Olga Ohrimenko

According to our database1, Olga Ohrimenko authored at least 49 papers between 2007 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Custodes: Auditable Hypothesis Testing.
CoRR, 2019

Contamination Attacks and Mitigation in Multi-Party Machine Learning.
CoRR, 2019

2018
Verifying the consistency of remote untrusted services with conflict-free operations.
Inf. Comput., 2018

Structured Encryption and Leakage Suppression.
IACR Cryptology ePrint Archive, 2018

An Algorithmic Framework For Differentially Private Data Analysis on Trusted Processors.
CoRR, 2018

Contamination Attacks and Mitigation in Multi-Party Machine Learning.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

Structured Encryption and Leakage Suppression.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives.
IACR Cryptology ePrint Archive, 2017

The Pyramid Scheme: Oblivious RAM for Trusted Processors.
CoRR, 2017

Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory.
Proceedings of the 26th USENIX Security Symposium, 2017

Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Efficient Verifiable Range and Closest Point Queries in Zero-Knowledge.
PoPETs, 2016

Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data.
IACR Cryptology ePrint Archive, 2016

Oblivious Multi-Party Machine Learning on Trusted Processors.
Proceedings of the 25th USENIX Security Symposium, 2016

Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Zero-Knowledge Accumulators and Set Algebra.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Authenticated Range \& Closest Point Queries in Zero-Knowledge.
IACR Cryptology ePrint Archive, 2015

Zero-Knowledge Accumulators and Set Operations.
IACR Cryptology ePrint Archive, 2015

Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data.
IACR Cryptology ePrint Archive, 2015

Sorting and Searching Behind the Curtain.
Proceedings of the Financial Cryptography and Data Security, 2015

Observing and Preventing Leakage in MapReduce.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Zero-Knowledge Authenticated Order Queries and Order Statistics on a List.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Verifiable Member and Order Queries on a List in Zero-Knowledge.
IACR Cryptology ePrint Archive, 2014

Sorting and Searching Behind the Curtain: Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data.
IACR Cryptology ePrint Archive, 2014

The Melbourne Shuffle: Improving Oblivious Storage in the Cloud.
CoRR, 2014

Verifiable Member and Order Queries on a List in Zero-Knowledge.
CoRR, 2014

Verifying the Consistency of Remote Untrusted Services with Commutative Operations.
Proceedings of the Principles of Distributed Systems - 18th International Conference, 2014

The Melbourne Shuffle: Improving Oblivious Storage in the Cloud.
Proceedings of the Automata, Languages, and Programming - 41st International Colloquium, 2014

2013
Computer Security.
Proceedings of the Handbook on Graph Drawing and Visualization., 2013

On Verifying the Consistency of Remote Untrusted Services
CoRR, 2013

Haze: Privacy-Preserving Real-Time Traffic Statistics.
CoRR, 2013

Haze: privacy-preserving real-time traffic statistics.
Proceedings of the 21st SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2013

2012
Efficient Verification of Web-Content Searching Through Authenticated Web Crawlers.
PVLDB, 2012

Lower bounds for randomized algorithms for online chain partitioning.
Inf. Process. Lett., 2012

Data-Oblivious Graph Drawing Model and Algorithms
CoRR, 2012

Verifying Search Results Over Web Collections
CoRR, 2012

Authenticating Email Search Results.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Privacy-preserving group data access via stateless oblivious RAM simulation.
Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, 2012

Graph Drawing in the Cloud: Privately Visualizing Relational Data Using Small Working Storage.
Proceedings of the Graph Drawing - 20th International Symposium, 2012

Practical oblivious storage.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Oblivious Storage with Low I/O Overhead
CoRR, 2011

Oblivious RAM Simulation with Efficient Worst-Case Access Overhead
CoRR, 2011

Privacy-Preserving Group Data Access via Stateless Oblivious RAM Simulation
CoRR, 2011

Oblivious RAM simulation with efficient worst-case access overhead.
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011

2009
Propagation via lazy clause generation.
Constraints, 2009

2008
Modelling for Lazy Clause Generation.
Proceedings of the Theory of Computing 2008. Proc. Fourteenth Computing: The Australasian Theory Symposium (CATS 2008), 2008

2007
Mean Field Models of Message Throughput in Dynamic Peer-to-Peer Systems
CoRR, 2007

Propagation = Lazy Clause Generation.
Proceedings of the Principles and Practice of Constraint Programming, 2007


  Loading...