Data-Oblivious Graph Drawing Model and Algorithms

Olga Ohrimenko , Roberto Tamassia , Michael T. Goodrich
arXiv: Data Structures and Algorithms

14
2012
Mean Field Models of Message Throughput in Dynamic Peer-to-Peer Systems

Olga Ohrimenko , Aaron Harwood
arXiv: Distributed, Parallel, and Cluster Computing

1
2007
Oblivious Storage with Low I/O Overhead

Olga Ohrimenko , Roberto Tamassia , Michael Mitzenmacher , Michael T. Goodrich
arXiv: Cryptography and Security

5
2011
Verifying Search Results Over Web Collections

Nikos Triandopoulos , Olga Ohrimenko , Roberto Tamassia , Charalampos Papamanthou
arXiv: Cryptography and Security

2012
Verifiable Privacy-Preserving Member and Order Queries on a List

Olga Ohrimenko , Roberto Tamassia , Esha Ghosh
arXiv: Cryptography and Security

2014
Verifiable Member and Order Queries on a List in Zero-Knowledge

Olga Ohrimenko , Roberto Tamassia , Esha Ghosh
arXiv: Cryptography and Security

3
2014
3
2014
Techniques for verifying search results over a distributed collection

Olga Ohrimenko , Roberto Tamassia , Charalampos Papamanthou , Nikolaos Triandopoulos

6
2012
Data center privacy

Christos Gkantsidis , Olga Ohrimenko , Markulf Kohlweiss , Cedric Fournet

3
2015
Zero-Knowledge Accumulators and Set Algebra

Nikos Triandopoulos , Olga Ohrimenko , Roberto Tamassia , Esha Ghosh
Lecture Notes in Computer Science 10032 67

5
2016
The Pyramid Scheme: Oblivious RAM for Trusted Processors

Olga Ohrimenko , Felix Schuster , Sameer Wagh , Lawrence Esswood
arXiv: Cryptography and Security

9
2017
Privacy-preserving machine learning

Olga Ohrimenko , Cédric Alain Marie Christophe Fournet , Kapil Vaswani , Sebastian Nowozin

12
2016
An Algorithmic Framework For Differentially Private Data Analysis on Trusted Processors

Olga Ohrimenko , Janardhan Kulkarni , Sergey Yekhanin , Bolin Ding
arXiv: Cryptography and Security

1
2018
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives.

Olga Ohrimenko , Brice Minaud , Raphael Bost
IACR Cryptology ePrint Archive 2017 805

1
2017
Contamination Attacks and Mitigation in Multi-Party Machine Learning.

Olga Ohrimenko , Jamie Hayes
arXiv: Cryptography and Security

1
2019
Haze: Privacy-Preserving Real-Time Traffic Statistics

Olga Ohrimenko , Roberto Tamassia , Joshua Brown
arXiv: Cryptography and Security

2
2013
The Melbourne Shuffle: Improving Oblivious Storage in the Cloud

Olga Ohrimenko , Roberto Tamassia , Eli Upfal , Michael T. Goodrich
arXiv: Cryptography and Security

7
2014
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data.

Olga Ohrimenko , Markulf Kohlweiss , Bryan Parno , Cédric Fournet
IACR Cryptology ePrint Archive 2016 985

2016