The sybil attack in sensor networks: analysis & defenses J Newsome, E Shi, D Song, A Perrig Third international symposium on information processing in sensor networks …, 2004 | 1919 | 2004 |
Hawk: The blockchain model of cryptography and privacy-preserving smart contracts A Kosba, A Miller, E Shi, Z Wen, C Papamanthou 2016 IEEE symposium on security and privacy (SP), 839-858, 2016 | 1534 | 2016 |
Controlling data in the cloud: outsourcing computation without outsourcing control R Chow, P Golle, M Jakobsson, E Shi, J Staddon, R Masuoka, J Molina Proceedings of the 2009 ACM workshop on Cloud computing security, 85-90, 2009 | 1053 | 2009 |
On scaling decentralized blockchains K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ... International conference on financial cryptography and data security, 106-125, 2016 | 897 | 2016 |
Designing secure sensor networks E Shi, A Perrig IEEE Wireless Communications 11 (6), 38-43, 2004 | 797 | 2004 |
Path ORAM: an extremely simple oblivious RAM protocol E Stefanov, M Van Dijk, E Shi, C Fletcher, L Ren, X Yu, S Devadas Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 746 | 2013 |
Bitter to better—how to make bitcoin a better currency S Barber, X Boyen, E Shi, E Uzun International conference on financial cryptography and data security, 399-414, 2012 | 697 | 2012 |
Multi-dimensional range query over encrypted data E Shi, J Bethencourt, THH Chan, D Song, A Perrig 2007 IEEE Symposium on Security and Privacy (SP'07), 350-364, 2007 | 660 | 2007 |
Privacy-preserving aggregation of time-series data E Shi, THH Chan, E Rieffel, R Chow, D Song Proc. NDSS 2, 1-17, 2011 | 633 | 2011 |
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems A Seshadri, M Luk, E Shi, A Perrig, L Van Doorn, P Khosla Proceedings of the twentieth ACM symposium on Operating systems principles, 1-16, 2005 | 480 | 2005 |
Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab K Delmolino, M Arnett, A Kosba, A Miller, E Shi International conference on financial cryptography and data security, 79-94, 2016 | 444 | 2016 |
Predicate privacy in encryption systems E Shen, E Shi, B Waters Theory of Cryptography Conference, 457-473, 2009 | 427 | 2009 |
Practical Dynamic Searchable Encryption with Small Leakage. E Stefanov, C Papamanthou, E Shi NDSS 71, 72-75, 2014 | 424 | 2014 |
Oblivious RAM with O ((logN) 3) worst-case cost E Shi, THH Chan, E Stefanov, M Li International Conference on The Theory and Application of Cryptology and …, 2011 | 421 | 2011 |
The honey badger of BFT protocols A Miller, Y Xia, K Croman, E Shi, D Song Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 399 | 2016 |
Town crier: An authenticated data feed for smart contracts F Zhang, E Cecchetti, K Croman, A Juels, E Shi Proceedings of the 2016 aCM sIGSAC conference on computer and communications …, 2016 | 370 | 2016 |
Bind: A fine-grained attestation service for secure distributed systems E Shi, A Perrig, L Van Doorn 2005 IEEE Symposium on Security and Privacy (S&P'05), 154-168, 2005 | 349 | 2005 |
Stubborn mining: Generalizing selfish mining and combining with an eclipse attack K Nayak, S Kumar, A Miller, E Shi 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 305-320, 2016 | 346 | 2016 |
Towards practical oblivious RAM E Stefanov, E Shi, D Song arXiv preprint arXiv:1106.3652, 2011 | 341 | 2011 |
Private and continual release of statistics THH Chan, E Shi, D Song ACM Transactions on Information and System Security (TISSEC) 14 (3), 1-24, 2011 | 338 | 2011 |