Shantanu Sharma

Orcid: 0000-0002-1339-5481

Affiliations:
  • New Jersey Institute of Technology, Newark, NJ, USA
  • University of California, Irvine, CA, USA (2016-2021)
  • Ben-Gurion University of the Negev, Israel (PhD 2016)


According to our database1, Shantanu Sharma authored at least 63 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Prism: Privacy-Preserving and Verifiable Set Computation Over Multi-Owner Secret Shared Outsourced Databases.
IEEE Trans. Dependable Secur. Comput., 2024

Brief Announcement: Make Master Private-Keys Secure by Keeping It Public.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2024

Secure Normal Form: Mediation Among Cross Cryptographic Leakages in Encrypted Databases.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

Tutorial: Information Leakage from Cryptographic Techniques.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, ICDCS 2024, 2024

Data-CASE: Grounding Data Regulations for Compliant Data Processing Systems.
Proceedings of the Proceedings 27th International Conference on Extending Database Technology, 2024

2023
Veil: A Storage and Communication Efficient Volume-Hiding Algorithm.
Proc. ACM Manag. Data, December, 2023

Information-Theoretically Secure and Highly Efficient Search and Row Retrieval.
Proc. VLDB Endow., 2023

Prism: Private Set Intersection and Union with Aggregation over Multi-Owner Outsourced Data.
IACR Cryptol. ePrint Arch., 2023

Hiding Access-pattern is Not Enough! Veil: A Storage and Communication Efficient Volume-Hiding Algorithm.
CoRR, 2023

Federated Analytics: A survey.
CoRR, 2023

WedgeBlock: An Off-Chain Secure Logging Platform for Blockchain Applications.
Proceedings of the Proceedings 26th International Conference on Extending Database Technology, 2023

Supporting Complex Query Time Enrichment For Analytics.
Proceedings of the Proceedings 26th International Conference on Extending Database Technology, 2023

2022
Quest: Privacy-Preserving Monitoring of Network Data: A System for Organizational Response to Pandemics.
IEEE Trans. Serv. Comput., 2022

Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data.
IEEE Trans. Knowl. Data Eng., 2022

IoT Notary: Attestable Sensor Data Capture in IoT Environments.
ACM Trans. Internet Things, 2022

A Case for Enrichment in Data Management Systems.
SIGMOD Rec., 2022

QUEST: Privacy-Preserving Monitoring of Network Data.
Proceedings of the IEEE World Congress on Services, 2022

Cryptographic Techniques for Data Processing.
Proceedings of the CODS-COMAD 2022: 5th Joint International Conference on Data Science & Management of Data (9th ACM IKDD CODS and 27th COMAD), Bangalore, India, January 8, 2022

Sentaur: Sensor Observable Data Model for Smart Spaces.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

2021
Privacy-Preserving Secret Shared Computations Using MapReduce.
IEEE Trans. Dependable Secur. Comput., 2021

CANOPY: A Verifiable Privacy-Preserving Token Ring-Based Communication Protocol for Smart Homes.
ACM Trans. Cyber Phys. Syst., 2021

PRISM: Private Verifiable Set Computation over Multi-Owner Outsourced Databases.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

Concealer: SGX-based Secure, Volume Hiding, and Verifiable Processing of Spatial Time-Series Datasets.
Proceedings of the 24th International Conference on Extending Database Technology, 2021

Meta-X: A Technique for Reducing Communication in Geographically Distributed Computations.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

2020
PANDA: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data.
ACM Trans. Manag. Inf. Syst., 2020

On the Complexity of Hybrid n-Term Karatsuba Multiplier for Trinomials.
IEEE Trans. Circuits Syst. I Regul. Pap., 2020

Self-Stabilizing Automatic Repeat Request Algorithms for (Bounded Capacity, Omitting, Duplicating and non-FIFO) Computer Networks.
CoRR, 2020

Panda: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data.
CoRR, 2020

Quest: Practical and Oblivious Mitigation Strategies for COVID-19 using WiFi Datasets.
CoRR, 2020

Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data - Full Version.
CoRR, 2020

A privacy-enabled platform for COVID-19 applications: poster abstract.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

Security and Privacy Aspects in 5G Networks.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

Advances in Cryptography and Secure Hardware for Data Outsourcing.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

IoT Expunge: Implementing Verifiable Retention of IoT Data.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Recent Advances in Information-Theoretically Secure Data Outsourcing.
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020

Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
A Survey on Geographically Distributed Big-Data Processing Using MapReduce.
IEEE Trans. Big Data, 2019

Obscure: Information-Theoretic Oblivious and Verifiable Aggregation Queries.
Proc. VLDB Endow., 2019

Five do's and don'ts as a postdoctoral scholar.
XRDS, 2019

Smart Home Survey on Security and Privacy.
CoRR, 2019

IoT Notary: Sensor Data Attestation in Smart Environment.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

Partitioned Data Security on Outsourced Sensitive and Non-Sensitive Data.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

Verifiable Round-Robin Scheme for Smart Homes.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Scaling Cryptographic Techniques by Exploiting Data Sensitivity at a Public Cloud.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
An election algorithm to ensure the high availability of leader in large mobile ad hoc networks.
Int. J. Parallel Emergent Distributed Syst., 2018

Computing marginals using MapReduce.
J. Comput. Syst. Sci., 2018

Privacy-Preserving Secret Shared Computations using MapReduce.
CoRR, 2018

Exploiting Data Sensitivity on Partitioned Data.
Proceedings of the From Database to Cyber Security, 2018

2017
The excessive power of <i>Ctrl</i>+<i>C</i> and <i>Ctrl</i>+<i>V</i> in CS research and career development.
XRDS, 2017

2016
Assignment Problems of Different-Sized Inputs in MapReduce.
ACM Trans. Knowl. Discov. Data, 2016

A survey on 5G: The next generation of mobile communication.
Phys. Commun., 2016

Security and privacy aspects in MapReduce on clouds: A survey.
Comput. Sci. Rev., 2016

Computing Marginals Using MapReduce: Keynote talk paper.
Proceedings of the 20th International Database Engineering & Applications Symposium, 2016

Private and Secure Secret Shared MapReduce (Extended Abstract) - (Extended Abstract).
Proceedings of the Data and Applications Security and Privacy XXX, 2016

2015
Meta-MapReduce: A Technique for Reducing Communication in MapReduce Computations.
CoRR, 2015

Bounds for Overlapping Interval Join on MapReduce.
Proceedings of the Workshops of the EDBT/ICDT 2015 Joint Conference (EDBT/ICDT), 2015

2014
On detecting termination in cognitive radio networks.
Int. J. Netw. Manag., 2014

Assignment of Different-Sized Inputs in MapReduce.
Proceedings of the Distributed Computing - 28th International Symposium, 2014

2012
Self-stabilizing End-to-End Communication in (Bounded Capacity, Omitting, Duplicating and non-FIFO) Dynamic Networks - (Extended Abstract).
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012

2011
Elite Leader Finding Algorithm for MANETs.
Proceedings of the 10th International Symposium on Parallel and Distributed Computing, 2011

Democratic Leader Finding Algorithm for Large Mobile Ad Hoc Networks.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

Message efficient leader finding algorithm for mobile ad hoc networks.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011

Trivial solution for a non-trivial problem in MANETs.
Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, 2011


  Loading...