Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine Learning Classification over Encrypted Data., , , and . IACR Cryptology ePrint Archive, (2014)Arx: An Encrypted Database using Semantically Secure Encryption., , and . PVLDB, 12 (11): 1664-1678 (2019)Cloud Programming Simplified: A Berkeley View on Serverless Computing., , , , , , , , , and 4 other author(s). CoRR, (2019)Waldo: A Private Time-Series Database from Function Secret Sharing., , , and . IACR Cryptol. ePrint Arch., (2021)Census: Location-Aware Membership Management for Large-Scale Distributed Systems., , , , and . USENIX Annual Technical Conference, USENIX Association, (2009)Guidelines for Using the CryptDB System Securely., , and . IACR Cryptology ePrint Archive, (2015)What serverless computing is and should become: the next phase of cloud computing., , , , , , , , and . Commun. ACM, 64 (5): 76-84 (2021)JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT., , , , and . USENIX Security Symposium, page 1519-1536. USENIX Association, (2019)DIZK: A Distributed Zero Knowledge Proof System., , , , and . USENIX Security Symposium, page 675-692. USENIX Association, (2018)Building Web Applications on Top of Encrypted Data Using Mylar., , , , , , and . ;login:, (2014)