Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Olga Ohrimenko
@article{DBLP:journals/corr/abs-2401-17628, author = {Jiankai Jin and Chitchanok Chuengsatiansup and Toby Murray and Benjamin I. P. Rubinstein and Yuval Yarom and Olga Ohrimenko}, title = {Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget}, journal = {CoRR}, volume = {abs/2401.17628}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.17628}, doi = {10.48550/ARXIV.2401.17628}, eprinttype = {arXiv}, eprint = {2401.17628}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-17628.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pervasive/TagBVZBKKO23, author = {Benjamin Tag and Niels van Berkel and Sunny Verma and Benjamin Zi Hao Zhao and Shlomo Berkovsky and Dali Kaafar and Vassilis Kostakos and Olga Ohrimenko}, title = {DDoD: Dual Denial of Decision Attacks on Human-AI Teams}, journal = {{IEEE} Pervasive Comput.}, volume = {22}, number = {1}, pages = {77--84}, year = {2023}, url = {https://doi.org/10.1109/MPRV.2022.3218773}, doi = {10.1109/MPRV.2022.3218773}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pervasive/TagBVZBKKO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tai/HanWROT23, author = {Dongge Han and Michael J. Wooldridge and Alex Rogers and Olga Ohrimenko and Sebastian Tschiatschek}, title = {Replication Robust Payoff Allocation in Submodular Cooperative Games}, journal = {{IEEE} Trans. Artif. Intell.}, volume = {4}, number = {5}, pages = {1114--1128}, year = {2023}, url = {https://doi.org/10.1109/TAI.2022.3195686}, doi = {10.1109/TAI.2022.3195686}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tai/HanWROT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aistats/ChenO23, author = {Michelle Chen and Olga Ohrimenko}, editor = {Francisco J. R. Ruiz and Jennifer G. Dy and Jan{-}Willem van de Meent}, title = {Protecting Global Properties of Datasets with Distribution Privacy Mechanisms}, booktitle = {International Conference on Artificial Intelligence and Statistics, 25-27 April 2023, Palau de Congressos, Valencia, Spain}, series = {Proceedings of Machine Learning Research}, volume = {206}, pages = {7472--7491}, publisher = {{PMLR}}, year = {2023}, url = {https://proceedings.mlr.press/v206/chen23f.html}, timestamp = {Mon, 19 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aistats/ChenO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuiFO23, author = {Tian Hui and Farhad Farokhi and Olga Ohrimenko}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Information Leakage from Data Updates in Machine Learning Models}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {35--41}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623905}, doi = {10.1145/3605764.3623905}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HuiFO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai/XuCO23, author = {Qiongkai Xu and Trevor Cohn and Olga Ohrimenko}, editor = {Kobi Gal and Ann Now{\'{e}} and Grzegorz J. Nalepa and Roy Fairstein and Roxana Radulescu}, title = {Fingerprint Attack: Client De-Anonymization in Federated Learning}, booktitle = {{ECAI} 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Krak{\'{o}}w, Poland - Including 12th Conference on Prestigious Applications of Intelligent Systems {(PAIS} 2023)}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {372}, pages = {2792--2801}, publisher = {{IOS} Press}, year = {2023}, url = {https://doi.org/10.3233/FAIA230590}, doi = {10.3233/FAIA230590}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecai/XuCO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/0057OW23, author = {Hao Wu and Olga Ohrimenko and Anthony Wirth}, editor = {Andreas Krause and Emma Brunskill and Kyunghyun Cho and Barbara Engelhardt and Sivan Sabato and Jonathan Scarlett}, title = {Tight Data Access Bounds for Private Top-k Selection}, booktitle = {International Conference on Machine Learning, {ICML} 2023, 23-29 July 2023, Honolulu, Hawaii, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {202}, pages = {37635--37655}, publisher = {{PMLR}}, year = {2023}, url = {https://proceedings.mlr.press/v202/wu23q.html}, timestamp = {Mon, 28 Aug 2023 17:23:08 +0200}, biburl = {https://dblp.org/rec/conf/icml/0057OW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/HuangMLBOR23, author = {Zhuoqun Huang and Neil G. Marchant and Keane Lucas and Lujo Bauer and Olga Ohrimenko and Benjamin I. P. Rubinstein}, editor = {Alice Oh and Tristan Naumann and Amir Globerson and Kate Saenko and Moritz Hardt and Sergey Levine}, title = {RS-Del: Edit Distance Robustness Certificates for Sequence Classifiers via Randomized Deletion}, booktitle = {Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023}, year = {2023}, url = {http://papers.nips.cc/paper\_files/paper/2023/hash/3ba82362eb0aa75487069f19fde794fe-Abstract-Conference.html}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/HuangMLBOR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-06167, author = {David W. Archer and Borja de Balle Pigem and Dan Bogdanov and Mark Craddock and Adri{\`{a}} Gasc{\'{o}}n and Ronald Jansen and Matjaz Jug and Kim Laine and Robert McLellan and Olga Ohrimenko and Mariana Raykova and Andrew Trask and Simon Wardley}, title = {{UN} Handbook on Privacy-Preserving Computation Techniques}, journal = {CoRR}, volume = {abs/2301.06167}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.06167}, doi = {10.48550/ARXIV.2301.06167}, eprinttype = {arXiv}, eprint = {2301.06167}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-06167.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-13347, author = {Hao Wu and Olga Ohrimenko and Anthony Wirth}, title = {Tight Data Access Bounds for Private Top-{\textdollar}k{\textdollar} Selection}, journal = {CoRR}, volume = {abs/2301.13347}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.13347}, doi = {10.48550/ARXIV.2301.13347}, eprinttype = {arXiv}, eprint = {2301.13347}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-13347.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-01757, author = {Zhuoqun Huang and Neil G. Marchant and Keane Lucas and Lujo Bauer and Olga Ohrimenko and Benjamin I. P. Rubinstein}, title = {Certified Robustness of Learning-based Static Malware Detectors}, journal = {CoRR}, volume = {abs/2302.01757}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.01757}, doi = {10.48550/ARXIV.2302.01757}, eprinttype = {arXiv}, eprint = {2302.01757}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-01757.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-06929, author = {Rachel Cummings and Damien Desfontaines and David Evans and Roxana Geambasu and Matthew Jagielski and Yangsibo Huang and Peter Kairouz and Gautam Kamath and Sewoong Oh and Olga Ohrimenko and Nicolas Papernot and Ryan Rogers and Milan Shen and Shuang Song and Weijie J. Su and Andreas Terzis and Abhradeep Thakurta and Sergei Vassilvitskii and Yu{-}Xiang Wang and Li Xiong and Sergey Yekhanin and Da Yu and Huanyu Zhang and Wanrong Zhang}, title = {Challenges towards the Next Frontier in Privacy}, journal = {CoRR}, volume = {abs/2304.06929}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.06929}, doi = {10.48550/ARXIV.2304.06929}, eprinttype = {arXiv}, eprint = {2304.06929}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-06929.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-11022, author = {Tian Hui and Farhad Farokhi and Olga Ohrimenko}, title = {Information Leakage from Data Updates in Machine Learning Models}, journal = {CoRR}, volume = {abs/2309.11022}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.11022}, doi = {10.48550/ARXIV.2309.11022}, eprinttype = {arXiv}, eprint = {2309.11022}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-11022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-05960, author = {Qiongkai Xu and Trevor Cohn and Olga Ohrimenko}, title = {Fingerprint Attack: Client De-Anonymization in Federated Learning}, journal = {CoRR}, volume = {abs/2310.05960}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.05960}, doi = {10.48550/ARXIV.2310.05960}, eprinttype = {arXiv}, eprint = {2310.05960}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-05960.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/HollandOW22, author = {William L. Holland and Olga Ohrimenko and Anthony Wirth}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Efficient Oblivious Permutation via the Waksman Network}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {771--783}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3497761}, doi = {10.1145/3488932.3497761}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiaccs/HollandOW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fat/ZhangOC22, author = {Wanrong Zhang and Olga Ohrimenko and Rachel Cummings}, title = {Attribute Privacy: Framework and Mechanisms}, booktitle = {FAccT '22: 2022 {ACM} Conference on Fairness, Accountability, and Transparency, Seoul, Republic of Korea, June 21 - 24, 2022}, pages = {757--766}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531146.3533139}, doi = {10.1145/3531146.3533139}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fat/ZhangOC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pods/OhrimenkoWW22, author = {Olga Ohrimenko and Anthony Wirth and Hao Wu}, editor = {Leonid Libkin and Pablo Barcel{\'{o}}}, title = {Randomize the Future: Asymptotically Optimal Locally Private Frequency Estimation Protocol for Longitudinal Data}, booktitle = {{PODS} '22: International Conference on Management of Data, Philadelphia, PA, USA, June 12 - 17, 2022}, pages = {237--249}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3517804.3526226}, doi = {10.1145/3517804.3526226}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pods/OhrimenkoWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/JinMRO22, author = {Jiankai Jin and Eleanor McMurtry and Benjamin I. P. Rubinstein and Olga Ohrimenko}, title = {Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {473--488}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833672}, doi = {10.1109/SP46214.2022.9833672}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/JinMRO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-10159, author = {Jiankai Jin and Olga Ohrimenko and Benjamin I. P. Rubinstein}, title = {Getting a-Round Guarantees: Floating-Point Attacks on Certified Robustness}, journal = {CoRR}, volume = {abs/2205.10159}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.10159}, doi = {10.48550/ARXIV.2205.10159}, eprinttype = {arXiv}, eprint = {2205.10159}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-10159.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-09519, author = {Hao Wu and Olga Ohrimenko and Anthony Wirth}, title = {Walking to Hide: Privacy Amplification via Random Message Exchanges in Network}, journal = {CoRR}, volume = {abs/2206.09519}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.09519}, doi = {10.48550/ARXIV.2206.09519}, eprinttype = {arXiv}, eprint = {2206.09519}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-09519.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-08367, author = {Michelle Chen and Olga Ohrimenko}, title = {Protecting Global Properties of Datasets with Distribution Privacy Mechanisms}, journal = {CoRR}, volume = {abs/2207.08367}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.08367}, doi = {10.48550/ARXIV.2207.08367}, eprinttype = {arXiv}, eprint = {2207.08367}, timestamp = {Tue, 19 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-08367.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-07489, author = {William L. Holland and Olga Ohrimenko and Anthony Wirth}, title = {Single Round-trip Hierarchical {ORAM} via Succinct Indices}, journal = {CoRR}, volume = {abs/2208.07489}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.07489}, doi = {10.48550/ARXIV.2208.07489}, eprinttype = {arXiv}, eprint = {2208.07489}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-07489.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-09126, author = {Thorsten Eisenhofer and Doreen Riepel and Varun Chandrasekaran and Esha Ghosh and Olga Ohrimenko and Nicolas Papernot}, title = {Verifiable and Provably Secure Machine Unlearning}, journal = {CoRR}, volume = {abs/2210.09126}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.09126}, doi = {10.48550/ARXIV.2210.09126}, eprinttype = {arXiv}, eprint = {2210.09126}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-09126.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-03980, author = {Benjamin Tag and Niels van Berkel and Sunny Verma and Benjamin Zi Hao Zhao and Shlomo Berkovsky and Dali Kaafar and Vassilis Kostakos and Olga Ohrimenko}, title = {DDoD: Dual Denial of Decision Attacks on Human-AI Teams}, journal = {CoRR}, volume = {abs/2212.03980}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.03980}, doi = {10.48550/ARXIV.2212.03980}, eprinttype = {arXiv}, eprint = {2212.03980}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-03980.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0001TO21, author = {Wanrong Zhang and Shruti Tople and Olga Ohrimenko}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Leakage of Dataset Properties in Multi-Party Machine Learning}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2687--2704}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhang-wanrong}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/0001TO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-05307, author = {Jiankai Jin and Eleanor McMurtry and Benjamin I. P. Rubinstein and Olga Ohrimenko}, title = {Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems}, journal = {CoRR}, volume = {abs/2112.05307}, year = {2021}, url = {https://arxiv.org/abs/2112.05307}, eprinttype = {arXiv}, eprint = {2112.05307}, timestamp = {Tue, 14 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-05307.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-12279, author = {Olga Ohrimenko and Anthony Wirth and Hao Wu}, title = {Randomize the Future: Asymptotically Optimal Locally Private Frequency Estimation Protocol for Longitudinal Data}, journal = {CoRR}, volume = {abs/2112.12279}, year = {2021}, url = {https://arxiv.org/abs/2112.12279}, eprinttype = {arXiv}, eprint = {2112.12279}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-12279.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BeguelinWTRPOKB20, author = {Santiago Zanella B{\'{e}}guelin and Lukas Wutschitz and Shruti Tople and Victor R{\"{u}}hle and Andrew Paverd and Olga Ohrimenko and Boris K{\"{o}}pf and Marc Brockschmidt}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Analyzing Information Leakage of Updates to Natural Language Models}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {363--375}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417880}, doi = {10.1145/3372297.3417880}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BeguelinWTRPOKB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-07267, author = {Wanrong Zhang and Shruti Tople and Olga Ohrimenko}, title = {Dataset-Level Attribute Leakage in Collaborative Learning}, journal = {CoRR}, volume = {abs/2006.07267}, year = {2020}, url = {https://arxiv.org/abs/2006.07267}, eprinttype = {arXiv}, eprint = {2006.07267}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-07267.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-14583, author = {Dongge Han and Shruti Tople and Alex Rogers and Michael J. Wooldridge and Olga Ohrimenko and Sebastian Tschiatschek}, title = {Replication-Robust Payoff-Allocation with Applications in Machine Learning Marketplaces}, journal = {CoRR}, volume = {abs/2006.14583}, year = {2020}, url = {https://arxiv.org/abs/2006.14583}, eprinttype = {arXiv}, eprint = {2006.14583}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-14583.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-04013, author = {Wanrong Zhang and Olga Ohrimenko and Rachel Cummings}, title = {Attribute Privacy: Framework and Mechanisms}, journal = {CoRR}, volume = {abs/2009.04013}, year = {2020}, url = {https://arxiv.org/abs/2009.04013}, eprinttype = {arXiv}, eprint = {2009.04013}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-04013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-13689, author = {Sajin Sasy and Olga Ohrimenko}, title = {Oblivious Sampling Algorithms for Private Data Analysis}, journal = {CoRR}, volume = {abs/2009.13689}, year = {2020}, url = {https://arxiv.org/abs/2009.13689}, eprinttype = {arXiv}, eprint = {2009.13689}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-13689.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BalleGO0ST19, author = {Borja Balle and Adri{\`{a}} Gasc{\'{o}}n and Olya Ohrimenko and Mariana Raykova and Phillipp Schoppmann and Carmela Troncoso}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {{PPML} '19: Privacy Preserving Machine Learning}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2717--2718}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3353562}, doi = {10.1145/3319535.3353562}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BalleGO0ST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/SasyO19, author = {Sajin Sasy and Olga Ohrimenko}, editor = {Hanna M. Wallach and Hugo Larochelle and Alina Beygelzimer and Florence d'Alch{\'{e}}{-}Buc and Emily B. Fox and Roman Garnett}, title = {Oblivious Sampling Algorithms for Private Data Analysis}, booktitle = {Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, December 8-14, 2019, Vancouver, BC, Canada}, pages = {6492--6503}, year = {2019}, url = {https://proceedings.neurips.cc/paper/2019/hash/73231e53eeef362c814c8522f5257286-Abstract.html}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/SasyO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/AllenDKNOY19, author = {Joshua Allen and Bolin Ding and Janardhan Kulkarni and Harsha Nori and Olga Ohrimenko and Sergey Yekhanin}, editor = {Hanna M. Wallach and Hugo Larochelle and Alina Beygelzimer and Florence d'Alch{\'{e}}{-}Buc and Emily B. Fox and Roman Garnett}, title = {An Algorithmic Framework For Differentially Private Data Analysis on Trusted Processors}, booktitle = {Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, December 8-14, 2019, Vancouver, BC, Canada}, pages = {13635--13646}, year = {2019}, url = {https://proceedings.neurips.cc/paper/2019/hash/376c6b9ff3bedbbea56751a84fffc10c-Abstract.html}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/AllenDKNOY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-02402, author = {Jamie Hayes and Olga Ohrimenko}, title = {Contamination Attacks and Mitigation in Multi-Party Machine Learning}, journal = {CoRR}, volume = {abs/1901.02402}, year = {2019}, url = {http://arxiv.org/abs/1901.02402}, eprinttype = {arXiv}, eprint = {1901.02402}, timestamp = {Fri, 01 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-02402.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-10875, author = {Sacha Servan{-}Schreiber and Olga Ohrimenko and Tim Kraska and Emanuel Zgraggen}, title = {Custodes: Auditable Hypothesis Testing}, journal = {CoRR}, volume = {abs/1901.10875}, year = {2019}, url = {http://arxiv.org/abs/1901.10875}, eprinttype = {arXiv}, eprint = {1901.10875}, timestamp = {Sun, 03 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-10875.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-09052, author = {Olga Ohrimenko and Shruti Tople and Sebastian Tschiatschek}, title = {Collaborative Machine Learning Markets with Data-Replication-Robust Payments}, journal = {CoRR}, volume = {abs/1911.09052}, year = {2019}, url = {http://arxiv.org/abs/1911.09052}, eprinttype = {arXiv}, eprint = {1911.09052}, timestamp = {Tue, 03 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-09052.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-07942, author = {Shruti Tople and Marc Brockschmidt and Boris K{\"{o}}pf and Olga Ohrimenko and Santiago Zanella B{\'{e}}guelin}, title = {Analyzing Privacy Loss in Updates of Natural Language Models}, journal = {CoRR}, volume = {abs/1912.07942}, year = {2019}, url = {http://arxiv.org/abs/1912.07942}, eprinttype = {arXiv}, eprint = {1912.07942}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-07942.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/CachinO18, author = {Christian Cachin and Olga Ohrimenko}, title = {Verifying the consistency of remote untrusted services with conflict-free operations}, journal = {Inf. Comput.}, volume = {260}, pages = {72--88}, year = {2018}, url = {https://doi.org/10.1016/j.ic.2018.03.004}, doi = {10.1016/J.IC.2018.03.004}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/CachinO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KamaraMO18, author = {Seny Kamara and Tarik Moataz and Olga Ohrimenko}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Structured Encryption and Leakage Suppression}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {339--370}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_12}, doi = {10.1007/978-3-319-96884-1\_12}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KamaraMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/HayesO18, author = {Jamie Hayes and Olga Ohrimenko}, editor = {Samy Bengio and Hanna M. Wallach and Hugo Larochelle and Kristen Grauman and Nicol{\`{o}} Cesa{-}Bianchi and Roman Garnett}, title = {Contamination Attacks and Mitigation in Multi-Party Machine Learning}, booktitle = {Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, December 3-8, 2018, Montr{\'{e}}al, Canada}, pages = {6604--6616}, year = {2018}, url = {https://proceedings.neurips.cc/paper/2018/hash/331316d4efb44682092a006307b9ae3a-Abstract.html}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/HayesO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-00736, author = {Joshua Allen and Bolin Ding and Janardhan Kulkarni and Harsha Nori and Olga Ohrimenko and Sergey Yekhanin}, title = {An Algorithmic Framework For Differentially Private Data Analysis on Trusted Processors}, journal = {CoRR}, volume = {abs/1807.00736}, year = {2018}, url = {http://arxiv.org/abs/1807.00736}, eprinttype = {arXiv}, eprint = {1807.00736}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-00736.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KamaraMO18, author = {Seny Kamara and Tarik Moataz and Olga Ohrimenko}, title = {Structured Encryption and Leakage Suppression}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {551}, year = {2018}, url = {https://eprint.iacr.org/2018/551}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KamaraMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BostMO17, author = {Rapha{\"{e}}l Bost and Brice Minaud and Olga Ohrimenko}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1465--1482}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133980}, doi = {10.1145/3133956.3133980}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BostMO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GrussLSOHC17, author = {Daniel Gruss and Julian Lettner and Felix Schuster and Olga Ohrimenko and Istv{\'{a}}n Haller and Manuel Costa}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {217--233}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/gruss}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/GrussLSOHC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-07882, author = {Manuel Costa and Lawrence Esswood and Olga Ohrimenko and Felix Schuster and Sameer Wagh}, title = {The Pyramid Scheme: Oblivious {RAM} for Trusted Processors}, journal = {CoRR}, volume = {abs/1712.07882}, year = {2017}, url = {http://arxiv.org/abs/1712.07882}, eprinttype = {arXiv}, eprint = {1712.07882}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-07882.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BostMO17, author = {Raphael Bost and Brice Minaud and Olga Ohrimenko}, title = {Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {805}, year = {2017}, url = {http://eprint.iacr.org/2017/805}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BostMO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/GhoshOT16, author = {Esha Ghosh and Olga Ohrimenko and Roberto Tamassia}, title = {Efficient Verifiable Range and Closest Point Queries in Zero-Knowledge}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2016}, number = {4}, pages = {373--388}, year = {2016}, url = {https://doi.org/10.1515/popets-2016-0045}, doi = {10.1515/POPETS-2016-0045}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/GhoshOT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GhoshOPTT16, author = {Esha Ghosh and Olga Ohrimenko and Dimitrios Papadopoulos and Roberto Tamassia and Nikos Triandopoulos}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Zero-Knowledge Accumulators and Set Algebra}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, pages = {67--100}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6\_3}, doi = {10.1007/978-3-662-53890-6\_3}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GhoshOPTT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FioreFGKOP16, author = {Dario Fiore and C{\'{e}}dric Fournet and Esha Ghosh and Markulf Kohlweiss and Olga Ohrimenko and Bryan Parno}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1304--1316}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978368}, doi = {10.1145/2976749.2978368}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FioreFGKOP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/GhoshGOT16, author = {Esha Ghosh and Michael T. Goodrich and Olga Ohrimenko and Roberto Tamassia}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {216--236}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_12}, doi = {10.1007/978-3-319-44618-9\_12}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/GhoshGOT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OhrimenkoSFMNVC16, author = {Olga Ohrimenko and Felix Schuster and C{\'{e}}dric Fournet and Aastha Mehta and Sebastian Nowozin and Kapil Vaswani and Manuel Costa}, editor = {Thorsten Holz and Stefan Savage}, title = {Oblivious Multi-Party Machine Learning on Trusted Processors}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {619--636}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/ohrimenko}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/OhrimenkoSFMNVC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FioreFGKOP16, author = {Dario Fiore and C{\'{e}}dric Fournet and Esha Ghosh and Markulf Kohlweiss and Olga Ohrimenko and Bryan Parno}, title = {Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {985}, year = {2016}, url = {http://eprint.iacr.org/2016/985}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FioreFGKOP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GhoshOT15, author = {Esha Ghosh and Olga Ohrimenko and Roberto Tamassia}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Zero-Knowledge Authenticated Order Queries and Order Statistics on a List}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {149--171}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_8}, doi = {10.1007/978-3-319-28166-7\_8}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/GhoshOT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OhrimenkoCFGKS15, author = {Olga Ohrimenko and Manuel Costa and C{\'{e}}dric Fournet and Christos Gkantsidis and Markulf Kohlweiss and Divya Sharma}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Observing and Preventing Leakage in MapReduce}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1570--1581}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813695}, doi = {10.1145/2810103.2813695}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/OhrimenkoCFGKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BaldimtsiO15, author = {Foteini Baldimtsi and Olga Ohrimenko}, editor = {Rainer B{\"{o}}hme and Tatsuaki Okamoto}, title = {Sorting and Searching Behind the Curtain}, booktitle = {Financial Cryptography and Data Security - 19th International Conference, {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8975}, pages = {127--146}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47854-7\_8}, doi = {10.1007/978-3-662-47854-7\_8}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/BaldimtsiO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshGOT15, author = {Esha Ghosh and Michael T. Goodrich and Olga Ohrimenko and Roberto Tamassia}, title = {Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {283}, year = {2015}, url = {http://eprint.iacr.org/2015/283}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhoshGOT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshOPTT15, author = {Esha Ghosh and Olga Ohrimenko and Dimitrios Papadopoulos and Roberto Tamassia and Nikos Triandopoulos}, title = {Zero-Knowledge Accumulators and Set Operations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {404}, year = {2015}, url = {http://eprint.iacr.org/2015/404}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GhoshOPTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshOT15, author = {Esha Ghosh and Olga Ohrimenko and Roberto Tamassia}, title = {Authenticated Range {\textbackslash}{\&} Closest Point Queries in Zero-Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1183}, year = {2015}, url = {http://eprint.iacr.org/2015/1183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhoshOT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Ohrimenko14, author = {Olga Ohrimenko}, title = {Data-Oblivious Algorithms for Privacy-Preserving Access to Cloud Storage}, school = {Brown University, {USA}}, year = {2014}, url = {https://cs.brown.edu/research/pubs/theses/phd/2014/ohrimenko.pdf}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Ohrimenko14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/OhrimenkoGTU14, author = {Olga Ohrimenko and Michael T. Goodrich and Roberto Tamassia and Eli Upfal}, editor = {Javier Esparza and Pierre Fraigniaud and Thore Husfeldt and Elias Koutsoupias}, title = {The Melbourne Shuffle: Improving Oblivious Storage in the Cloud}, booktitle = {Automata, Languages, and Programming - 41st International Colloquium, {ICALP} 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8573}, pages = {556--567}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43951-7\_47}, doi = {10.1007/978-3-662-43951-7\_47}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/OhrimenkoGTU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/opodis/CachinO14, author = {Christian Cachin and Olga Ohrimenko}, editor = {Marcos K. Aguilera and Leonardo Querzoni and Marc Shapiro}, title = {Verifying the Consistency of Remote Untrusted Services with Commutative Operations}, booktitle = {Principles of Distributed Systems - 18th International Conference, {OPODIS} 2014, Cortina d'Ampezzo, Italy, December 16-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8878}, pages = {1--16}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-14472-6\_1}, doi = {10.1007/978-3-319-14472-6\_1}, timestamp = {Mon, 15 Jun 2020 17:10:01 +0200}, biburl = {https://dblp.org/rec/conf/opodis/CachinO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/OhrimenkoGTU14, author = {Olga Ohrimenko and Michael T. Goodrich and Roberto Tamassia and Eli Upfal}, title = {The Melbourne Shuffle: Improving Oblivious Storage in the Cloud}, journal = {CoRR}, volume = {abs/1402.5524}, year = {2014}, url = {http://arxiv.org/abs/1402.5524}, eprinttype = {arXiv}, eprint = {1402.5524}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/OhrimenkoGTU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GhoshOT14a, author = {Esha Ghosh and Olga Ohrimenko and Roberto Tamassia}, title = {Verifiable Member and Order Queries on a List in Zero-Knowledge}, journal = {CoRR}, volume = {abs/1408.3843}, year = {2014}, url = {http://arxiv.org/abs/1408.3843}, eprinttype = {arXiv}, eprint = {1408.3843}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GhoshOT14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshOT14a, author = {Esha Ghosh and Olga Ohrimenko and Roberto Tamassia}, title = {Verifiable Member and Order Queries on a List in Zero-Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {632}, year = {2014}, url = {http://eprint.iacr.org/2014/632}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhoshOT14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaldimtsiO14, author = {Foteini Baldimtsi and Olga Ohrimenko}, title = {Sorting and Searching Behind the Curtain: Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1017}, year = {2014}, url = {http://eprint.iacr.org/2014/1017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaldimtsiO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gis/BrownOT13, author = {Joshua W. S. Brown and Olga Ohrimenko and Roberto Tamassia}, editor = {Craig A. Knoblock and Markus Schneider and Peer Kr{\"{o}}ger and John Krumm and Peter Widmayer}, title = {Haze: privacy-preserving real-time traffic statistics}, booktitle = {21st {SIGSPATIAL} International Conference on Advances in Geographic Information Systems, {SIGSPATIAL} 2013, Orlando, FL, USA, November 5-8, 2013}, pages = {530--533}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2525314.2525323}, doi = {10.1145/2525314.2525323}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gis/BrownOT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/OhrimenkoPP13, author = {Olga Ohrimenko and Charalampos Papamanthou and Bernardo Palazzi}, editor = {Roberto Tamassia}, title = {Computer Security}, booktitle = {Handbook on Graph Drawing and Visualization}, pages = {653--679}, publisher = {Chapman and Hall/CRC}, year = {2013}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/OhrimenkoPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1302-4808, author = {Christian Cachin and Olga Ohrimenko}, title = {On Verifying the Consistency of Remote Untrusted Services}, journal = {CoRR}, volume = {abs/1302.4808}, year = {2013}, url = {http://arxiv.org/abs/1302.4808}, eprinttype = {arXiv}, eprint = {1302.4808}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1302-4808.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BrownOT13, author = {Joshua W. S. Brown and Olga Ohrimenko and Roberto Tamassia}, title = {Haze: Privacy-Preserving Real-Time Traffic Statistics}, journal = {CoRR}, volume = {abs/1309.3515}, year = {2013}, url = {http://arxiv.org/abs/1309.3515}, eprinttype = {arXiv}, eprint = {1309.3515}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BrownOT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/MathieuO12, author = {Claire Mathieu and Olga Ohrimenko}, title = {Lower bounds for randomized algorithms for online chain partitioning}, journal = {Inf. Process. Lett.}, volume = {112}, number = {17-18}, pages = {663--666}, year = {2012}, url = {https://doi.org/10.1016/j.ipl.2012.05.010}, doi = {10.1016/J.IPL.2012.05.010}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/MathieuO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/GoodrichNOPTTL12, author = {Michael T. Goodrich and Duy Nguyen and Olga Ohrimenko and Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos and Cristina Videira Lopes}, title = {Efficient Verification of Web-Content Searching Through Authenticated Web Crawlers}, journal = {Proc. {VLDB} Endow.}, volume = {5}, number = {10}, pages = {920--931}, year = {2012}, url = {http://vldb.org/pvldb/vol5/p920\_michaeltgoodrich\_vldb2012.pdf}, doi = {10.14778/2336664.2336666}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/GoodrichNOPTTL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/GoodrichMOT12, author = {Michael T. Goodrich and Michael Mitzenmacher and Olga Ohrimenko and Roberto Tamassia}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Practical oblivious storage}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {13--24}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133604}, doi = {10.1145/2133601.2133604}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/GoodrichMOT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gd/GoodrichOT12, author = {Michael T. Goodrich and Olga Ohrimenko and Roberto Tamassia}, editor = {Walter Didimo and Maurizio Patrignani}, title = {Graph Drawing in the Cloud: Privately Visualizing Relational Data Using Small Working Storage}, booktitle = {Graph Drawing - 20th International Symposium, {GD} 2012, Redmond, WA, USA, September 19-21, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7704}, pages = {43--54}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36763-2\_5}, doi = {10.1007/978-3-642-36763-2\_5}, timestamp = {Sun, 13 Nov 2022 09:57:28 +0100}, biburl = {https://dblp.org/rec/conf/gd/GoodrichOT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/GoodrichMOT12, author = {Michael T. Goodrich and Michael Mitzenmacher and Olga Ohrimenko and Roberto Tamassia}, editor = {Yuval Rabani}, title = {Privacy-preserving group data access via stateless oblivious {RAM} simulation}, booktitle = {Proceedings of the Twenty-Third Annual {ACM-SIAM} Symposium on Discrete Algorithms, {SODA} 2012, Kyoto, Japan, January 17-19, 2012}, pages = {157--167}, publisher = {{SIAM}}, year = {2012}, url = {https://doi.org/10.1137/1.9781611973099.14}, doi = {10.1137/1.9781611973099.14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soda/GoodrichMOT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/OhrimenkoRT12, author = {Olga Ohrimenko and Hobart Reynolds and Roberto Tamassia}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Authenticating Email Search Results}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {225--240}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_15}, doi = {10.1007/978-3-642-38004-4\_15}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/stm/OhrimenkoRT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1204-5446, author = {Michael T. Goodrich and Duy Nguyen and Olga Ohrimenko and Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos and Cristina Videira Lopes}, title = {Verifying Search Results Over Web Collections}, journal = {CoRR}, volume = {abs/1204.5446}, year = {2012}, url = {http://arxiv.org/abs/1204.5446}, eprinttype = {arXiv}, eprint = {1204.5446}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1204-5446.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1209-0756, author = {Michael T. Goodrich and Olga Ohrimenko and Roberto Tamassia}, title = {Data-Oblivious Graph Drawing Model and Algorithms}, journal = {CoRR}, volume = {abs/1209.0756}, year = {2012}, url = {http://arxiv.org/abs/1209.0756}, eprinttype = {arXiv}, eprint = {1209.0756}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1209-0756.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GoodrichMOT11, author = {Michael T. Goodrich and Michael Mitzenmacher and Olga Ohrimenko and Roberto Tamassia}, editor = {Christian Cachin and Thomas Ristenpart}, title = {Oblivious {RAM} simulation with efficient worst-case access overhead}, booktitle = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW} 2011, Chicago, IL, USA, October 21, 2011}, pages = {95--100}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046660.2046680}, doi = {10.1145/2046660.2046680}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GoodrichMOT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1105-4125, author = {Michael T. Goodrich and Michael Mitzenmacher and Olga Ohrimenko and Roberto Tamassia}, title = {Privacy-Preserving Group Data Access via Stateless Oblivious {RAM} Simulation}, journal = {CoRR}, volume = {abs/1105.4125}, year = {2011}, url = {http://arxiv.org/abs/1105.4125}, eprinttype = {arXiv}, eprint = {1105.4125}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1105-4125.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1107-5093, author = {Michael T. Goodrich and Michael Mitzenmacher and Olga Ohrimenko and Roberto Tamassia}, title = {Oblivious {RAM} Simulation with Efficient Worst-Case Access Overhead}, journal = {CoRR}, volume = {abs/1107.5093}, year = {2011}, url = {http://arxiv.org/abs/1107.5093}, eprinttype = {arXiv}, eprint = {1107.5093}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1107-5093.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1110-1851, author = {Michael T. Goodrich and Michael Mitzenmacher and Olga Ohrimenko and Roberto Tamassia}, title = {Oblivious Storage with Low {I/O} Overhead}, journal = {CoRR}, volume = {abs/1110.1851}, year = {2011}, url = {http://arxiv.org/abs/1110.1851}, eprinttype = {arXiv}, eprint = {1110.1851}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1110-1851.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/constraints/OhrimenkoSC09, author = {Olga Ohrimenko and Peter J. Stuckey and Michael Codish}, title = {Propagation via lazy clause generation}, journal = {Constraints An Int. J.}, volume = {14}, number = {3}, pages = {357--391}, year = {2009}, url = {https://doi.org/10.1007/s10601-008-9064-x}, doi = {10.1007/S10601-008-9064-X}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/constraints/OhrimenkoSC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cats/OhrimenkoS08, author = {Olga Ohrimenko and Peter J. Stuckey}, editor = {James Harland and Prabhu Manyem}, title = {Modelling for Lazy Clause Generation}, booktitle = {Theory of Computing 2008. Proc. Fourteenth Computing: The Australasian Theory Symposium {(CATS} 2008), Wollongong, NSW, Australia, January 22-25, 2008. Proceedings}, series = {{CRPIT}}, volume = {77}, pages = {27--37}, publisher = {Australian Computer Society}, year = {2008}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV77Ohrimenko.html}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cats/OhrimenkoS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cp/OhrimenkoSC07, author = {Olga Ohrimenko and Peter J. Stuckey and Michael Codish}, editor = {Christian Bessiere}, title = {Propagation = Lazy Clause Generation}, booktitle = {Principles and Practice of Constraint Programming - {CP} 2007, 13th International Conference, {CP} 2007, Providence, RI, USA, September 23-27, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4741}, pages = {544--558}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74970-7\_39}, doi = {10.1007/978-3-540-74970-7\_39}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/cp/OhrimenkoSC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0705-2065, author = {Aaron Harwood and Olga Ohrimenko}, title = {Mean Field Models of Message Throughput in Dynamic Peer-to-Peer Systems}, journal = {CoRR}, volume = {abs/0705.2065}, year = {2007}, url = {http://arxiv.org/abs/0705.2065}, eprinttype = {arXiv}, eprint = {0705.2065}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0705-2065.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.