Emily Shen

According to our database1, Emily Shen authored at least 22 papers between 2006 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Privacy-Preserving Automated Exposure Notification.
IACR Cryptol. ePrint Arch., 2020

2017
Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions.
IACR Cryptol. ePrint Arch., 2017

SoK: Cryptographically Protected Database Search.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

2016
Cryptography for Big Data Security.
IACR Cryptol. ePrint Arch., 2016

Secure Multiparty Computation for Cooperative Cyber Risk Assessment.
Proceedings of the IEEE Cybersecurity Development, 2016

2015
Substring-Searchable Symmetric Encryption.
Proc. Priv. Enhancing Technol., 2015

Cryptographically Secure Computation.
Computer, 2015

2014
Pattern Matching Encryption.
IACR Cryptol. ePrint Arch., 2014

A survey of cryptographic approaches to securing big-data analytics in the cloud.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2014

2013
Pattern matching encryption, strategic equivalence of range voting and approval voting, and statistical robustness of voting rules.
PhD thesis, 2013

Drifting Keys: Impersonation detection for constrained devices.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
A Bayesian Method for Auditing Elections.
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012

2011
Computing the Margin of Victory in IRV Elections.
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011

2010
Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Inf. Forensics Secur., 2010

Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy.
Proceedings of the 19th USENIX Security Symposium, 2010


2009
Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Inf. Forensics Secur., 2009

Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

2008
Predicate Privacy in Encryption Systems.
IACR Cryptol. ePrint Arch., 2008

Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

2006
Forward-Secure Signatures with Untrusted Update.
IACR Cryptol. ePrint Arch., 2006

Strongly Unforgeable Signatures Based on Computational Diffie-Hellman.
Proceedings of the Public Key Cryptography, 2006


  Loading...