Biblio

Export 6 results:
Filters: Author is Elaine Shi  [Clear All Filters]
2022
Zhang J, Xie T, Hoang T, Shi E, Zhang Y.  2022.  Polynomial Commitment with a One-to-Many Prover and Applications. 31st USENIX Security Symposium (USENIX Security 22). :2965--2982.
2015
Ren L, Fletcher C, Kwon A, Stefanov E, Shi E, van Dijk M, Devadas S.  2015.  Constants Count: Practical Improvements to Oblivious RAM. 24th USENIX Security Symposium (USENIX Security 15). :415--430.
2014
Dautrich J, Stefanov E, Shi E.  2014.  Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns. 23rd USENIX Security Symposium (USENIX Security 14). :749--764.
Lentz M, Erdélyi V, Aditya P, Shi E, Druschel P, Bhattacharjee B.  2014.  SDDR: Light-Weight, Secure Mobile Encounters. 23rd USENIX Security Symposium (USENIX Security 14). :925--940.
Kosba AE, Papadopoulos D, Papamanthou C, Sayed MF, Shi E, Triandopoulos N.  2014.  TRUESET: Faster Verifiable Set Computations. 23rd USENIX Security Symposium (USENIX Security 14). :765--780.