Browsing by Author Shi, E

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 16 of 16
TitleAuthor(s)Issue DateViews
 
Bucket Oblivious Sort: An Extremely Simple Oblivious Sort
Proceeding/Conference:Symposium on Simplicity in Algorithms Proceedings
2020
14
Cache-Oblivious and Data-Oblivious Sorting and Applications
Proceeding/Conference:Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms
2018
38
 
2012
180
 
Foundations of Differentially Oblivious Algorithms
Proceeding/Conference:Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2019)
2019
13
Multi-Dimensional Range Query over Encrypted Data
Proceeding/Conference:Proceedings - IEEE Symposium on Security and Privacy
2007
124
Oblivious data structures
Proceeding/Conference:ACM Conference on Computer and Communications Security Proceedings
2014
226
 
Oblivious RAM with O((log N)3) worst-case cost
Proceeding/Conference:Lecture Notes in Computer Science
2011
178
 
Optimal lower bound for differentially private multi-party aggregation
Proceeding/Conference:Lecture Notes in Computer Science
2012
70
 
2018
26
 
Privacy-Preserving Aggregation of Time-Series Data
Proceeding/Conference:Annual Network & Distributed System Security Symposium (NDSS)
2011
969
 
Privacy-preserving stream aggregation with fault tolerance
Proceeding/Conference:Lecture Notes in Computer Science
2012
373
 
Private and continual release of statistics
Proceeding/Conference:Lecture Notes in Computer Science
2010
200
 
Private and Continual Release of Statistics
Journal:ACM Transactions on Information and System Security
2011
282
SCORAM: oblivious RAM for secure computation
Proceeding/Conference:ACM Conference on Computer and Communications Security Proceedings
2014
39
 
Small Memory Robust Simulation of Client-Server Interactive Protocols over Oblivious Noisy Channels
Proceeding/Conference:Proceedings of the Thirty-First Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2020)
2020
18
Sublinear-Round Byzantine Agreement Under Corrupt Majority
Proceeding/Conference:Public-Key Cryptography – PKC 2020: IACR International Conference on Practice and Theory of Public-Key Cryptography
2020
7