Browsing by Author Shi, E

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 11 to 21 of 21 < previous 
TitleAuthor(s)Issue Date
Oblivious data structures
Proceeding/Conference:ACM Conference on Computer and Communications Security Proceedings
2014
 
Oblivious RAM with O((log N)3) worst-case cost
Proceeding/Conference:Lecture Notes in Computer Science
2011
 
Optimal lower bound for differentially private multi-party aggregation
Proceeding/Conference:Lecture Notes in Computer Science
2012
 
2018
 
Privacy-Preserving Aggregation of Time-Series Data
Proceeding/Conference:Annual Network & Distributed System Security Symposium (NDSS)
2011
 
Privacy-preserving stream aggregation with fault tolerance
Proceeding/Conference:Lecture Notes in Computer Science
2012
 
Private and continual release of statistics
Proceeding/Conference:Lecture Notes in Computer Science
2010
 
Private and Continual Release of Statistics
Journal:ACM Transactions on Information and System Security
2011
SCORAM: oblivious RAM for secure computation
Proceeding/Conference:ACM Conference on Computer and Communications Security Proceedings
2014
 
Small Memory Robust Simulation of Client-Server Interactive Protocols over Oblivious Noisy Channels
Proceeding/Conference:Proceedings of the Thirty-First Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2020)
2020
Sublinear-Round Byzantine Agreement Under Corrupt Majority
Proceeding/Conference:Public-Key Cryptography – PKC 2020: IACR International Conference on Practice and Theory of Public-Key Cryptography
2020