Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reducing Participation Costs via Incremental Verification for Ledger Systems., , , and . IACR Cryptol. ePrint Arch., (2020)DORY: An Encrypted Search System with Distributed Trust., , , , and . OSDI, page 1101-1119. USENIX Association, (2020)Accountable authentication with privacy protection: The Larch system for universal login., , , and . OSDI, page 81-98. USENIX Association, (2023)Private Web Search with Tiptoe., , , and . SOSP, page 396-416. ACM, (2023)Snoopy: Surpassing the Scalability Bottleneck of Oblivious Storage., , , , and . SOSP, page 655-671. ACM, (2021)Waldo: A Private Time-Series Database from Function Secret Sharing., , , and . SP, page 2450-2468. IEEE, (2022)True2F: Backdoor-Resistant Authentication Tokens., , , , and . IEEE Symposium on Security and Privacy, page 398-416. IEEE, (2019)Lightweb: Private web browsing without all the baggage., and . HotNets, page 287-294. ACM, (2023)Reflections on trusting distributed trust., , , and . HotNets, page 38-45. ACM, (2022)SafetyPin: Encrypted Backups with Human-Memorable Secrets., , and . OSDI, page 1121-1138. USENIX Association, (2020)