Showing results 1 to 20 of 20
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
Bucket Oblivious Sort: An Extremely Simple Oblivious Sort Proceeding/Conference:Symposium on Simplicity in Algorithms Proceedings | 2020 | 16 | ||
Cache-Oblivious and Data-Oblivious Sorting and Applications Proceeding/Conference:Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms | 2018 | 39 | ||
Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams Proceeding/Conference:Lecture Notes in Computer Science | 2012 | 181 | ||
Foundations of Differentially Oblivious Algorithms Proceeding/Conference:Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2019) | 2019 | 4 | ||
Foundations of Differentially Oblivious Algorithms Journal:Journal of the ACM | 2022 | |||
Game-Theoretic Fairness Meets Multi-party Protocols: The Case of Leader Election Proceeding/Conference:41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021: Proceedings. Part II, Multi-Party Computation; Lattice Cryptography; and Lattice Cryptanalysis | 2021 | |||
Locality-Preserving Oblivious RAM Journal:Journal of Cryptology | 2022 | |||
Locally Differentially Private Sparse Vector Aggregation Proceeding/Conference:2022 IEEE Symposium on Security and Privacy (SP) | 2022 | |||
Multi-Dimensional Range Query over Encrypted Data Proceeding/Conference:Proceedings - IEEE Symposium on Security and Privacy | 2007 | |||
Oblivious data structures Proceeding/Conference:ACM Conference on Computer and Communications Security Proceedings | 2014 | 228 | ||
Oblivious RAM with O((log N)3) worst-case cost Proceeding/Conference:Lecture Notes in Computer Science | 2011 | 187 | ||
Optimal lower bound for differentially private multi-party aggregation Proceeding/Conference:Lecture Notes in Computer Science | 2012 | |||
Path ORAM: An Extremely Simple Oblivious RAM Protocol Journal:Journal of the ACM | 2018 | 29 | ||
Privacy-Preserving Aggregation of Time-Series Data Proceeding/Conference:Annual Network & Distributed System Security Symposium (NDSS) | 2011 | |||
Privacy-preserving stream aggregation with fault tolerance Proceeding/Conference:Lecture Notes in Computer Science | 2012 | 376 | ||
Private and continual release of statistics Proceeding/Conference:Lecture Notes in Computer Science | 2010 | 202 | ||
Private and Continual Release of Statistics Journal:ACM Transactions on Information and System Security | 2011 | 283 | ||
SCORAM: oblivious RAM for secure computation Proceeding/Conference:ACM Conference on Computer and Communications Security Proceedings | 2014 | 39 | ||
Small Memory Robust Simulation of Client-Server Interactive Protocols over Oblivious Noisy Channels Proceeding/Conference:Proceedings of the Thirty-First Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2020) | 2020 | 20 | ||
Sublinear-Round Byzantine Agreement Under Corrupt Majority Proceeding/Conference:Public-Key Cryptography – PKC 2020: IACR International Conference on Practice and Theory of Public-Key Cryptography | 2020 | 9 |