Author of the publication

Maliciously Secure Multi-Client ORAM.

, , , and . ACNS, volume 10355 of Lecture Notes in Computer Science, page 645-664. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Symbolic Malleable Zero-Knowledge Proofs., , , , and . CSF, page 412-426. IEEE Computer Society, (2015)Computationally Sound Abstraction and Verification of Secure Multi-Party Computations., , and . FSTTCS, volume 8 of LIPIcs, page 352-363. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2010)Differentially private data aggregation with optimal utility., , , , and . ACSAC, page 316-325. ACM, (2014)Authenticity by tagging and typing., , and . FMSE, page 1-12. ACM, (2004)Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol., , and . IEEE Symposium on Security and Privacy, page 202-215. IEEE Computer Society, (2008)Securing social networks., , and . PODC, page 341-342. ACM, (2011)Brief announcement: anonymity and trust in distributed systems., , , and . PODC, page 237-238. ACM, (2010)Concurrency and Privacy with Payment-Channel Networks., , , , and . CoRR, (2019)Verifying Relational Properties using Trace Logic., , , , , and . FMCAD, page 170-178. IEEE, (2019)WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring., , , , , and . USENIX Security Symposium, page 1493-1510. USENIX Association, (2018)