BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × France
1 × Iceland
1 × Turkey
1 × United Kingdom
2 × USA
Collaborated with:
D.Song B.Waters T.H.Chan A.Miller M.Hicks J.Katz P.Mohan A.Thakurta D.E.Culler C.Liu A.Harris M.Maas M.W.Hicks M.Tiwari A.Seshadri M.Luk A.Perrig L.v.Doorn P.K.Khosla Pan Zhang C.Song H.Yin D.Zou H.J.0001
Talks about:
system (3) execut (2) data (2) code (2) structur (1) statist (1) softwar (1) privaci (1) preserv (1) pioneer (1)

Person: Elaine Shi

DBLP DBLP: Shi:Elaine

Contributed to:

ASPLOS 20152015
POPL 20142014
SIGMOD 20122012
ICALP (2) 20102010
ICALP (2) 20082008
SOSP 20052005
ASPLOS 20202020

Wrote 7 papers:

ASPLOS-2015-LiuHMHTS #memory management #named
GhostRider: A Hardware-Software System for Memory Trace Oblivious Computation (CL, AH, MM, MWH, MT, ES), pp. 87–101.
POPL-2014-MillerHKS #authentication #data type
Authenticated data structures, generically (AM, MH, JK, ES), pp. 411–424.
SIGMOD-2012-MohanTSSC #data analysis #named #privacy
GUPT: privacy preserving data analysis made easy (PM, AT, ES, DS, DEC), pp. 349–360.
ICALP-v2-2010-ChanSS #statistics
Private and Continual Release of Statistics (THHC, ES, DS), pp. 405–417.
ICALP-C-2008-ShiW #encryption
Delegating Capabilities in Predicate Encryption Systems (ES, BW), pp. 560–578.
SOSP-2005-SeshadriLSPDK #execution #legacy #named #verification
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems (AS, ML, ES, AP, LvD, PKK), pp. 1–16.
ASPLOS-2020-ZhangSYZS0 #execution #named #obfuscation #performance
Klotski: Efficient Obfuscated Execution against Controlled-Channel Attacks (PZ, CS, HY, DZ, ES, HJ0), pp. 1263–1276.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.