Authenticating Email Search Results

Olga Ohrimenko , Hobart Reynolds , Roberto Tamassia
international workshop on security 225 -240

3
2012
Zero-Knowledge Accumulators and Set Algebra

Esha Ghosh , Olga Ohrimenko , Dimitrios Papadopoulos , Roberto Tamassia
international cryptology conference 67 -100

5
2016
Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees

Esha Ghosh , Michael T. Goodrich , Olga Ohrimenko , Roberto Tamassia
Lecture Notes in Computer Science 216 -236

5
2016
Challenges towards the next frontier in privacy

Rachel Cummings , Damien Desfontaines , David Evans , Roxana Geambasu
arXiv preprint arXiv:2304.06929

26
2023
Advancing differential privacy: Where we are now and future directions for real-world deployment

Rachel Cummings , Damien Desfontaines , David Evans , Roxana Geambasu
PubPub 6 ( 1)

4
2024
FLAT-Chat: A Word Recovery Attack on Federated Language Model Training

Qiongkai Xu , Jun Wang , Olga Ohrimenko , Trevor Cohn

2023
Replication-robust payoff-allocation with applications in machine learning marketplaces

Dongge Han , Shruti Tople , Alex Rogers , M Wooldridge
ArXiv, vol. abs/2006.14583

5
2020
Certified robustness of learning-based static malware detectors

Zhuoqun Huang , Neil G Marchant , Keane Lucas , Lujo Bauer
CoRR

1
2023
Data-oblivious graph drawing model and algorithms

Michael T Goodrich , Olga Ohrimenko , Roberto Tamassia
arXiv preprint arXiv:1209.0756

22
2012
Verifiable member and order queries on a list in zero-knowledge

Esha Ghosh , Olga Ohrimenko , Roberto Tamassia
arXiv preprint arXiv:1408.3843

11
2014
Oblivious storage with low I/O overhead

Michael T Goodrich , Michael Mitzenmacher , Olga Ohrimenko , Roberto Tamassia
arXiv preprint arXiv:1110.1851

9
2011
Verifiable order queries and order statistics on a list in zero-knowledge

Esha Ghosh , Olga Ohrimenko , Roberto Tamassia
Cryptology ePrint Archive

5
2014
Verifiable Privacy-Preserving Member and Order Queries on a List

Esha Ghosh , Olga Ohrimenko , Roberto Tamassia
arXiv preprint arXiv:1405.0962

2014
Roy Schuster, Alex Shamis, Olga Vrousgou, and Christoph M Wintersteiger.[nd]

Mark Russinovich , Edward Ashton , Christine Avanessians , Miguel Castro
CCF: A Framework for Building Confidential Verifiable Replicated Services.([nd]) 17

6
Submission in Response to the 2023-2030 Australian Cyber Security Strategy Discussion Paper

Shaanan Cohney Atif Ahmad , Suelette Dreyfus , Sarah Erfani , Liam Harding

2023
Advancing differential privacy: Where we are now and future directions for real-world deployment

Rachel Cummings , Damien Desfontaines , David Evans , Roxana Geambasu
arXiv preprint arXiv:2304.06929

4
2023
Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget

Jiankai Jin , Chitchanok Chuengsatiansup , Toby Murray , Benjamin IP Rubinstein
In Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS 2024)

1
2024
CERT-ED: Certifiably Robust Text Classification for Edit Distance

Zhuoqun Huang , Neil G Marchant , Olga Ohrimenko , Benjamin IP Rubinstein
EMNLP 2024

2024
Modelling for lazy clause generation

Olga Ohrimenko , Peter J. Stuckey
computing the australasian theory symposium 27 -37

5
2008
Privacy-preserving group data access via stateless oblivious RAM simulation

Olga Ohrimenko , Roberto Tamassia , Michael Mitzenmacher , Michael T. Goodrich
symposium on discrete algorithms 157 -167

271
2012