j4]Aniket Kate, Ian Goldberg:
Generalizing cryptosystems based on the subset sum problem. Int. J. Inf. Sec. 10(3): 189-199 (2011) - [c40]Ryan Henry
, Femi G. Olumofin, Ian Goldberg:
Practical PIR for electronic commerce. CCS 2011: 677-690 - [c39]Femi G. Olumofin, Ian Goldberg:
Revisiting the Computational Practicality of Private Information Retrieval. Financial Cryptography 2011: 158-172 - [c38]Mashael AlSabah, Kevin S. Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, Geoffrey M. Voelker:
DefenestraTor: Throwing Out Windows in Tor. PETS 2011: 134-154 - [c37]Ryan Henry
, Ian Goldberg:
Formalizing Anonymous Blacklisting Systems. IEEE Symposium on Security and Privacy 2011: 81-95 - [c36]Ryan Henry
, Ian Goldberg:
Extending Nymble-like Systems. IEEE Symposium on Security and Privacy 2011: 523-537 - [c35]Prateek Mittal, Femi G. Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg:
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval. USENIX Security Symposium 2011 - [c34]Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman:
Telex: Anticensorship in the Network Infrastructure. USENIX Security Symposium 2011 - [c33]Jeremy Day, Yizhou Huang, Edward Knapp, Ian Goldberg:
SPEcTRe: spot-checked private ecash tolling at roadside. WPES 2011: 61-68 - [c32]Rob Smits, Divam Jain, Sarah Pidcock, Ian Goldberg, Urs Hengartner:
BridgeSPA: improving Tor bridges with single packet authorization. WPES 2011: 93-102 - [i7]Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft:
Adding Query Privacy to Robust DHTs. CoRR abs/1107.1072 (2011) - [i6]Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi:
Provably Secure and Practical Onion Routing. IACR Cryptol. ePrint Arch. 2011: 308 (2011) - 2010
- [j3]Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson:
On message recognition protocols: recoverability and explicit confirmation. Int. J. Appl. Cryptogr. 2(2): 100-120 (2010) - [j2]Aniket Kate, Gregory M. Zaverucha, Ian Goldberg:
Pairing-Based Onion Routing with Improved Forward Secrecy. ACM Trans. Inf. Syst. Secur. 13(4): 29:1-29:32 (2010) - [c31]Aniket Kate, Gregory M. Zaverucha, Ian Goldberg:
Constant-Size Commitments to Polynomials and Their Applications. ASIACRYPT 2010: 177-194 - [c30]Can Tang, Ian Goldberg:
An improved algorithm for tor circuit scheduling. CCS 2010: 329-339 - [c29]Aniket Kate, Ian Goldberg:
Using Sphinx to Improve Onion Routing Circuit Construction. Financial Cryptography 2010: 359-366 - [c28]Maxwell Young, Aniket Kate, Ian Goldberg, Martin Karsten:
Practical Robust Communication in DHTs Tolerating a Byzantine Adversary. ICDCS 2010: 263-272 - [c27]Femi G. Olumofin, Ian Goldberg:
Privacy-Preserving Queries over Relational Databases. Privacy Enhancing Technologies 2010: 75-92 - [c26]Femi G. Olumofin, Piotr K. Tysowski, Ian Goldberg, Urs Hengartner:
Achieving Efficient Query Privacy for Location Based Services. Privacy Enhancing Technologies 2010: 93-110 - [c25]Ryan Henry
, Kevin J. Henry, Ian Goldberg:
Making a Nymbler Nymble Using VERBS. Privacy Enhancing Technologies 2010: 111-129 - [c24]Aniket Kate, Ian Goldberg:
Distributed Private-Key Generators for Identity-Based Cryptography. SCN 2010: 436-453
2000 – 2009
- 2009
- [c23]Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson:
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks. ACNS 2009: 219-237 - [c22]Ian Goldberg, Berkant Ustaoglu
, Matthew Van Gundy, Hao Chen
:
Multi-party off-the-record messaging. CCS 2009: 358-368 - [c21]Aniket Kate, Ian Goldberg:
Distributed Key Generation for the Internet. ICDCS 2009: 119-128 - [c20]George Danezis, Ian Goldberg:
Sphinx: A Compact and Provably Secure Mix Format. SP 2009: 269-282 - [c19]Joel Reardon, Ian Goldberg:
Improving Tor using a TCP-over-DTLS Tunnel. USENIX Security Symposium 2009: 119-134 - [c18]Chris Alexander, Joel Reardon, Ian Goldberg:
Plinko: polling with a physical implementation of a noisy channel. WPES 2009: 109-112 - [e2]Ian Goldberg, Mikhail J. Atallah:
Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings. Lecture Notes in Computer Science 5672, Springer 2009, ISBN 978-3-642-03167-0 [contents] - [i5]Aniket Kate, Ian Goldberg:
Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography. IACR Cryptol. ePrint Arch. 2009: 355 (2009) - [i4]Aniket Kate, Ian Goldberg:
Using Sphinx to Improve Onion Routing Circuit Construction. IACR Cryptol. ePrint Arch. 2009: 628 (2009) - 2008
- [c17]Ryan Stedman, Kayo Yoshida, Ian Goldberg:
A user study of off-the-record messaging. SOUPS 2008: 95-104 - [e1]Nikita Borisov, Ian Goldberg:
Privacy Enhancing Technologies, 8th International Symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008, Proceedings. Lecture Notes in Computer Science 5134, Springer 2008, ISBN 978-3-540-70629-8 [contents] - [i3]Aniket Kate,