Class-RAG: Content Moderation with Retrieval Augmented Generation.
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2024
Privacy-Preserving Automated Exposure Notification.
IACR Cryptol. ePrint Arch., 2020
Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions.
IACR Cryptol. ePrint Arch., 2017
SoK: Cryptographically Protected Database Search.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Cryptography for Big Data Security.
IACR Cryptol. ePrint Arch., 2016
Secure Multiparty Computation for Cooperative Cyber Risk Assessment.
Proceedings of the IEEE Cybersecurity Development, 2016
Substring-Searchable Symmetric Encryption.
Proc. Priv. Enhancing Technol., 2015
Cryptographically Secure Computation.
Computer, 2015
Pattern Matching Encryption.
IACR Cryptol. ePrint Arch., 2014
A survey of cryptographic approaches to securing big-data analytics in the cloud.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2014
Pattern matching encryption, strategic equivalence of range voting and approval voting, and statistical robustness of voting rules.
PhD thesis, 2013
Drifting Keys: Impersonation detection for constrained devices.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
A Bayesian Method for Auditing Elections.
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012
Computing the Margin of Victory in IRV Elections.
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011
Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Inf. Forensics Secur., 2010
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy.
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the 19th USENIX Security Symposium, 2010
Scantegrity Mock Election at Takoma Park.
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the Electronic Voting 2010, 2010
Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Inf. Forensics Secur., 2009
Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
Predicate Privacy in Encryption Systems.
IACR Cryptol. ePrint Arch., 2008
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
Forward-Secure Signatures with Untrusted Update.
IACR Cryptol. ePrint Arch., 2006
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman.
Proceedings of the Public Key Cryptography, 2006