Mayank Varia
Mayank Varia
Boston University, Computing and Data Sciences
Потвърден имейл адрес: bu.edu - Начална страница
SoK: Cryptographically protected database search
B Fuller, M Varia, A Yerukhimovich, E Shen, A Hamlin, V Gadepally, ...
2017 IEEE Symposium on Security and Privacy (SP), 172-191, 2017
Obfuscation of hyperplane membership
R Canetti, GN Rothblum, M Varia
Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010
Computing on masked data: a high performance method for improving big data veracity
J Kepner, V Gadepally, P Michaleas, N Schear, M Varia, A Yerukhimovich, ...
2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014
On symmetric encryption and point obfuscation
R Canetti, Y Tauman Kalai, M Varia, D Wichs
Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010
Conclave: secure multi-party computation on big data
N Volgushev, M Schwarzkopf, B Getchell, M Varia, A Lapets, A Bestavros
Proceedings of the Fourteenth EuroSys Conference 2019, 1-18, 2019
Principal inertia components and applications
F du Pin Calmon, A Makhdoumi, M Médard, M Varia, M Christiansen, ...
IEEE Transactions on Information Theory 63 (8), 5011-5038, 2017
Accessible privacy-preserving web-based data analysis for assessing and addressing economic inequalities
A Lapets, F Jansen, KD Albab, R Issa, L Qin, M Varia, A Bestavros
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable …, 2018
Secure MPC for analytics as a web application
A Lapets, N Volgushev, A Bestavros, F Jansen, M Varia
2016 IEEE Cybersecurity Development (SecDev), 73-74, 2016
EasyUC: Using EasyCrypt to mechanize proofs of universally composable security
R Canetti, A Stoughton, M Varia
2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 167-183, 2019
User-centric distributed solutions for privacy-preserving analytics
A Bestavros, A Lapets, M Varia
Communications of the ACM 60 (2), 37-39, 2017
Anonymous collocation discovery: Harnessing privacy to tame the coronavirus
R Canetti, A Trachtenberg, M Varia
arXiv e-prints, arXiv: 2003.13670, 2020
Privacy-Preserving Automated Exposure Notification
R Canetti, YT Kalai, A Lysyanskaya, RL Rivest, A Shamir, E Shen, ...
IACR Cryptol. ePrint Arch. 2020, 863, 2020
The PACT protocol specification
RL Rivest, J Callas, R Canetti, K Esvelt, DK Gillmor, YT Kalai, ...
Private Automated Contact Tracing Team, MIT, Cambridge, MA, USA, Tech. Rep. 0.1, 2020
Bounds on inference
FP Calmon, M Varia, M Médard, MM Christiansen, KR Duffy, S Tessaro
2013 51st Annual Allerton Conference on Communication, Control, and …, 2013
Non-malleable obfuscation
R Canetti, M Varia
Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San …, 2009
The security of NTP’s datagram protocol
A Malhotra, M Van Gundy, M Varia, H Kennedy, J Gardner, S Goldberg
International Conference on Financial Cryptography and Data Security, 405-423, 2017
HEtest: A homomorphic encryption testing framework
M Varia, S Yakoubov, Y Yang
Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015
Callisto: A cryptographic approach to detect serial predators of sexual misconduct
A Rajan, L Qin, D Archer, D Boneh, T Lepoint, M Varia
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable …, 2018
Computing on masked data to improve the security of big data
V Gadepally, B Hancock, B Kaiser, J Kepner, P Michaleas, M Varia, ...
2015 IEEE International Symposium on Technologies for Homeland Security (HST …, 2015
Privacy with estimation guarantees
H Wang, L Vo, FP Calmon, M Médard, KR Duffy, M Varia
IEEE Transactions on Information Theory 65 (12), 8025-8042, 2019
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20