181 results on '"Mariana Raykova"'
Search Results
2. Computationally Secure Aggregation and Private Information Retrieval in the Shuffle Model.
3. Communication-Efficient Secure Logistic Regression.
4. Privacy-Preserving Regular Expression Matching Using TNFA.
5. Hintless Single-Server Private Information Retrieval.
6. Differentially Private Ad Conversion Measurement.
7. Anonymous Counting Tokens.
8. ACORN: Input Validation for Secure Aggregation.
9. Provably Robust Watermarks for Open-Source Language Models.
10. Secure Poisson Regression.
11. Distributed, Private, Sparse Histograms in the Two-Server Model.
12. Locked Circuit Indistinguishability: A Notion of Security for Logic Locking.
13. Willow: Secure Aggregation with One-Shot Clients.
14. Malicious Security for Sparse Private Histograms.
15. Large-Scale Private Set Intersection in the Client-Server Setting.
16. UN Handbook on Privacy-Preserving Computation Techniques.
17. Private Join and Compute from PIR with Default.
18. Communication-Computation Trade-offs in PIR.
19. On the (in)security of ROS.
20. On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality.
21. Secure Single-Server Aggregation with (Poly)Logarithmic Overhead.
22. Two-Sided Malicious Security for Private Intersection-Sum with Cardinality.
23. Anonymous Tokens with Private Metadata Bit.
24. Advances and Open Problems in Federated Learning.
25. Privacy-Preserving Regular Expression Matching using Nondeterministic Finite Automata.
26. Hintless Single-Server Private Information Retrieval.
27. Public-Key Function-Private Hidden Vector Encryption (and More).
28. Distributed Vector-OLE: Improved Constructions and Implementation.
29. Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning.
30. PanORAMa: Oblivious RAM with Logarithmic Overhead.
31. Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation.
32. RapidChain: Scaling Blockchain via Full Sharding.
33. A Simple Obfuscation Scheme for Pattern-Matching with Wildcards.
34. Publicly verifiable anonymous tokens with private metadata bit.
35. ACORN: Input Validation for Secure Aggregation.
36. Communication Efficient Secure Logistic Regression.
37. On the (in)Security of ROS.
38. Optimal-Rate Non-Committing Encryption.
39. 5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits.
40. Multi-input Inner-Product Functional Encryption from Pairings.
41. Low-Leakage Secure Search for Boolean Expressions.
42. Think Global, Act Local: Gossip and Client Audits in Verifiable Data Structures.
43. Revisiting Square-Root ORAM: Efficient Random Access in Multi-party Computation.
44. Adaptive Succinct Garbled RAM or: How to Delegate Your Database.
45. 5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs.
46. Privacy-Preserving Distributed Linear Regression on High-Dimensional Data.
47. Private Database Access with HE-over-ORAM Architecture.
48. Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks.
49. Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation.
50. Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.