BibTeX records: Olga Ohrimenko

download as .bib file

@article{DBLP:journals/corr/abs-2401-17628,
  author       = {Jiankai Jin and
                  Chitchanok Chuengsatiansup and
                  Toby Murray and
                  Benjamin I. P. Rubinstein and
                  Yuval Yarom and
                  Olga Ohrimenko},
  title        = {Elephants Do Not Forget: Differential Privacy with State Continuity
                  for Privacy Budget},
  journal      = {CoRR},
  volume       = {abs/2401.17628},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.17628},
  doi          = {10.48550/ARXIV.2401.17628},
  eprinttype    = {arXiv},
  eprint       = {2401.17628},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-17628.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pervasive/TagBVZBKKO23,
  author       = {Benjamin Tag and
                  Niels van Berkel and
                  Sunny Verma and
                  Benjamin Zi Hao Zhao and
                  Shlomo Berkovsky and
                  Dali Kaafar and
                  Vassilis Kostakos and
                  Olga Ohrimenko},
  title        = {DDoD: Dual Denial of Decision Attacks on Human-AI Teams},
  journal      = {{IEEE} Pervasive Comput.},
  volume       = {22},
  number       = {1},
  pages        = {77--84},
  year         = {2023},
  url          = {https://doi.org/10.1109/MPRV.2022.3218773},
  doi          = {10.1109/MPRV.2022.3218773},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pervasive/TagBVZBKKO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tai/HanWROT23,
  author       = {Dongge Han and
                  Michael J. Wooldridge and
                  Alex Rogers and
                  Olga Ohrimenko and
                  Sebastian Tschiatschek},
  title        = {Replication Robust Payoff Allocation in Submodular Cooperative Games},
  journal      = {{IEEE} Trans. Artif. Intell.},
  volume       = {4},
  number       = {5},
  pages        = {1114--1128},
  year         = {2023},
  url          = {https://doi.org/10.1109/TAI.2022.3195686},
  doi          = {10.1109/TAI.2022.3195686},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tai/HanWROT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aistats/ChenO23,
  author       = {Michelle Chen and
                  Olga Ohrimenko},
  editor       = {Francisco J. R. Ruiz and
                  Jennifer G. Dy and
                  Jan{-}Willem van de Meent},
  title        = {Protecting Global Properties of Datasets with Distribution Privacy
                  Mechanisms},
  booktitle    = {International Conference on Artificial Intelligence and Statistics,
                  25-27 April 2023, Palau de Congressos, Valencia, Spain},
  series       = {Proceedings of Machine Learning Research},
  volume       = {206},
  pages        = {7472--7491},
  publisher    = {{PMLR}},
  year         = {2023},
  url          = {https://proceedings.mlr.press/v206/chen23f.html},
  timestamp    = {Mon, 19 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aistats/ChenO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuiFO23,
  author       = {Tian Hui and
                  Farhad Farokhi and
                  Olga Ohrimenko},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Information Leakage from Data Updates in Machine Learning Models},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {35--41},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623905},
  doi          = {10.1145/3605764.3623905},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HuiFO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai/XuCO23,
  author       = {Qiongkai Xu and
                  Trevor Cohn and
                  Olga Ohrimenko},
  editor       = {Kobi Gal and
                  Ann Now{\'{e}} and
                  Grzegorz J. Nalepa and
                  Roy Fairstein and
                  Roxana Radulescu},
  title        = {Fingerprint Attack: Client De-Anonymization in Federated Learning},
  booktitle    = {{ECAI} 2023 - 26th European Conference on Artificial Intelligence,
                  September 30 - October 4, 2023, Krak{\'{o}}w, Poland - Including
                  12th Conference on Prestigious Applications of Intelligent Systems
                  {(PAIS} 2023)},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {372},
  pages        = {2792--2801},
  publisher    = {{IOS} Press},
  year         = {2023},
  url          = {https://doi.org/10.3233/FAIA230590},
  doi          = {10.3233/FAIA230590},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecai/XuCO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/0057OW23,
  author       = {Hao Wu and
                  Olga Ohrimenko and
                  Anthony Wirth},
  editor       = {Andreas Krause and
                  Emma Brunskill and
                  Kyunghyun Cho and
                  Barbara Engelhardt and
                  Sivan Sabato and
                  Jonathan Scarlett},
  title        = {Tight Data Access Bounds for Private Top-k Selection},
  booktitle    = {International Conference on Machine Learning, {ICML} 2023, 23-29 July
                  2023, Honolulu, Hawaii, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {202},
  pages        = {37635--37655},
  publisher    = {{PMLR}},
  year         = {2023},
  url          = {https://proceedings.mlr.press/v202/wu23q.html},
  timestamp    = {Mon, 28 Aug 2023 17:23:08 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/0057OW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/HuangMLBOR23,
  author       = {Zhuoqun Huang and
                  Neil G. Marchant and
                  Keane Lucas and
                  Lujo Bauer and
                  Olga Ohrimenko and
                  Benjamin I. P. Rubinstein},
  editor       = {Alice Oh and
                  Tristan Naumann and
                  Amir Globerson and
                  Kate Saenko and
                  Moritz Hardt and
                  Sergey Levine},
  title        = {RS-Del: Edit Distance Robustness Certificates for Sequence Classifiers
                  via Randomized Deletion},
  booktitle    = {Advances in Neural Information Processing Systems 36: Annual Conference
                  on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans,
                  LA, USA, December 10 - 16, 2023},
  year         = {2023},
  url          = {http://papers.nips.cc/paper\_files/paper/2023/hash/3ba82362eb0aa75487069f19fde794fe-Abstract-Conference.html},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/HuangMLBOR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-06167,
  author       = {David W. Archer and
                  Borja de Balle Pigem and
                  Dan Bogdanov and
                  Mark Craddock and
                  Adri{\`{a}} Gasc{\'{o}}n and
                  Ronald Jansen and
                  Matjaz Jug and
                  Kim Laine and
                  Robert McLellan and
                  Olga Ohrimenko and
                  Mariana Raykova and
                  Andrew Trask and
                  Simon Wardley},
  title        = {{UN} Handbook on Privacy-Preserving Computation Techniques},
  journal      = {CoRR},
  volume       = {abs/2301.06167},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.06167},
  doi          = {10.48550/ARXIV.2301.06167},
  eprinttype    = {arXiv},
  eprint       = {2301.06167},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-06167.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-13347,
  author       = {Hao Wu and
                  Olga Ohrimenko and
                  Anthony Wirth},
  title        = {Tight Data Access Bounds for Private Top-{\textdollar}k{\textdollar}
                  Selection},
  journal      = {CoRR},
  volume       = {abs/2301.13347},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.13347},
  doi          = {10.48550/ARXIV.2301.13347},
  eprinttype    = {arXiv},
  eprint       = {2301.13347},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-13347.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-01757,
  author       = {Zhuoqun Huang and
                  Neil G. Marchant and
                  Keane Lucas and
                  Lujo Bauer and
                  Olga Ohrimenko and
                  Benjamin I. P. Rubinstein},
  title        = {Certified Robustness of Learning-based Static Malware Detectors},
  journal      = {CoRR},
  volume       = {abs/2302.01757},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.01757},
  doi          = {10.48550/ARXIV.2302.01757},
  eprinttype    = {arXiv},
  eprint       = {2302.01757},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-01757.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-06929,
  author       = {Rachel Cummings and
                  Damien Desfontaines and
                  David Evans and
                  Roxana Geambasu and
                  Matthew Jagielski and
                  Yangsibo Huang and
                  Peter Kairouz and
                  Gautam Kamath and
                  Sewoong Oh and
                  Olga Ohrimenko and
                  Nicolas Papernot and
                  Ryan Rogers and
                  Milan Shen and
                  Shuang Song and
                  Weijie J. Su and
                  Andreas Terzis and
                  Abhradeep Thakurta and
                  Sergei Vassilvitskii and
                  Yu{-}Xiang Wang and
                  Li Xiong and
                  Sergey Yekhanin and
                  Da Yu and
                  Huanyu Zhang and
                  Wanrong Zhang},
  title        = {Challenges towards the Next Frontier in Privacy},
  journal      = {CoRR},
  volume       = {abs/2304.06929},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.06929},
  doi          = {10.48550/ARXIV.2304.06929},
  eprinttype    = {arXiv},
  eprint       = {2304.06929},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-06929.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-11022,
  author       = {Tian Hui and
                  Farhad Farokhi and
                  Olga Ohrimenko},
  title        = {Information Leakage from Data Updates in Machine Learning Models},
  journal      = {CoRR},
  volume       = {abs/2309.11022},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.11022},
  doi          = {10.48550/ARXIV.2309.11022},
  eprinttype    = {arXiv},
  eprint       = {2309.11022},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-11022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-05960,
  author       = {Qiongkai Xu and
                  Trevor Cohn and
                  Olga Ohrimenko},
  title        = {Fingerprint Attack: Client De-Anonymization in Federated Learning},
  journal      = {CoRR},
  volume       = {abs/2310.05960},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.05960},
  doi          = {10.48550/ARXIV.2310.05960},
  eprinttype    = {arXiv},
  eprint       = {2310.05960},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-05960.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/HollandOW22,
  author       = {William L. Holland and
                  Olga Ohrimenko and
                  Anthony Wirth},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {Efficient Oblivious Permutation via the Waksman Network},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {771--783},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3497761},
  doi          = {10.1145/3488932.3497761},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiaccs/HollandOW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fat/ZhangOC22,
  author       = {Wanrong Zhang and
                  Olga Ohrimenko and
                  Rachel Cummings},
  title        = {Attribute Privacy: Framework and Mechanisms},
  booktitle    = {FAccT '22: 2022 {ACM} Conference on Fairness, Accountability, and
                  Transparency, Seoul, Republic of Korea, June 21 - 24, 2022},
  pages        = {757--766},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531146.3533139},
  doi          = {10.1145/3531146.3533139},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fat/ZhangOC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pods/OhrimenkoWW22,
  author       = {Olga Ohrimenko and
                  Anthony Wirth and
                  Hao Wu},
  editor       = {Leonid Libkin and
                  Pablo Barcel{\'{o}}},
  title        = {Randomize the Future: Asymptotically Optimal Locally Private Frequency
                  Estimation Protocol for Longitudinal Data},
  booktitle    = {{PODS} '22: International Conference on Management of Data, Philadelphia,
                  PA, USA, June 12 - 17, 2022},
  pages        = {237--249},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3517804.3526226},
  doi          = {10.1145/3517804.3526226},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pods/OhrimenkoWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JinMRO22,
  author       = {Jiankai Jin and
                  Eleanor McMurtry and
                  Benjamin I. P. Rubinstein and
                  Olga Ohrimenko},
  title        = {Are We There Yet? Timing and Floating-Point Attacks on Differential
                  Privacy Systems},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {473--488},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833672},
  doi          = {10.1109/SP46214.2022.9833672},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/JinMRO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-10159,
  author       = {Jiankai Jin and
                  Olga Ohrimenko and
                  Benjamin I. P. Rubinstein},
  title        = {Getting a-Round Guarantees: Floating-Point Attacks on Certified Robustness},
  journal      = {CoRR},
  volume       = {abs/2205.10159},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.10159},
  doi          = {10.48550/ARXIV.2205.10159},
  eprinttype    = {arXiv},
  eprint       = {2205.10159},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-10159.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-09519,
  author       = {Hao Wu and
                  Olga Ohrimenko and
                  Anthony Wirth},
  title        = {Walking to Hide: Privacy Amplification via Random Message Exchanges
                  in Network},
  journal      = {CoRR},
  volume       = {abs/2206.09519},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.09519},
  doi          = {10.48550/ARXIV.2206.09519},
  eprinttype    = {arXiv},
  eprint       = {2206.09519},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-09519.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-08367,
  author       = {Michelle Chen and
                  Olga Ohrimenko},
  title        = {Protecting Global Properties of Datasets with Distribution Privacy
                  Mechanisms},
  journal      = {CoRR},
  volume       = {abs/2207.08367},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.08367},
  doi          = {10.48550/ARXIV.2207.08367},
  eprinttype    = {arXiv},
  eprint       = {2207.08367},
  timestamp    = {Tue, 19 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-08367.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-07489,
  author       = {William L. Holland and
                  Olga Ohrimenko and
                  Anthony Wirth},
  title        = {Single Round-trip Hierarchical {ORAM} via Succinct Indices},
  journal      = {CoRR},
  volume       = {abs/2208.07489},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.07489},
  doi          = {10.48550/ARXIV.2208.07489},
  eprinttype    = {arXiv},
  eprint       = {2208.07489},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-07489.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-09126,
  author       = {Thorsten Eisenhofer and
                  Doreen Riepel and
                  Varun Chandrasekaran and
                  Esha Ghosh and
                  Olga Ohrimenko and
                  Nicolas Papernot},
  title        = {Verifiable and Provably Secure Machine Unlearning},
  journal      = {CoRR},
  volume       = {abs/2210.09126},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.09126},
  doi          = {10.48550/ARXIV.2210.09126},
  eprinttype    = {arXiv},
  eprint       = {2210.09126},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-09126.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-03980,
  author       = {Benjamin Tag and
                  Niels van Berkel and
                  Sunny Verma and
                  Benjamin Zi Hao Zhao and
                  Shlomo Berkovsky and
                  Dali Kaafar and
                  Vassilis Kostakos and
                  Olga Ohrimenko},
  title        = {DDoD: Dual Denial of Decision Attacks on Human-AI Teams},
  journal      = {CoRR},
  volume       = {abs/2212.03980},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.03980},
  doi          = {10.48550/ARXIV.2212.03980},
  eprinttype    = {arXiv},
  eprint       = {2212.03980},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-03980.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0001TO21,
  author       = {Wanrong Zhang and
                  Shruti Tople and
                  Olga Ohrimenko},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Leakage of Dataset Properties in Multi-Party Machine Learning},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2687--2704},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhang-wanrong},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/0001TO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-05307,
  author       = {Jiankai Jin and
                  Eleanor McMurtry and
                  Benjamin I. P. Rubinstein and
                  Olga Ohrimenko},
  title        = {Are We There Yet? Timing and Floating-Point Attacks on Differential
                  Privacy Systems},
  journal      = {CoRR},
  volume       = {abs/2112.05307},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.05307},
  eprinttype    = {arXiv},
  eprint       = {2112.05307},
  timestamp    = {Tue, 14 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-05307.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-12279,
  author       = {Olga Ohrimenko and
                  Anthony Wirth and
                  Hao Wu},
  title        = {Randomize the Future: Asymptotically Optimal Locally Private Frequency
                  Estimation Protocol for Longitudinal Data},
  journal      = {CoRR},
  volume       = {abs/2112.12279},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.12279},
  eprinttype    = {arXiv},
  eprint       = {2112.12279},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-12279.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BeguelinWTRPOKB20,
  author       = {Santiago Zanella B{\'{e}}guelin and
                  Lukas Wutschitz and
                  Shruti Tople and
                  Victor R{\"{u}}hle and
                  Andrew Paverd and
                  Olga Ohrimenko and
                  Boris K{\"{o}}pf and
                  Marc Brockschmidt},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Analyzing Information Leakage of Updates to Natural Language Models},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {363--375},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417880},
  doi          = {10.1145/3372297.3417880},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BeguelinWTRPOKB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-07267,
  author       = {Wanrong Zhang and
                  Shruti Tople and
                  Olga Ohrimenko},
  title        = {Dataset-Level Attribute Leakage in Collaborative Learning},
  journal      = {CoRR},
  volume       = {abs/2006.07267},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.07267},
  eprinttype    = {arXiv},
  eprint       = {2006.07267},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-07267.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-14583,
  author       = {Dongge Han and
                  Shruti Tople and
                  Alex Rogers and
                  Michael J. Wooldridge and
                  Olga Ohrimenko and
                  Sebastian Tschiatschek},
  title        = {Replication-Robust Payoff-Allocation with Applications in Machine
                  Learning Marketplaces},
  journal      = {CoRR},
  volume       = {abs/2006.14583},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.14583},
  eprinttype    = {arXiv},
  eprint       = {2006.14583},
  timestamp    = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-14583.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-04013,
  author       = {Wanrong Zhang and
                  Olga Ohrimenko and
                  Rachel Cummings},
  title        = {Attribute Privacy: Framework and Mechanisms},
  journal      = {CoRR},
  volume       = {abs/2009.04013},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.04013},
  eprinttype    = {arXiv},
  eprint       = {2009.04013},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-04013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-13689,
  author       = {Sajin Sasy and
                  Olga Ohrimenko},
  title        = {Oblivious Sampling Algorithms for Private Data Analysis},
  journal      = {CoRR},
  volume       = {abs/2009.13689},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.13689},
  eprinttype    = {arXiv},
  eprint       = {2009.13689},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-13689.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BalleGO0ST19,
  author       = {Borja Balle and
                  Adri{\`{a}} Gasc{\'{o}}n and
                  Olya Ohrimenko and
                  Mariana Raykova and
                  Phillipp Schoppmann and
                  Carmela Troncoso},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {{PPML} '19: Privacy Preserving Machine Learning},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2717--2718},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3353562},
  doi          = {10.1145/3319535.3353562},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BalleGO0ST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/SasyO19,
  author       = {Sajin Sasy and
                  Olga Ohrimenko},
  editor       = {Hanna M. Wallach and
                  Hugo Larochelle and
                  Alina Beygelzimer and
                  Florence d'Alch{\'{e}}{-}Buc and
                  Emily B. Fox and
                  Roman Garnett},
  title        = {Oblivious Sampling Algorithms for Private Data Analysis},
  booktitle    = {Advances in Neural Information Processing Systems 32: Annual Conference
                  on Neural Information Processing Systems 2019, NeurIPS 2019, December
                  8-14, 2019, Vancouver, BC, Canada},
  pages        = {6492--6503},
  year         = {2019},
  url          = {https://proceedings.neurips.cc/paper/2019/hash/73231e53eeef362c814c8522f5257286-Abstract.html},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/SasyO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/AllenDKNOY19,
  author       = {Joshua Allen and
                  Bolin Ding and
                  Janardhan Kulkarni and
                  Harsha Nori and
                  Olga Ohrimenko and
                  Sergey Yekhanin},
  editor       = {Hanna M. Wallach and
                  Hugo Larochelle and
                  Alina Beygelzimer and
                  Florence d'Alch{\'{e}}{-}Buc and
                  Emily B. Fox and
                  Roman Garnett},
  title        = {An Algorithmic Framework For Differentially Private Data Analysis
                  on Trusted Processors},
  booktitle    = {Advances in Neural Information Processing Systems 32: Annual Conference
                  on Neural Information Processing Systems 2019, NeurIPS 2019, December
                  8-14, 2019, Vancouver, BC, Canada},
  pages        = {13635--13646},
  year         = {2019},
  url          = {https://proceedings.neurips.cc/paper/2019/hash/376c6b9ff3bedbbea56751a84fffc10c-Abstract.html},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/AllenDKNOY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-02402,
  author       = {Jamie Hayes and
                  Olga Ohrimenko},
  title        = {Contamination Attacks and Mitigation in Multi-Party Machine Learning},
  journal      = {CoRR},
  volume       = {abs/1901.02402},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.02402},
  eprinttype    = {arXiv},
  eprint       = {1901.02402},
  timestamp    = {Fri, 01 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-02402.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-10875,
  author       = {Sacha Servan{-}Schreiber and
                  Olga Ohrimenko and
                  Tim Kraska and
                  Emanuel Zgraggen},
  title        = {Custodes: Auditable Hypothesis Testing},
  journal      = {CoRR},
  volume       = {abs/1901.10875},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.10875},
  eprinttype    = {arXiv},
  eprint       = {1901.10875},
  timestamp    = {Sun, 03 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-10875.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-09052,
  author       = {Olga Ohrimenko and
                  Shruti Tople and
                  Sebastian Tschiatschek},
  title        = {Collaborative Machine Learning Markets with Data-Replication-Robust
                  Payments},
  journal      = {CoRR},
  volume       = {abs/1911.09052},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.09052},
  eprinttype    = {arXiv},
  eprint       = {1911.09052},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-09052.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-07942,
  author       = {Shruti Tople and
                  Marc Brockschmidt and
                  Boris K{\"{o}}pf and
                  Olga Ohrimenko and
                  Santiago Zanella B{\'{e}}guelin},
  title        = {Analyzing Privacy Loss in Updates of Natural Language Models},
  journal      = {CoRR},
  volume       = {abs/1912.07942},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.07942},
  eprinttype    = {arXiv},
  eprint       = {1912.07942},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-07942.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/CachinO18,
  author       = {Christian Cachin and
                  Olga Ohrimenko},
  title        = {Verifying the consistency of remote untrusted services with conflict-free
                  operations},
  journal      = {Inf. Comput.},
  volume       = {260},
  pages        = {72--88},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ic.2018.03.004},
  doi          = {10.1016/J.IC.2018.03.004},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/CachinO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KamaraMO18,
  author       = {Seny Kamara and
                  Tarik Moataz and
                  Olga Ohrimenko},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Structured Encryption and Leakage Suppression},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {339--370},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_12},
  doi          = {10.1007/978-3-319-96884-1\_12},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KamaraMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/HayesO18,
  author       = {Jamie Hayes and
                  Olga Ohrimenko},
  editor       = {Samy Bengio and
                  Hanna M. Wallach and
                  Hugo Larochelle and
                  Kristen Grauman and
                  Nicol{\`{o}} Cesa{-}Bianchi and
                  Roman Garnett},
  title        = {Contamination Attacks and Mitigation in Multi-Party Machine Learning},
  booktitle    = {Advances in Neural Information Processing Systems 31: Annual Conference
                  on Neural Information Processing Systems 2018, NeurIPS 2018, December
                  3-8, 2018, Montr{\'{e}}al, Canada},
  pages        = {6604--6616},
  year         = {2018},
  url          = {https://proceedings.neurips.cc/paper/2018/hash/331316d4efb44682092a006307b9ae3a-Abstract.html},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/HayesO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-00736,
  author       = {Joshua Allen and
                  Bolin Ding and
                  Janardhan Kulkarni and
                  Harsha Nori and
                  Olga Ohrimenko and
                  Sergey Yekhanin},
  title        = {An Algorithmic Framework For Differentially Private Data Analysis
                  on Trusted Processors},
  journal      = {CoRR},
  volume       = {abs/1807.00736},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.00736},
  eprinttype    = {arXiv},
  eprint       = {1807.00736},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-00736.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KamaraMO18,
  author       = {Seny Kamara and
                  Tarik Moataz and
                  Olga Ohrimenko},
  title        = {Structured Encryption and Leakage Suppression},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {551},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/551},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KamaraMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BostMO17,
  author       = {Rapha{\"{e}}l Bost and
                  Brice Minaud and
                  Olga Ohrimenko},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Forward and Backward Private Searchable Encryption from Constrained
                  Cryptographic Primitives},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1465--1482},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3133980},
  doi          = {10.1145/3133956.3133980},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BostMO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GrussLSOHC17,
  author       = {Daniel Gruss and
                  Julian Lettner and
                  Felix Schuster and
                  Olga Ohrimenko and
                  Istv{\'{a}}n Haller and
                  Manuel Costa},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Strong and Efficient Cache Side-Channel Protection using Hardware
                  Transactional Memory},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {217--233},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/gruss},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/GrussLSOHC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-07882,
  author       = {Manuel Costa and
                  Lawrence Esswood and
                  Olga Ohrimenko and
                  Felix Schuster and
                  Sameer Wagh},
  title        = {The Pyramid Scheme: Oblivious {RAM} for Trusted Processors},
  journal      = {CoRR},
  volume       = {abs/1712.07882},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.07882},
  eprinttype    = {arXiv},
  eprint       = {1712.07882},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-07882.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BostMO17,
  author       = {Raphael Bost and
                  Brice Minaud and
                  Olga Ohrimenko},
  title        = {Forward and Backward Private Searchable Encryption from Constrained
                  Cryptographic Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {805},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/805},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BostMO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GhoshOT16,
  author       = {Esha Ghosh and
                  Olga Ohrimenko and
                  Roberto Tamassia},
  title        = {Efficient Verifiable Range and Closest Point Queries in Zero-Knowledge},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2016},
  number       = {4},
  pages        = {373--388},
  year         = {2016},
  url          = {https://doi.org/10.1515/popets-2016-0045},
  doi          = {10.1515/POPETS-2016-0045},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/GhoshOT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GhoshOPTT16,
  author       = {Esha Ghosh and
                  Olga Ohrimenko and
                  Dimitrios Papadopoulos and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Zero-Knowledge Accumulators and Set Algebra},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10032},
  pages        = {67--100},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53890-6\_3},
  doi          = {10.1007/978-3-662-53890-6\_3},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GhoshOPTT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FioreFGKOP16,
  author       = {Dario Fiore and
                  C{\'{e}}dric Fournet and
                  Esha Ghosh and
                  Markulf Kohlweiss and
                  Olga Ohrimenko and
                  Bryan Parno},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced
                  Data},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1304--1316},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978368},
  doi          = {10.1145/2976749.2978368},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/FioreFGKOP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/GhoshGOT16,
  author       = {Esha Ghosh and
                  Michael T. Goodrich and
                  Olga Ohrimenko and
                  Roberto Tamassia},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic
                  Lists and Trees},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {216--236},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_12},
  doi          = {10.1007/978-3-319-44618-9\_12},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/GhoshGOT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OhrimenkoSFMNVC16,
  author       = {Olga Ohrimenko and
                  Felix Schuster and
                  C{\'{e}}dric Fournet and
                  Aastha Mehta and
                  Sebastian Nowozin and
                  Kapil Vaswani and
                  Manuel Costa},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Oblivious Multi-Party Machine Learning on Trusted Processors},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {619--636},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/ohrimenko},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/OhrimenkoSFMNVC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FioreFGKOP16,
  author       = {Dario Fiore and
                  C{\'{e}}dric Fournet and
                  Esha Ghosh and
                  Markulf Kohlweiss and
                  Olga Ohrimenko and
                  Bryan Parno},
  title        = {Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced
                  Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {985},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/985},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FioreFGKOP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GhoshOT15,
  author       = {Esha Ghosh and
                  Olga Ohrimenko and
                  Roberto Tamassia},
  editor       = {Tal Malkin and
                  Vladimir Kolesnikov and
                  Allison Bishop Lewko and
                  Michalis Polychronakis},
  title        = {Zero-Knowledge Authenticated Order Queries and Order Statistics on
                  a List},
  booktitle    = {Applied Cryptography and Network Security - 13th International Conference,
                  {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9092},
  pages        = {149--171},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28166-7\_8},
  doi          = {10.1007/978-3-319-28166-7\_8},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GhoshOT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/OhrimenkoCFGKS15,
  author       = {Olga Ohrimenko and
                  Manuel Costa and
                  C{\'{e}}dric Fournet and
                  Christos Gkantsidis and
                  Markulf Kohlweiss and
                  Divya Sharma},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Observing and Preventing Leakage in MapReduce},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1570--1581},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813695},
  doi          = {10.1145/2810103.2813695},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/OhrimenkoCFGKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BaldimtsiO15,
  author       = {Foteini Baldimtsi and
                  Olga Ohrimenko},
  editor       = {Rainer B{\"{o}}hme and
                  Tatsuaki Okamoto},
  title        = {Sorting and Searching Behind the Curtain},
  booktitle    = {Financial Cryptography and Data Security - 19th International Conference,
                  {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8975},
  pages        = {127--146},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47854-7\_8},
  doi          = {10.1007/978-3-662-47854-7\_8},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BaldimtsiO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshGOT15,
  author       = {Esha Ghosh and
                  Michael T. Goodrich and
                  Olga Ohrimenko and
                  Roberto Tamassia},
  title        = {Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network
                  Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {283},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/283},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshGOT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshOPTT15,
  author       = {Esha Ghosh and
                  Olga Ohrimenko and
                  Dimitrios Papadopoulos and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  title        = {Zero-Knowledge Accumulators and Set Operations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {404},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/404},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshOPTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshOT15,
  author       = {Esha Ghosh and
                  Olga Ohrimenko and
                  Roberto Tamassia},
  title        = {Authenticated Range {\textbackslash}{\&} Closest Point Queries
                  in Zero-Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1183},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshOT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Ohrimenko14,
  author       = {Olga Ohrimenko},
  title        = {Data-Oblivious Algorithms for Privacy-Preserving Access to Cloud Storage},
  school       = {Brown University, {USA}},
  year         = {2014},
  url          = {https://cs.brown.edu/research/pubs/theses/phd/2014/ohrimenko.pdf},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Ohrimenko14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/OhrimenkoGTU14,
  author       = {Olga Ohrimenko and
                  Michael T. Goodrich and
                  Roberto Tamassia and
                  Eli Upfal},
  editor       = {Javier Esparza and
                  Pierre Fraigniaud and
                  Thore Husfeldt and
                  Elias Koutsoupias},
  title        = {The Melbourne Shuffle: Improving Oblivious Storage in the Cloud},
  booktitle    = {Automata, Languages, and Programming - 41st International Colloquium,
                  {ICALP} 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8573},
  pages        = {556--567},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43951-7\_47},
  doi          = {10.1007/978-3-662-43951-7\_47},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/OhrimenkoGTU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/opodis/CachinO14,
  author       = {Christian Cachin and
                  Olga Ohrimenko},
  editor       = {Marcos K. Aguilera and
                  Leonardo Querzoni and
                  Marc Shapiro},
  title        = {Verifying the Consistency of Remote Untrusted Services with Commutative
                  Operations},
  booktitle    = {Principles of Distributed Systems - 18th International Conference,
                  {OPODIS} 2014, Cortina d'Ampezzo, Italy, December 16-19, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8878},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14472-6\_1},
  doi          = {10.1007/978-3-319-14472-6\_1},
  timestamp    = {Mon, 15 Jun 2020 17:10:01 +0200},
  biburl       = {https://dblp.org/rec/conf/opodis/CachinO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/OhrimenkoGTU14,
  author       = {Olga Ohrimenko and
                  Michael T. Goodrich and
                  Roberto Tamassia and
                  Eli Upfal},
  title        = {The Melbourne Shuffle: Improving Oblivious Storage in the Cloud},
  journal      = {CoRR},
  volume       = {abs/1402.5524},
  year         = {2014},
  url          = {http://arxiv.org/abs/1402.5524},
  eprinttype    = {arXiv},
  eprint       = {1402.5524},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/OhrimenkoGTU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GhoshOT14a,
  author       = {Esha Ghosh and
                  Olga Ohrimenko and
                  Roberto Tamassia},
  title        = {Verifiable Member and Order Queries on a List in Zero-Knowledge},
  journal      = {CoRR},
  volume       = {abs/1408.3843},
  year         = {2014},
  url          = {http://arxiv.org/abs/1408.3843},
  eprinttype    = {arXiv},
  eprint       = {1408.3843},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GhoshOT14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshOT14a,
  author       = {Esha Ghosh and
                  Olga Ohrimenko and
                  Roberto Tamassia},
  title        = {Verifiable Member and Order Queries on a List in Zero-Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {632},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/632},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshOT14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaldimtsiO14,
  author       = {Foteini Baldimtsi and
                  Olga Ohrimenko},
  title        = {Sorting and Searching Behind the Curtain: Private Outsourced Sort
                  and Frequency-Based Ranking of Search Results Over Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1017},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/1017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaldimtsiO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gis/BrownOT13,
  author       = {Joshua W. S. Brown and
                  Olga Ohrimenko and
                  Roberto Tamassia},
  editor       = {Craig A. Knoblock and
                  Markus Schneider and
                  Peer Kr{\"{o}}ger and
                  John Krumm and
                  Peter Widmayer},
  title        = {Haze: privacy-preserving real-time traffic statistics},
  booktitle    = {21st {SIGSPATIAL} International Conference on Advances in Geographic
                  Information Systems, {SIGSPATIAL} 2013, Orlando, FL, USA, November
                  5-8, 2013},
  pages        = {530--533},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2525314.2525323},
  doi          = {10.1145/2525314.2525323},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gis/BrownOT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/OhrimenkoPP13,
  author       = {Olga Ohrimenko and
                  Charalampos Papamanthou and
                  Bernardo Palazzi},
  editor       = {Roberto Tamassia},
  title        = {Computer Security},
  booktitle    = {Handbook on Graph Drawing and Visualization},
  pages        = {653--679},
  publisher    = {Chapman and Hall/CRC},
  year         = {2013},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/OhrimenkoPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1302-4808,
  author       = {Christian Cachin and
                  Olga Ohrimenko},
  title        = {On Verifying the Consistency of Remote Untrusted Services},
  journal      = {CoRR},
  volume       = {abs/1302.4808},
  year         = {2013},
  url          = {http://arxiv.org/abs/1302.4808},
  eprinttype    = {arXiv},
  eprint       = {1302.4808},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1302-4808.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BrownOT13,
  author       = {Joshua W. S. Brown and
                  Olga Ohrimenko and
                  Roberto Tamassia},
  title        = {Haze: Privacy-Preserving Real-Time Traffic Statistics},
  journal      = {CoRR},
  volume       = {abs/1309.3515},
  year         = {2013},
  url          = {http://arxiv.org/abs/1309.3515},
  eprinttype    = {arXiv},
  eprint       = {1309.3515},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BrownOT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/MathieuO12,
  author       = {Claire Mathieu and
                  Olga Ohrimenko},
  title        = {Lower bounds for randomized algorithms for online chain partitioning},
  journal      = {Inf. Process. Lett.},
  volume       = {112},
  number       = {17-18},
  pages        = {663--666},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ipl.2012.05.010},
  doi          = {10.1016/J.IPL.2012.05.010},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/MathieuO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/GoodrichNOPTTL12,
  author       = {Michael T. Goodrich and
                  Duy Nguyen and
                  Olga Ohrimenko and
                  Charalampos Papamanthou and
                  Roberto Tamassia and
                  Nikos Triandopoulos and
                  Cristina Videira Lopes},
  title        = {Efficient Verification of Web-Content Searching Through Authenticated
                  Web Crawlers},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {5},
  number       = {10},
  pages        = {920--931},
  year         = {2012},
  url          = {http://vldb.org/pvldb/vol5/p920\_michaeltgoodrich\_vldb2012.pdf},
  doi          = {10.14778/2336664.2336666},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/GoodrichNOPTTL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GoodrichMOT12,
  author       = {Michael T. Goodrich and
                  Michael Mitzenmacher and
                  Olga Ohrimenko and
                  Roberto Tamassia},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Practical oblivious storage},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133604},
  doi          = {10.1145/2133601.2133604},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/GoodrichMOT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gd/GoodrichOT12,
  author       = {Michael T. Goodrich and
                  Olga Ohrimenko and
                  Roberto Tamassia},
  editor       = {Walter Didimo and
                  Maurizio Patrignani},
  title        = {Graph Drawing in the Cloud: Privately Visualizing Relational Data
                  Using Small Working Storage},
  booktitle    = {Graph Drawing - 20th International Symposium, {GD} 2012, Redmond,
                  WA, USA, September 19-21, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7704},
  pages        = {43--54},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36763-2\_5},
  doi          = {10.1007/978-3-642-36763-2\_5},
  timestamp    = {Sun, 13 Nov 2022 09:57:28 +0100},
  biburl       = {https://dblp.org/rec/conf/gd/GoodrichOT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/GoodrichMOT12,
  author       = {Michael T. Goodrich and
                  Michael Mitzenmacher and
                  Olga Ohrimenko and
                  Roberto Tamassia},
  editor       = {Yuval Rabani},
  title        = {Privacy-preserving group data access via stateless oblivious {RAM}
                  simulation},
  booktitle    = {Proceedings of the Twenty-Third Annual {ACM-SIAM} Symposium on Discrete
                  Algorithms, {SODA} 2012, Kyoto, Japan, January 17-19, 2012},
  pages        = {157--167},
  publisher    = {{SIAM}},
  year         = {2012},
  url          = {https://doi.org/10.1137/1.9781611973099.14},
  doi          = {10.1137/1.9781611973099.14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/GoodrichMOT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/OhrimenkoRT12,
  author       = {Olga Ohrimenko and
                  Hobart Reynolds and
                  Roberto Tamassia},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Authenticating Email Search Results},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {225--240},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_15},
  doi          = {10.1007/978-3-642-38004-4\_15},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/OhrimenkoRT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1204-5446,
  author       = {Michael T. Goodrich and
                  Duy Nguyen and
                  Olga Ohrimenko and
                  Charalampos Papamanthou and
                  Roberto Tamassia and
                  Nikos Triandopoulos and
                  Cristina Videira Lopes},
  title        = {Verifying Search Results Over Web Collections},
  journal      = {CoRR},
  volume       = {abs/1204.5446},
  year         = {2012},
  url          = {http://arxiv.org/abs/1204.5446},
  eprinttype    = {arXiv},
  eprint       = {1204.5446},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1204-5446.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1209-0756,
  author       = {Michael T. Goodrich and
                  Olga Ohrimenko and
                  Roberto Tamassia},
  title        = {Data-Oblivious Graph Drawing Model and Algorithms},
  journal      = {CoRR},
  volume       = {abs/1209.0756},
  year         = {2012},
  url          = {http://arxiv.org/abs/1209.0756},
  eprinttype    = {arXiv},
  eprint       = {1209.0756},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1209-0756.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GoodrichMOT11,
  author       = {Michael T. Goodrich and
                  Michael Mitzenmacher and
                  Olga Ohrimenko and
                  Roberto Tamassia},
  editor       = {Christian Cachin and
                  Thomas Ristenpart},
  title        = {Oblivious {RAM} simulation with efficient worst-case access overhead},
  booktitle    = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2011, Chicago, IL, USA, October 21, 2011},
  pages        = {95--100},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046660.2046680},
  doi          = {10.1145/2046660.2046680},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GoodrichMOT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1105-4125,
  author       = {Michael T. Goodrich and
                  Michael Mitzenmacher and
                  Olga Ohrimenko and
                  Roberto Tamassia},
  title        = {Privacy-Preserving Group Data Access via Stateless Oblivious {RAM}
                  Simulation},
  journal      = {CoRR},
  volume       = {abs/1105.4125},
  year         = {2011},
  url          = {http://arxiv.org/abs/1105.4125},
  eprinttype    = {arXiv},
  eprint       = {1105.4125},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1105-4125.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1107-5093,
  author       = {Michael T. Goodrich and
                  Michael Mitzenmacher and
                  Olga Ohrimenko and
                  Roberto Tamassia},
  title        = {Oblivious {RAM} Simulation with Efficient Worst-Case Access Overhead},
  journal      = {CoRR},
  volume       = {abs/1107.5093},
  year         = {2011},
  url          = {http://arxiv.org/abs/1107.5093},
  eprinttype    = {arXiv},
  eprint       = {1107.5093},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1107-5093.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1110-1851,
  author       = {Michael T. Goodrich and
                  Michael Mitzenmacher and
                  Olga Ohrimenko and
                  Roberto Tamassia},
  title        = {Oblivious Storage with Low {I/O} Overhead},
  journal      = {CoRR},
  volume       = {abs/1110.1851},
  year         = {2011},
  url          = {http://arxiv.org/abs/1110.1851},
  eprinttype    = {arXiv},
  eprint       = {1110.1851},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1110-1851.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/constraints/OhrimenkoSC09,
  author       = {Olga Ohrimenko and
                  Peter J. Stuckey and
                  Michael Codish},
  title        = {Propagation via lazy clause generation},
  journal      = {Constraints An Int. J.},
  volume       = {14},
  number       = {3},
  pages        = {357--391},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10601-008-9064-x},
  doi          = {10.1007/S10601-008-9064-X},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/constraints/OhrimenkoSC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cats/OhrimenkoS08,
  author       = {Olga Ohrimenko and
                  Peter J. Stuckey},
  editor       = {James Harland and
                  Prabhu Manyem},
  title        = {Modelling for Lazy Clause Generation},
  booktitle    = {Theory of Computing 2008. Proc. Fourteenth Computing: The Australasian
                  Theory Symposium {(CATS} 2008), Wollongong, NSW, Australia, January
                  22-25, 2008. Proceedings},
  series       = {{CRPIT}},
  volume       = {77},
  pages        = {27--37},
  publisher    = {Australian Computer Society},
  year         = {2008},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV77Ohrimenko.html},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cats/OhrimenkoS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cp/OhrimenkoSC07,
  author       = {Olga Ohrimenko and
                  Peter J. Stuckey and
                  Michael Codish},
  editor       = {Christian Bessiere},
  title        = {Propagation = Lazy Clause Generation},
  booktitle    = {Principles and Practice of Constraint Programming - {CP} 2007, 13th
                  International Conference, {CP} 2007, Providence, RI, USA, September
                  23-27, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4741},
  pages        = {544--558},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74970-7\_39},
  doi          = {10.1007/978-3-540-74970-7\_39},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/cp/OhrimenkoSC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0705-2065,
  author       = {Aaron Harwood and
                  Olga Ohrimenko},
  title        = {Mean Field Models of Message Throughput in Dynamic Peer-to-Peer Systems},
  journal      = {CoRR},
  volume       = {abs/0705.2065},
  year         = {2007},
  url          = {http://arxiv.org/abs/0705.2065},
  eprinttype    = {arXiv},
  eprint       = {0705.2065},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0705-2065.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics