Elaine Runting Shi
Elaine Runting Shi
Associate Professor, Cornell
Ingen verifierad e-postadress
TitelCiteras avÅr
The sybil attack in sensor networks: analysis & defenses
J Newsome, E Shi, D Song, A Perrig
Third international symposium on information processing in sensor networks …, 2004
18332004
Hawk: The blockchain model of cryptography and privacy-preserving smart contracts
A Kosba, A Miller, E Shi, Z Wen, C Papamanthou
2016 IEEE symposium on security and privacy (SP), 839-858, 2016
10602016
Controlling data in the cloud: outsourcing computation without outsourcing control
R Chow, P Golle, M Jakobsson, E Shi, J Staddon, R Masuoka, J Molina
Proceedings of the 2009 ACM workshop on Cloud computing security, 85-90, 2009
9852009
Designing secure sensor networks
E Shi, A Perrig
IEEE Wireless Communications 11 (6), 38-43, 2004
7572004
On scaling decentralized blockchains
K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ...
International conference on financial cryptography and data security, 106-125, 2016
6702016
Path ORAM: an extremely simple oblivious RAM protocol
E Stefanov, M Van Dijk, E Shi, C Fletcher, L Ren, X Yu, S Devadas
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
6502013
Multi-dimensional range query over encrypted data
E Shi, J Bethencourt, THH Chan, D Song, A Perrig
2007 IEEE Symposium on Security and Privacy (SP'07), 350-364, 2007
5962007
Bitter to better—how to make bitcoin a better currency
S Barber, X Boyen, E Shi, E Uzun
International conference on financial cryptography and data security, 399-414, 2012
5892012
Privacy-preserving aggregation of time-series data
E Shi, THH Chan, E Rieffel, R Chow, D Song
Proc. NDSS 2, 1-17, 2011
5612011
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems
A Seshadri, M Luk, E Shi, A Perrig, L Van Doorn, P Khosla
Proceedings of the twentieth ACM symposium on Operating systems principles, 1-16, 2005
4532005
Predicate privacy in encryption systems
E Shen, E Shi, B Waters
Theory of Cryptography Conference, 457-473, 2009
4012009
Oblivious RAM with O ((logN) 3) worst-case cost
E Shi, THH Chan, E Stefanov, M Li
International Conference on The Theory and Application of Cryptology and …, 2011
3852011
Bind: A fine-grained attestation service for secure distributed systems
E Shi, A Perrig, L Van Doorn
2005 IEEE Symposium on Security and Privacy (S&P'05), 154-168, 2005
3412005
Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab
K Delmolino, M Arnett, A Kosba, A Miller, E Shi
International conference on financial cryptography and data security, 79-94, 2016
3302016
Practical Dynamic Searchable Encryption with Small Leakage.
E Stefanov, C Papamanthou, E Shi
NDSS 71, 72-75, 2014
3292014
Towards practical oblivious RAM
E Stefanov, E Shi, D Song
arXiv preprint arXiv:1106.3652, 2011
3112011
The smart classroom: merging technologies for seamless tele-education
Y Shi, W Xie, G Xu, R Shi, E Chen, Y Mao, F Liu
IEEE Pervasive Computing, 47-55, 2003
3062003
Implicit authentication through learning user behavior
E Shi, Y Niu, M Jakobsson, R Chow
International Conference on Information Security, 99-113, 2010
2912010
TACKing together efficient authentication, revocation, and privacy in VANETs
A Studer, E Shi, F Bai, A Perrig
2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2009
2812009
Private and continual release of statistics
THH Chan, E Shi, D Song
ACM Transactions on Information and System Security (TISSEC) 14 (3), 1-24, 2011
2802011
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20