Edward Lui

According to our database1, Edward Lui authored at least 10 papers between 2011 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
New Models for Data Privacy and Voting.
PhD thesis, 2015

Stronger Impossibility Results for Strategy-Proof Voting with i.i.d. Beliefs.
CoRR, 2015

Outlier Privacy.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

From Weak to Strong Zero-Knowledge and Applications.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Voting with Coarse Beliefs.
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015

2013
Can theories be tested?: a cryptographic treatment of forecast testing.
Proceedings of the Innovations in Theoretical Computer Science, 2013

2012
Unprovable Security of Two-Message Zero Knowledge.
IACR Cryptol. ePrint Arch., 2012

Bayesian Mechanism Design with Efficiency, Privacy, and Approximate Truthfulness.
Proceedings of the Internet and Network Economics - 8th International Workshop, 2012

Crowd-Blending Privacy.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

2011
Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011


  Loading...