default search action
Rishabh Poddar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c15]Rishabh Poddar, Sukrit Kalra, Avishay Yanai, Ryan Deng, Raluca Ada Popa, Joseph M. Hellerstein:
Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics. USENIX Security Symposium 2021: 2129-2146 - [c14]Jeongseok Son, Griffin Prechter, Rishabh Poddar, Raluca Ada Popa, Koushik Sen:
ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable State. USENIX Security Symposium 2021: 2219-2236 - 2020
- [b1]Rishabh Poddar:
Secure Computation Systems for Confidential Data Analysis. University of California, Berkeley, USA, 2020 - [c13]Andrew Law, Chester Leung, Rishabh Poddar, Raluca Ada Popa, Chenyu Shi, Octavian Sima, Chaofan Yu, Xingmeng Zhang, Wenting Zheng:
Secure Collaborative Training and Inference for XGBoost. PPMLP@CCS 2020: 21-26 - [c12]Rishabh Poddar, Stephanie Wang, Jianan Lu, Raluca Ada Popa:
Practical Volume-Based Attacks on Encrypted Databases. EuroS&P 2020: 354-369 - [c11]Rishabh Poddar, Ganesh Ananthanarayanan, Srinath T. V. Setty, Stavros Volos, Raluca Ada Popa:
Visor: Privacy-Preserving Video Analytics as a Cloud Service. USENIX Security Symposium 2020: 1039-1056 - [i8]Rishabh Poddar, Ganesh Ananthanarayanan, Srinath T. V. Setty, Stavros Volos, Raluca Ada Popa:
Visor: Privacy-Preserving Video Analytics as a Cloud Service. CoRR abs/2006.09628 (2020) - [i7]Rishabh Poddar, Stephanie Wang, Jianan Lu, Raluca Ada Popa:
Practical Volume-Based Attacks on Encrypted Databases. CoRR abs/2008.06627 (2020) - [i6]Andrew Law, Chester Leung, Rishabh Poddar, Raluca Ada Popa, Chenyu Shi, Octavian Sima, Chaofan Yu, Xingmeng Zhang, Wenting Zheng:
Secure Collaborative Training and Inference for XGBoost. CoRR abs/2010.02524 (2020) - [i5]Rishabh Poddar, Sukrit Kalra, Avishay Yanai, Ryan Deng, Raluca Ada Popa, Joseph M. Hellerstein:
Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics. CoRR abs/2010.13752 (2020) - [i4]Rishabh Poddar, Sukrit Kalra, Avishay Yanai, Ryan Deng, Raluca Ada Popa, Joseph M. Hellerstein:
Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics. IACR Cryptol. ePrint Arch. 2020: 1350 (2020)
2010 – 2019
- 2019
- [j1]Rishabh Poddar, Tobias Boelter, Raluca Ada Popa:
Arx: An Encrypted Database using Semantically Secure Encryption. Proc. VLDB Endow. 12(11): 1664-1678 (2019) - [i3]Stephanie Wang, Rishabh Poddar, Jianan Lu, Raluca Ada Popa:
Practical Volume-Based Attacks on Encrypted Databases. IACR Cryptol. ePrint Arch. 2019: 1224 (2019) - 2018
- [c10]Rishabh Poddar, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy:
SafeBricks: Shielding Network Functions in the Cloud. NSDI 2018: 201-216 - [c9]Pratyush Mishra, Rishabh Poddar, Jerry Chen, Alessandro Chiesa, Raluca Ada Popa:
Oblix: An Efficient Oblivious Search Index. IEEE Symposium on Security and Privacy 2018: 279-296 - 2016
- [c8]Kshiteej Mahajan, Rishabh Poddar, Mohan Dhawan, Vijay Mann:
JURY: Validating Controller Actions in Software-Defined Networks. DSN 2016: 109-120 - [i2]Tobias Boelter, Rishabh Poddar, Raluca Ada Popa:
A Secure One-Roundtrip Index for Range Queries. IACR Cryptol. ePrint Arch. 2016: 568 (2016) - [i1]Rishabh Poddar, Tobias Boelter, Raluca Ada Popa:
Arx: A Strongly Encrypted Database System. IACR Cryptol. ePrint Arch. 2016: 591 (2016) - 2015
- [c7]Rishabh Poddar, Anilkumar Vishnoi, Vijay Mann:
HAVEN: Holistic load balancing and auto scaling in the cloud. COMSNETS 2015: 1-8 - [c6]Dhruv Sharma, Rishabh Poddar, Kshiteej Mahajan, Mohan Dhawan, Vijay Mann:
Hansel: diagnosing faults in openStack. CoNEXT 2015: 23:1-23:13 - [c5]Mohan Dhawan, Rishabh Poddar, Kshiteej Mahajan, Vijay Mann:
SPHINX: Detecting Security Attacks in Software-Defined Networks. NDSS 2015 - 2014
- [c4]Anilkumar Vishnoi, Rishabh Poddar, Vijay Mann, Suparna Bhattacharya:
Effective switch memory management in OpenFlow networks. DEBS 2014: 177-188 - 2012
- [c3]Vijay Mann, Akanksha Gupta, Partha Dutta, Anilkumar Vishnoi, Parantapa Bhattacharya, Rishabh Poddar, Aakash Iyer:
Remedy: Network-Aware Steady State VM Management for Data Centers. Networking (1) 2012: 190-204 - 2011
- [c2]Chester Rebeiro, Rishabh Poddar, Amit Datta, Debdeep Mukhopadhyay:
An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines. INDOCRYPT 2011: 58-75 - [c1]Rishabh Poddar, Amit Datta, Chester Rebeiro:
A Cache Trace Attack on CAMELLIA. InfoSecHiComNet 2011: 144-156
Coauthor Index
aka: Raluca Ada Popa
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint