Seguir
abhi shelat
abhi shelat
Professor of Computer Science
Dirección de correo verificada de neu.edu - Página principal
Título
Citado por
Citado por
Año
Analysis of the blockchain protocol in asynchronous networks
R Pass, L Seeman, A Shelat
Annual international conference on the theory and applications of …, 2017
8272017
The smallest grammar problem
M Charikar, E Lehman, D Liu, R Panigrahy, M Prabhakaran, A Sahai, ...
IEEE Transactions on Information Theory 51 (7), 2554-2576, 2005
4542005
One‐to‐many propensity score matching in cohort studies
JA Rassen, AA Shelat, J Myers, RJ Glynn, KJ Rothman, S Schneeweiss
Pharmacoepidemiology and drug safety 21, 69-80, 2012
4322012
Efficient protocols for set membership and range proofs
J Camenisch, R Chaabouni, A Shelat
International Conference on the Theory and Application of Cryptology and …, 2008
3852008
{Billion-Gate} Secure Computation with Malicious Adversaries
B Kreuter, A Shelat, CH Shen
21st USENIX Security Symposium (USENIX Security 12), 285-300, 2012
376*2012
Doubly-efficient zkSNARKs without trusted setup
RS Wahby, I Tzialla, A Shelat, J Thaler, M Walfish
2018 IEEE Symposium on Security and Privacy (SP), 926-943, 2018
3122018
Remembrance of data passed: A study of disk sanitization practices
SL Garfinkel, A Shelat
IEEE Security & Privacy 1 (1), 17-27, 2003
3082003
Simulatable adaptive oblivious transfer
J Camenisch, G Neven, abhi shelat
Advances in Cryptology-EUROCRYPT 2007, 573-590, 2007
2992007
Securely obfuscating re-encryption
S Hohenberger, GN Rothblum, abhi shelat, V Vaikuntanathan
Theory of Cryptography, 233-252, 2007
275*2007
SCORAM: oblivious RAM for secure computation
XS Wang, Y Huang, THH Chan, A Shelat, E Shi
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1962014
Scaling ORAM for secure computation
J Doerner, A Shelat
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1892017
Secure two-party threshold ECDSA from ECDSA assumptions
J Doerner, Y Kondi, E Lee, A Shelat
2018 IEEE Symposium on Security and Privacy (SP), 980-997, 2018
1702018
Matching by propensity score in cohort studies with three treatment groups
JA Rassen, AA Shelat, JM Franklin, RJ Glynn, DH Solomon, ...
Epidemiology 24 (3), 401-409, 2013
1692013
A better method to analyze blockchain consistency
L Kiffer, R Rajaraman, A Shelat
Proceedings of the 2018 acm sigsac conference on computer and communications …, 2018
1612018
Computing on authenticated data
JH Ahn, D Boneh, J Camenisch, S Hohenberger, A Shelat, B Waters
Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012 …, 2012
1532012
Threshold ECDSA from ECDSA assumptions: The multiparty case
J Doerner, Y Kondi, E Lee, A Shelat
2019 IEEE Symposium on Security and Privacy (SP), 1051-1066, 2019
1442019
Privacy and identity management for everyone
J Camenisch, A Shelat, D Sommer, S Fischer-Hübner, M Hansen, ...
Proceedings of the 2005 workshop on Digital identity management, 20-27, 2005
1402005
Two-output secure computation with malicious adversaries
C Shen, A Shelat
Advances in Cryptology–EUROCRYPT 2011, 386-405, 2011
132*2011
Approximation algorithms for grammar-based compression
E Lehman, A Shelat
Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete …, 2002
1122002
Micropayments for decentralized currencies
R Pass, A Shelat
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1062015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20