Author of the publication

SoK: Cryptographically Protected Database Search.

, , , , , , , , and . IEEE Symposium on Security and Privacy, page 172-191. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DEMO: Integrating MPC in Big Data Workflows., , , , and . ACM Conference on Computer and Communications Security, page 1844-1846. ACM, (2016)Two-Server Distributed ORAM with Sublinear Computation and Constant Rounds., and . Public Key Cryptography (2), volume 12711 of Lecture Notes in Computer Science, page 499-527. Springer, (2021)Batched Differentially Private Information Retrieval., , , and . USENIX Security Symposium, page 3327-3344. USENIX Association, (2022)Obfuscation of Hyperplane Membership., , and . TCC, volume 5978 of Lecture Notes in Computer Science, page 72-89. Springer, (2010)Crypto Crumple Zones: Enabling Limited Access without Mass Surveillance., and . EuroS&P, page 288-306. IEEE, (2018)Brief Announcement: Federated Code Auditing and Delivery for MPC., , , and . SSS, volume 10616 of Lecture Notes in Computer Science, page 298-302. Springer, (2017)Secret Sharing MPC on FPGAs in the Datacenter., , , , and . FPL, page 236-242. IEEE, (2020)TVA: A multi-party computation system for secure and expressive time series analytics., , , , and . USENIX Security Symposium, page 5395-5412. USENIX Association, (2023)Revealing the Unseen: How to Expose Cloud Usage While Protecting User Privacy., , and . ICDM Workshops, page 1011-1016. IEEE Computer Society, (2017)QueryShield: Cryptographically Secure Analytics in the Cloud., , , , , , , and . SIGMOD Conference Companion, page 436-439. ACM, (2024)