Publications

 
 
OptORAMa: Optimal Oblivious RAM.
    Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Kartik Nayak, Enoch Peserico, and Elaine Shi. In Eurocrypt, 2020.
 
 
Path Oblivious Heap: Optimal and Practical Oblivious Priority Queue.
    Elaine Shi. In IEEE Symposium on Security and Privacy (S & P), 2020.
 
 
MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture.
    T-H. Hubert Chan, Kai-Min Chung, Wei-Kai Lin, and Elaine Shi. In Innovations in Theoretical Computer Science (ITCS), 2020.
 
 
Sublinear-Round Byzantine Agreement under Corrupt Majority.   [Online full version]   [Conference version]
    T-H. Hubert Chan, Rafael Pass, and Elaine Shi. In International Conference on Practice and Theory of Public-Key Cryptography (PKC), 2020.
 
 
KLOTSKI: Efficient Obfuscated Execution against Controlled-Channel Attacks.
    Pan Zhang, Chengyu Song, Heng Yin, Deqing Zou, Elaine Shi, and Hai Jin. In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2020.
 
 
Bucket Oblivious Sort: An Extremely Simple Oblivious Sort.
    Gilad Asharov, T-H. Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren and Elaine Shi. In SIAM Symposium on Simplicity in Algorithms (SOSA) , 2020.
 
 
Towards Attribute-Based Encryption for RAMs from LWE: Sub-linear Decryption, and More.
    Prabhanjan Ananth, Xiong Fan, and Elaine Shi. In Asiacrypt, 2019.
 
 
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness.
    Dana Dachman-Soled, Chang Liu, Charalampos Papamanthou, Elaine Shi, and Uzi Vishkin. In Journal of Cryptology, 2019.
 
 
Synchronous, with a Chance of Partition Tolerance.
    Yue Guo, Rafael Pass, and Elaine Shi. In CRYPTO, 2019.
 
 
Analysis of Deterministic Longest-Chain Protocols.
    Elaine Shi. In Computer Security Foundations Symposium (CSF), 2019.
 
 
Locality-Preserving Oblivious RAM.
    Gilad Asharov, T.-H. Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren, and Elaine Shi. In Eurocrypt, 2019.
 
 
Consensus Through Herding.
    T.-H. Hubert Chan, Rafael Pass, and Elaine Shi. In Eurocrypt, 2019.
 
 
Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake.
    Phil Daian, Rafael Pass, and Elaine Shi. In Financial Cryptography (FC) , 2019.
 
 
Communication Complexity of Byzantine Agreement, Revisited.
    Ittai Abraham, T.-H. Hubert Chan, Danny Dolev, Kartik Nayak, Rafael Pass, Ling Ren, and Elaine Shi. In Principles of Distributed Computing (PODC) , 2019.
 
 
Can We Overcome the n log n Barrier for Oblivious Sorting?
    Wei-Kai Lin, Elaine Shi, and Tiancheng Xie. In ACM-SIAM Symposium on Discrete Algorithms (SODA) , 2019.
 
 
Foundations of Differentially Oblivious Algorithms.
    T.-H. Hubert Chan, Kai-Min Chung, Bruce M. Maggs, and Elaine Shi. In ACM-SIAM Symposium on Discrete Algorithms (SODA) , 2019.
 
 
Towards Automated Safety Vetting of PLC Code in Real-World Plants.
    Mu Zhang, Chien-Ying Chen, Bin-Chou Kao, Yassine Qamsane, Yuru Shao, Yikai Lin, Elaine Shi, Sibin Mohan, Kira Barton, James R. Moyne, and Z. Morley Mao. In IEEE Symposium on Security and Privacy (S & P), 2019.
 
 
Lower bounds for external memory integer sorting via network coding.
    Alireza Farhadi, MohammadTaghi Hajiaghayi, Kasper Green Larsen, and Elaine Shi. In ACM SIGACT Symposium on Theory of Computing (STOC) , 2019.
 
 
Path ORAM: An Extremely Simple Oblivious RAM Protocol.
    Emil Stefanov, Marten van Dijk, Elaine Shi, T.-H. Hubert Chan, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, and Srinivas Devadas. In Journal of ACM, 2018.
 
 
More is Less: Perfectly Secure Oblivious Algorithms in the Multi-server Setting.
    T.-H. Hubert Chan, Jonathan Katz, Kartik Nayak, Antigoni Polychroniadou, and Elaine Shi. In Asiacrypt , 2018.
 
 
Symbolic Proofs for Lattice-Based Cryptography.
    Gilles Barthe, Xiong Fan, Joshua Gancher, Benjamin Grégoire, Charlie Jacomme, and Elaine Shi. In ACM Conference on Computer and Communications Security (CCS) , 2018.
 
 
Thunderella: Blockchains with Optimistic Instant Confirmation.
    Rafael Pass and Elaine Shi. In Eurocrypt , 2018.
 
 
Cache-Oblivious and Data-Oblivious Sorting and Applications.
    T.-H. Hubert Chan, Yue Guo, Wei-Kai Lin, and Elaine Shi. In ACM-SIAM Symposium on Discrete Algorithms (SODA) , 2018.
 
 
xJsnark: A Framework for Efficient Verifiable Computation.
    Ahmed E. Kosba, Charalampos Papamanthou, and Elaine Shi. In IEEE Symposium on Security and Privacy (S&P) , 2018.
 
 
Game Theoretic Notions of Fairness in Multi-party Coin Toss.
    Kai-Min Chung, Yue Guo, Wei-Kai Lin, Rafael Pass, and Elaine Shi. In Theory of Cryptography Conference (TCC) , 2018.
 
 
Perfectly Secure Oblivious Parallel RAM.
    T.-H. Hubert Chan, Kartik Nayak, and Elaine Shi. In Theory of Cryptography Conference (TCC) , 2018.
 
 
Distributed Private Data Analysis: Lower Bounds and Practical Constructions.
    Elaine Shi, T.-H. Hubert Chan, Eleanor G. Rieffel, and Dawn Song. In ACM Transaction on Algorithms, 2017.
 
 
The Sleepy Model of Consensus.
    Rafael Pass and Elaine Shi. In Asiacrypt , 2017.
 
 
On the Depth of Oblivious Parallel RAM.
    T.-H. Hubert Chan, Kai-Min Chung, and Elaine Shi. In Asiacrypt , 2017.
 
 
Oblivious Hashing Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM.
    T.-H. Hubert Chan, Yue Guo, Wei-Kai Lin, and Elaine Shi. In Asiacrypt , 2017.
 
 
Solidus: Confidential Distributed Ledger Transactions via PVORM.
    Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed E. Kosba, Ari Juels, and Elaine Shi. In ACM Conference on Computer and Communications Security (CCS) , 2017.
 
 
Rethinking Large-Scale Consensus.
    Rafael Pass, and Elaine Shi. In Computer Security Foundations Symposium (CSF) , 2017.
 
 
Formal Abstractions for Attested Execution Secure Processors.
    Rafael Pass, Elaine Shi, and Florian Tramer. In Eurocrypt , 2017.
 
 
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge.
    Florian Tramer, Fan Zhang, Huang Lin, Jean-Pierre Hubaux, Ari Juels, and Elaine Shi. In Euro S&P , 2017.
 
 
HOP: Hardware makes Obfuscation Practical.
    Kartik Nayak, Christopher W. Fletcher, Ling Ren, Nishanth Chandran, Satya V. Lokam, Elaine Shi, Vipul Goyal. In Network and Distributed System Security Symposium (NDSS) , 2017.
 
 
FruitChains: A Fair Blockchain.
    Rafael Pass and Elaine Shi. In ACM Symposium on Principles of Distributed Computing (PODC) , 2017.
 
 
Circuit OPRAM: Unifying Statistically and Computationally Secure ORAMs and OPRAMs.
    T-H. Hubert Chan and Elaine Shi. In Theory of Cryptography Conference (TCC) , 2017.
 
 
Hybrid Consensus: Efficient Consensus in the Permissionless Model.
    Rafael Pass, and Elaine Shi. In International Symposium on Distributed Computing (DISC) , 2017.
 
 
The Honey Badger of BFT Protocols.
    Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Dawn Song. In ACM Conference on Computer and Communications Security (CCS) , 2016.
 
 
Town Crier: An Authenticated Data Feed for Smart Contracts.
    Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, Elaine Shi. In ACM Conference on Computer and Communications Security (CCS) , 2016.
 
 
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts.
    Ari Juels, Ahmed E. Kosba, and Elaine Shi. In ACM Conference on Computer and Communications Security (CCS) , 2016.
 
 
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack.
    Kartik Nayak, Srijan Kumar, Andrew Miller, and Elaine Shi. In Euro S & P, 2016.
 
 
Understanding Craigslist Rental Scams.
    Youngsam Park, Damon McCoy, and Elaine Shi. In Financial Cryptography (FC) , 2016.
 
 
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab.
    Kevin Delmolino, Mitchell Arnett, Ahmed E. Kosba, Andrew Miller, and Elaine Shi. In Financial Cryptography Workshops (Bitcoin) , 2016.
 
 
On Scaling Decentralized Blockchains (A Position Paper)
    Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed E. Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer, Dawn Song, and Roger Wattenhofer. In Financial Cryptography Workshops (Bitcoin) , 2016.
 
 
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.
    Ahmed E. Kosba, Andrew Miller, Elaine Shi, Zikai Wen, Charalampos Papamanthou. In IEEE Symposium on Security and Privacy (S & P) , 2016.
 
 
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM.
    Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren, Elaine Shi, Daniel Wichs. In Theory of Cryptography Conference (TCC) , 2016.
 
 
Characterizing Long-tail SEO Spam on Cloud Web Hosting Services.
    Xiaojing Liao, Chang Liu, Damon McCoy, Elaine Shi, Shuang Hao, Raheem A. Beyah. In WWW , 2016.
 
 
Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions.
    Andrew Miller, Ahmed E. Kosba, Jonathan Katz, and Elaine Shi. In ACM Conference on Computer and Communications Security (CCS) , 2015.
 
 
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness.
    Dana Dachman-Soled, Chang Liu, Charalampos Papamanthou, Elaine Shi, and Uzi Vishkin. In Asiacrypt , 2015.
 
 
Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound.
    Xiao Shaun Wang, T-H. Hubert Chan, and Elaine Shi. In ACM Conference on Computer and Communications Security (CCS) , 2015.
 
 
Constant-Round MPC with Fairness and Guarantee of Output Delivery.
    S. Dov Gordon, Feng-Hao Liu, and Elaine Shi. In CRYPTO , 2015.
 
 
Constants Count: Practical Improvements to Oblivious RAM.
    Ling Ren, Christopher W. Fletcher, Albert Kwon,  Emil Stefanov, Elaine Shi, Marten van Dijk, and Srinivas Devadas. In Usenix Security Symposium , 2015.

 
ObliVM: A Programming Framework for Secure Computation.
    Chang Liu, Xiao Shaun Wang, Kartik Nayak, Yan Huang, and Elaine Shi. In IEEE Symposium on Security and Privacy (S&P) , 2015.
*** Source code released on our ObliVM project webpage .
 
 
GraphSC: Parallel Secure Computation Made Easy.
    Kartik Nayak, Xiao Shaun Wang, Stratis Ioannidis, Udi Weinsberg, Nina Taft, and Elaine Shi. In IEEE Symposium on Security and Privacy (S&P) , 2015.
*** Source code released on our ObliVM project webpage .
 
 
GhostRider: A Hardware-Software System for Memory Trace Oblivious Computation.
    Chang Liu, Michael Hicks, Austin Harris, Mohit Tiwari, Martin Maas, and Elaine Shi. In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) , 2015.
Best Paper Award.
 
 
Multi-Client Verifiable Computation with Stronger Security Guarantees.
    S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, and Hong-Sheng Zhou. In Theory of Cryptography Conference (TCC) , 2015.
 
 
Locally Decodable and Updatable Non-Malleable Codes and Their Applications.
    Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, and Hong-Sheng Zhou. In Theory of Cryptography Conference (TCC) , 2015.
 
 
SCORAM: Oblivious RAM for Secure Computation.
    Xiao Shaun Wang, Yan Huang, T-H. Hubert Chan, abhi shelat, and Elaine Shi. In ACM Conference on Computer and Communications Security (CCS) , 2014.
 
 
Oblivious Data Structures.
    Xiao Shaun Wang, Kartik Nayak, Chang Liu, T-H. Hubert Chan, Elaine Shi, Emil Stefanov, and Yan Huang. In ACM Conference on Computer and Communications Security (CCS) , 2014.
Finalist for the 2014 CSAW Best Applied Security Paper.
 
 
ShadowCrypt: Encrypted Web Applications for Everyone.
    Warren He, Devdatta Akhawe, Sumeet Jain, Elaine Shi, and Dawn Song. In ACM Conference on Computer and Communications Security (CCS) , 2014.
 
 
TrueSet: Nearly Practical Verifiable Set Computations.
    Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, and Nikos Triandopoulos. In Usenix Security , 2014.
 
 
Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns.
    Jonathan Dautrich, Emil Stefanov, and Elaine Shi. In Usenix Security , 2014.
 
 
SDDR: Light-Weight, Secure Mobile Encounters.
    Matthew Lentz, Viktor Erdelyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, and Bobby Bhattacharjee. In Usenix Security , 2014.
*** Source code now available on our project webpage .
 
 
EnCore: Private, Context-based Communication for Mobile Social Apps.
    Paarijaat Aditya, Viktor Erdelyi, Matthew Lentz, Elaine Shi, Bobby Bhattacharjee, and Peter Druschel. In International Conference on Mobile Systems, Applications, and Services (MobiSys) , 2014.
 
 
A Secure Computation Framework for Software Defined Networks.
    Nachikethas A. Jagadeesan, Ranjan Pal, Kaushik Nadikuditi, Yan Huang, Minlan Yu, and Elaine Shi. In ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN poster) , 2014.
 
 
PermaCoin: Repurposing Bitcoin Work for Long-Term Data Preservation.
    Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, and Jonathan Katz. In IEEE Symposium on Security and Privacy (S&P) , 2014.
 
 
Automating Efficient RAM-Model Secure Computation.
    Chang Liu, Yan Huang, Elaine Shi, Jonathan Katz, and Michael Hicks. In IEEE Symposium on Security and Privacy (S&P) , 2014.
 
 
Multi-Input Functional Encryption.
    Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, and Hong-Sheng Zhou. In Eurocrypt , 2014.
Merge of this and this .
 
 
Verifiable Oblivious Storage.
    Daniel Apon, Jonathan Katz, Elaine Shi, and Aishwarya Thiruvengadam. In International Conference on Practice and Theory of Public-Key Cryptography (PKC) , 2014.
 
 
Practical Dynamic Searchable Symmetric Encryption with Small Leakage.
    Emil Stefanov, Charalampos Papamanthou, and Elaine Shi. In Network and Distributed System Security Symposium (NDSS) , 2014.
 
 
Scambaiter: Understanding Targeted Nigerian Scams on Craigslist.
    Youngsam Park, Jackie Jones, Damon McCoy, Elaine Shi, and Markus Jakobsson. In Network and Distributed System Security Symposium (NDSS) , 2014.
Finalist for the 2014 CSAW Best Applied Security Paper.
 
 
Authenticated Data Structures, Generically.
    Andrew Miller, Michael Hicks, Jonathan Katz, and Elaine Shi. In ACM Symposium on Principles of Programming Languages (POPL) , 2014.
*** Source code and examples (including red-black tree, skip list, planar separator, and more) now available on our project webpage .
 
 
A High-Performance Oblivious RAM Controller on the Convey HC-2ex Heterogeneous Computing Platform.
    Martin Maas, Eric Love, Emil Stefanov, Mohit Tiwari, Elaine Shi, Krste Asanovic, John Kubiatowicz, and Dawn Song. In Workshop on the Intersections of Computer Architecture and Reconfigurable Logic (CARL) , 2013.
 
 
Practical Dynamic Proofs of Retrievability.
    Elaine Shi, Emil Stefanov, and Charalampos Papamanthou. In ACM Conference on Computer and Communications Security (CCS) , 2013.
UMD Invention of the Year Award.
 
 
Path ORAM: An Extremely Simple Oblivious RAM Protocol.
    Emil Stefanov, Marten van Dijk, Elaine Shi, T-H. Hubert Chan, Christopher Fletcher, Ling Ren, Xiangyao Yu, and Srinivas Devadas. In ACM Conference on Computer and Communications Security (CCS) , 2013.
Best Student Paper.    A simplified version of the proof is now available.
 
 
PHANTOM: Practical Oblivious Computation in a Secure Processor.
    Martin Maas, Eric Love, Emil Stefanov, Mohit Tiwari, Elaine Shi, Krste Asanovic, John Kubiatowicz, and Dawn Song. In ACM Conference on Computer and Communications Security (CCS) , 2013.
Finalist for AT&T Best Applied Security Paper Award.
 
 
Multi-Cloud Oblivious Storage.
    Emil Stefanov, and Elaine Shi. In ACM Conference on Computer and Communications Security (CCS) , 2013.
 
 
ObliviStore: High Performance Oblivious Cloud Storage.
    Emil Stefanov and Elaine Shi. In IEEE Symposium on Security and Privacy (S&P) , 2013.
A preliminary version appeared as a short presentation in NDSS, 2013.   Source code is available upon request.
 
 
Memory Trace Oblivious Program Execution.
    Chang Liu, Mike Hicks, and Elaine Shi. In Computer Security Foundations Symposium (CSF) , 2013.
NSA Best Scientific Cybersecurity Paper Award.
 
 
Streaming Authenticated Data Structures.
    Charalampos Papamanthou, Elaine Shi, Roberto Tamassia, and Ke Yi. In Eurocrypt , 2013.
 
 
Signatures of Correct Computation.
    Charalampos Papamanthou, Elaine Shi, and Roberto Tamassia. In Theory of Cryptography Conference (TCC) , 2013.
 
 
Optimal Lower Bound for Differentially Private Multi-Party Aggregation.
    T-H. Hubert Chan, Elaine Shi, and Dawn Song. In European Symposium on Algorithms (ESA) , 2012.
 
 
Context-Centric Security.
    Mohit Tiwari, Prashanth Mohan, Andrew Osheroff, Hilfi Alkaff, Elaine Shi, Eric Love, Dawn Song, and Krste Asanovic. In USENIX Workshop on Hot Topics in Security (HotSec) , 2012.
 
 
Jointly Predicting Links and Inferring Attributes with a Social-Attribute Network: an Empirical Study using Google+.
    Neil Zhenqiang Gong, Ameet Talwalkar, Lester Mackey, Ling Huang, Eui Chul Richard Shin, Emil Stefanov, Elaine Shi, and Dawn Song. In ACM workshop on Social Network Mining and Analysis (SNA-KDD) , 2012. Invited to a special issue of ACM TIST.
Google+ dataset (Collected by Emil Stefanov, Richard Shin, and myself. Now managed by Neil Gong).
 
 
Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams.
    T-H. Hubert Chan, Mingfei Li, Elaine Shi and Wenchang Xu. In Privacy Enhancing Technologies Symposium (PETS) , 2012.
 
 
Opaak: Using Mobile Phones to Limit Anonymous Identities Online.
    Gabriel Maganis, Elaine Shi, Hao Chen, Dawn Song. In International Conference on Mobile Systems, Applications and Services (MobiSys) , 2012.
 
 
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies.
    Emil Stefanov, Elaine Shi, Dawn Song. In International Conference on Practice and Theory of Public-Key Cryptography (PKC) , 2012.
 
 
GUPT: Privacy Preserving Data Analysis Made Easy.
    Prashanth Mohan, Abhradeep Guha Thakurta, Elaine Shi, Dawn Song, David Culler. In ACM SIGMOD , 2012.
 
 
Towards Practical Oblivious RAM.
    Emil Stefanov, Elaine Shi, Dawn Song. In Network and Distributed System Security Symposium (NDSS) , 2012.     Code is available here .
 
 
Cloud Data Protection for the Masses.
    Dawn Song, Umesh Shankar, Elaine Shi, Ian Fischer. Invited article at IEEE Computer Magazine, Annual Outlook Issue , 2012.
 
 
Privacy-Preserving Stream Aggregation with Fault Tolerance.
    T-H. Hubert Chan, Elaine Shi, Dawn Song. In Financial Cryptography and Data Security (FC) , 2012.
 
 
Bitter to Better: How to Make Bitcoin a Better Digital Currency.
    Simon Barber, Xavier Boyen, Elaine Shi, Ersin Uzun. In Financial Cryptography and Data Security (FC) , 2012.
 
 
Oblivious RAM with O(log N ^ 3) Worst-Case Cost.
    Elaine Shi, T-H. Hubert Chan, Emil Stefanov, Mingfei Li. In ASIACRYPT , 2011.
 
 
Private and Continual Release of Statistics.
    T-H. Hubert Chan, Elaine Shi, Dawn Song. In ACM Transactions on Information and System Security (TISSEC) , 2011.   (An earlier conference version appeared in ICALP'10.)
 
 
Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge.
    Arvind Narayanan, Elaine Shi, Benjamin I. P. Rubinstein. In International Joint Conference on Neural Networks (IJCNN) , 2011.
Winner of the IJCNN/Kaggle Social Network Challenge!
 
 
Privacy-Preserving Aggregation of Time-Series Data.
    Elaine Shi, T-H. Hubert Chan, Eleanor Rieffel, Richard Chow, Dawn Song. In Network and Distributed System Security Symposium (NDSS) , 2011.
 
 
Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection.
    Petros Maniatis, Devdatta Akhawe, Kevin Fall, Elaine Shi, Stephen McCamant, Dawn Song. In Workshop on Hot Topics in Operating Systems (HotOS) , 2011.
 
 
ES-TeV: Efficient and Secure Threshold-based Event Validation for VANETs.
    Hsu-Chun Hsiao, Ahren Studer, Rituik Dubey, Elaine Shi, Adrian Perrig. In ACM Conference on Wireless Network Security (WiSec) , 2011.
 
 
Privacy Settings in Context: A Case Study using Google Buzz.
    Daisuke Mashima, Elaine Shi, Prateek Sarkar, Richard Chow, Chris Li, Dawn Song. In IEEE International Workshop on SEcurity and SOCial Networking (SESOC) , 2011.
 
 
Private and Continual Release of Statistics.
    T-H. Hubert Chan, Elaine Shi, Dawn Song. In International Colloquium on Automata, Languages and Programming (ICALP) , 2010.
 
 
Signatures of Reputation: Towards Trust Without Identity.
    John Bethencourt, Elaine Shi, Dawn Song. In Financial Cryptography (FC) , 2010.
 
 
Implicit Authentication through Learning User Behavior.
    Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Chow. In Information Security Conference (ISC) , 2010.
 
 
Authentication in the Clouds: A Framework and its Application to Mobile Users.
    Richard Chow, Markus Jakobsson, Ryusuke Masuoka, Jesus Molina, Yuan Niu, Elaine Shi, Zhexuan Song. In The ACM Cloud Computing Security Workshop (CCSW) , 2010.
 
 
One Experience Collecting Sensitive Mobile Data.
    Yuan Niu, Elaine Shi, Richard Chow, Philippe Golle, Markus Jakobsson. In Usable Security Experiment Reports (USER) Workshop , 2010.
 
 
Predicate Privacy in Encryption Systems.
    Emily Shen, Elaine Shi, Brent Waters. In Theory of Cryptography Conference (TCC) , 2009.
 
 
Controlling data in the cloud: outsourcing computation without outsourcing control.
    Richard Chow, Philippe Golle, Markus Jakobsson, Ryusuke Masuoka, Jesus Molina, Elaine Shi, Jessica Staddon. In ACM workshop on Cloud computing security (CCSW) , 2009.
 
 
Implicit Authentication for Mobile Devices.
    Markus Jakobsson, Elaine Shi, Philippe Golle, Richard Chow. In USENIX Workshop on Hot Topics in Security (HotSec) , 2009.
 
 
TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs.
    Ahren Studer, Elaine Shi, Fan Bai, Adrian Perrig. In IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON) , 2009.
 
 
Is it too late for PAKE?
    John Engler, Chris Karlof, Elaine Shi, Dawn Song. In Web 2.0 Security and Privacy (W2SP) , 2009.
 
 
Delegating Capabilities in Predicate Encryption Systems.
    Elaine Shi, Brent Waters. In International Colloquium on Automata, Languages and Programming (ICALP) , 2008.
 
 
Multi-Dimensional Range Query over Encrypted Data.
    Elaine Shi, John Bethencourt, Hubert Chan, Dawn Song, Adrian Perrig. In IEEE Symposium on Security and Privacy (Oakland) , 2007.
    Errata: The conference version has a typo in the subscript of \beta on page 10, the online version is correct.
    Technical report version (full version) : CMU-CS-06-135R, May 2006
 
 
Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks.
    Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce Maggs, Yih-Chun Hu. In ACM SIGCOMM , 2007.
 
 
OverDoSe: A Generic DDoS Protection Service Using an Overlay Network.
   

Elaine Shi, Ion Stoica, David Andersen, Adrian Perrig. Technical report, CMU-CS-06-114, February, 2006.

 

 
Pioneer: Verifying Integrity and Guaranteeing Execution of Code on Legacy Platforms.
   

Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert Van Doorn, Pradeep Khosla. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP) , October, 2005.

 

 
BIND: A Fine-grained Attestation Service for Secure Distributed Systems.
   

Elaine Shi, Adrian Perrig, Leendert Van Doorn. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland) , May, 2005.

 

 
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts.
   

Jonathan McCune, Elaine Shi, Adrian Perrig, Mike Reiter. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland) , May, 2005.

 

 
The Sybil Attack in Sensor Networks: Analysis and Defense.
    James Newsome, Elaine Shi, Dawn Song, Adrian Perrig. In Proceedings of Information Processing in Sensor Networks (IPSN) , April, 2004.
 
 
Designing Secure Sensor Networks.
    Elaine Shi, Adrian Perrig. In IEEE Wireless Communications , Volume 11, Issue 6, December, 2004.
 
 
The Smart Classroom: Merging Technologies for Seamless Tele-education.
    Yuanchun Shi, Weikai Xie, Guangyou Xu, Runting Shi, Enyi Chen, Yanhua Mao, Fang Liu. In IEEE Pervasive Computing , Volume 2, Issue 2, 2003.
 
 
TORM: a hybrid multicast infrastructure for interactive distance learning.
    Yi Che, Runting Shi, Yuanchun Shi. In IEEE International Conference on Multimedia and Expo (ICME) , 2004.
 
 
SameView: A Large-Scale Real-Time Interactive E-learning System Based on TORM and AMTP.
    Yi Che, Runting Shi, Yuanchun Shi, Guangyou Xu. In Proceedings of International Conference on Web-Based Learning (ICWL) , 2003.
 
 
A Novel Stream Merging Algorithm for VOD Servers.
    Runting Shi, Ling Shao, Yunzhang Pei and Dong Xie. In Proceedings of IEEE Pacific-Rim Conference On Multimedia , 2003.
 
 
A Peer-to-peer True VOD System by Hierarchy Merge.
   

Guohui Lin, Runting Shi, Ling Shao, Pei Yunzhang and Dong Xie. In Proceedings of International Workshop on Grid and Cooperative Computing (GCC) , 2002.

 




free web stats