Elaine Shi [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting Asiacrypt2018-2018 - Brisbane, Australia
Thunderella: Blockchains with Optimistic Instant Confirmation EuroCryptTelAviv-2018 - Tel Aviv, Israel
On the Depth of Oblivious Parallel RAM asiacrypt-2017 - hong kong,china
Oblivious Hashing Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM asiacrypt-2017 - hong kong,china
The Sleepy Model of Consensus asiacrypt-2017 - hong kong,china
Formal Abstractions for Attested Execution Secure Processors EuroCrypt-2017 - paris,france
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge EuroSP-2017 - paris,france
HOP: Hardware makes Obfuscation Practical NDSS-2017 - california,usa
Rethinking Internet-Scale Consensus RWC-2017 - new york city,usa
Constants Count: Practical Improvements to Oblivious RAM SecuritySymposium-2015 - washington,USA
Memorial session: Emil Stefanov: Bridging the Theory and Practice of Cloud Computing Security CCSW-2014 - Arizona,USA
SCORAM: Oblivious RAM for Secure Computation CCS-2014 - Scottsdale,USA
Oblivious Data Structure CCS-2014 - Scottsdale,USA
ShadowCrypt: Encrypted Web Applications for Everyone CCS-2014 - Scottsdale,USA
Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns usenix-2014 - san diego,usa
SDDR: Light-Weight, Secure Mobile Encounters usenix-2014 - san diego,usa
A Secure Computation Framework for SDNs HotSDN-2014 - chicago,usa
Automating Efficient RAM-Model Secure Computation IEEE-2014 - SamJose,USA
Multi-Input Functional Encryption EuroCrypt-2014 - copenhagen,denmark
Practical Dynamic Searchable Encryption with Small Leakage NDSS-2014 - San Diego,USA
Scambaiter: Understanding Targeted Nigerian Scams on Craigslist NDSS-2014 - San Diego,USA
Memory Trace Oblivious Program Execution CSF-2013 - Louisiana,USA
Privacy-Preserving Stream Aggregation with Fault Tolerance Financial Cryptography and Data Security-2013 - Bonaire,Netherlands
Bitter to Better — How to Make Bitcoin a Better Currency Financial Cryptography and Data Security-2013 - Bonaire,Netherlands
Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams over a Sliding Window Privacy Enhancing Technologies Symposium-2012 - Vigo, Spain
Implicit Authentication For Mobile Devices 4th USENIX Workshop on Hot Topics in Security-2009 - Montreal, Canada Security