Browsing by Author Shi, E

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 5 to 16 of 16 < previous 
TitleAuthor(s)Issue DateViews
Multi-Dimensional Range Query over Encrypted Data
Proceeding/Conference:Proceedings - IEEE Symposium on Security and Privacy
2007
63
Oblivious data structures
Proceeding/Conference:ACM Conference on Computer and Communications Security Proceedings
2014
225
 
Oblivious RAM with O((log N)3) worst-case cost
Proceeding/Conference:Lecture Notes in Computer Science
2011
79
 
Optimal lower bound for differentially private multi-party aggregation
Proceeding/Conference:Lecture Notes in Computer Science
2012
18
 
2018
14
 
Privacy-Preserving Aggregation of Time-Series Data
Proceeding/Conference:Annual Network & Distributed System Security Symposium (NDSS)
2011
619
 
Privacy-preserving stream aggregation with fault tolerance
Proceeding/Conference:Lecture Notes in Computer Science
2012
67
 
Private and continual release of statistics
Proceeding/Conference:Lecture Notes in Computer Science
2010
113
 
Private and Continual Release of Statistics
Journal:ACM Transactions on Information and System Security
2011
109
SCORAM: oblivious RAM for secure computation
Proceeding/Conference:ACM Conference on Computer and Communications Security Proceedings
2014
48
 
Small Memory Robust Simulation of Client-Server Interactive Protocols over Oblivious Noisy Channels
Proceeding/Conference:Proceedings of the Thirty-First Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2020)
2020
Sublinear-Round Byzantine Agreement Under Corrupt Majority
Proceeding/Conference:Public-Key Cryptography – PKC 2020: IACR International Conference on Practice and Theory of Public-Key Cryptography
2020