Browsing by Author Shi, E

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 8 to 21 of 21 < previous 
TitleAuthor(s)Issue DateViews
 
Locality-Preserving Oblivious RAM
Journal:Journal of Cryptology
2022
 
Locally Differentially Private Sparse Vector Aggregation
Proceeding/Conference:2022 IEEE Symposium on Security and Privacy (SP)
2022
Multi-Dimensional Range Query over Encrypted Data
Proceeding/Conference:Proceedings - IEEE Symposium on Security and Privacy
2007
114
Oblivious data structures
Proceeding/Conference:ACM Conference on Computer and Communications Security Proceedings
2014
223
 
Oblivious RAM with O((log N)3) worst-case cost
Proceeding/Conference:Lecture Notes in Computer Science
2011
170
 
Optimal lower bound for differentially private multi-party aggregation
Proceeding/Conference:Lecture Notes in Computer Science
2012
69
 
2018
29
 
Privacy-Preserving Aggregation of Time-Series Data
Proceeding/Conference:Annual Network & Distributed System Security Symposium (NDSS)
2011
664
 
Privacy-preserving stream aggregation with fault tolerance
Proceeding/Conference:Lecture Notes in Computer Science
2012
367
 
Private and continual release of statistics
Proceeding/Conference:Lecture Notes in Computer Science
2010
142
 
Private and Continual Release of Statistics
Journal:ACM Transactions on Information and System Security
2011
204
SCORAM: oblivious RAM for secure computation
Proceeding/Conference:ACM Conference on Computer and Communications Security Proceedings
2014
35
 
Small Memory Robust Simulation of Client-Server Interactive Protocols over Oblivious Noisy Channels
Proceeding/Conference:Proceedings of the Thirty-First Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2020)
2020
20
Sublinear-Round Byzantine Agreement Under Corrupt Majority
Proceeding/Conference:Public-Key Cryptography – PKC 2020: IACR International Conference on Practice and Theory of Public-Key Cryptography
2020
9