Author of the publication

Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics.

, , , , , and . USENIX Security Symposium, page 2129-2146. USENIX Association, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

People, Computers, and The Hot Mess of Real Data.. KDD, page 7. ACM, (2016)Learning and verifying quantified boolean queries by example., , , , and . PODS, page 49-60. ACM, (2013)How Best to Build Web-Scale Data Managers? A Panel Discussion, , , , , and . PVLDB, 2 (2): 1647 (2009)A case study in building layered DHT applications., , , , , and . SIGCOMM, page 97-108. ACM, (2005)Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics., , , , , and . USENIX Security Symposium, page 2129-2146. USENIX Association, (2021)Predicate Migration: Optimizing Queries with Expensive Predicates., and . SIGMOD Conference, page 267-276. ACM Press, (1993)Online Query Processing., and . SIGMOD Conference, page 623. ACM, (2001)Data in the First Mile., , and . CIDR, page 203-206. www.cidrdb.org, (2011)Behavior of Database Production Rules: Termination, Confluence, and Observable Determinism., , and . SIGMOD Conference, page 59-68. ACM Press, (1992)SIGMOD Record 21(2), June 1992.Eddies: Continuously Adaptive Query Processing, and . SIGMOD Conference, page 261-272. ACM, (2000)SIGMOD Record 29(2), June 2000.