Folgen
Elaine Shi
Titel
Zitiert von
Zitiert von
Jahr
Hawk: The blockchain model of cryptography and privacy-preserving smart contracts
A Kosba, A Miller, E Shi, Z Wen, C Papamanthou
2016 IEEE symposium on security and privacy (SP), 839-858, 2016
29772016
The sybil attack in sensor networks: analysis & defenses
J Newsome, E Shi, D Song, A Perrig
Proceedings of the 3rd international symposium on Information processing in …, 2004
21562004
On Scaling Decentralized Blockchains: (A Position Paper)
K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ...
International conference on financial cryptography and data security, 106-125, 2016
15632016
Controlling data in the cloud: outsourcing computation without outsourcing control
R Chow, P Golle, M Jakobsson, E Shi, J Staddon, R Masuoka, J Molina
Proceedings of the 2009 ACM workshop on Cloud computing security, 85-90, 2009
12422009
Path ORAM: an extremely simple oblivious RAM protocol
E Stefanov, M Dijk, E Shi, THH Chan, C Fletcher, L Ren, X Yu, S Devadas
Journal of the ACM (JACM) 65 (4), 1-26, 2018
11862018
Bitter to better—how to make bitcoin a better currency
S Barber, X Boyen, E Shi, E Uzun
Financial Cryptography and Data Security: 16th International Conference, FC …, 2012
9852012
Privacy-preserving aggregation of time-series data
E Shi, THH Chan, E Rieffel, R Chow, D Song
Network and Distributed System Security Symposium (NDSS), 2011
9102011
The honey badger of BFT protocols
A Miller, Y Xia, K Croman, E Shi, D Song
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
8992016
Designing secure sensor networks
E Shi, A Perrig
IEEE Wireless Communications 11 (6), 38-43, 2004
8962004
Town crier: An authenticated data feed for smart contracts
F Zhang, E Cecchetti, K Croman, A Juels, E Shi
Proceedings of the 2016 aCM sIGSAC conference on computer and communications …, 2016
7692016
Multi-dimensional range query over encrypted data
E Shi, J Bethencourt, THH Chan, D Song, A Perrig
2007 IEEE Symposium on Security and Privacy (SP'07), 350-364, 2007
7522007
Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab
K Delmolino, M Arnett, A Kosba, A Miller, E Shi
Financial Cryptography and Data Security: FC 2016 International Workshops …, 2016
7452016
Practical dynamic searchable encryption with small leakage
E Stefanov, C Papamanthou, E Shi
Cryptology ePrint Archive, 2013
7032013
Stubborn mining: Generalizing selfish mining and combining with an eclipse attack
K Nayak, S Kumar, A Miller, E Shi
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 305-320, 2016
6132016
Private and continual release of statistics
THH Chan, E Shi, D Song
ACM Transactions on Information and System Security (TISSEC) 14 (3), 1-24, 2011
5642011
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems
A Seshadri, M Luk, E Shi, A Perrig, L Van Doorn, P Khosla
Proceedings of the twentieth ACM symposium on Operating systems principles, 1-16, 2005
5492005
Predicate privacy in encryption systems
E Shen, E Shi, B Waters
Theory of Cryptography Conference, 457-473, 2009
5352009
Oblivious RAM with O((logN)3) Worst-Case Cost
E Shi, THH Chan, E Stefanov, M Li
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
5332011
Hybrid consensus: Efficient consensus in the permissionless model
R Pass, E Shi
Cryptology ePrint Archive, 2016
4482016
Fruitchains: A fair blockchain
R Pass, E Shi
Proceedings of the ACM symposium on principles of distributed computing, 315-324, 2017
4292017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20