Follow
Emma Dauterman
Emma Dauterman
Verified email at berkeley.edu - Homepage
Title
Cited by
Cited by
Year
{DORY}: An encrypted search system with distributed trust
E Dauterman, E Feng, E Luo, RA Popa, I Stoica
14th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2020
402020
Waldo: A private time-series database from function secret sharing
E Dauterman, M Rathee, RA Popa, I Stoica
2022 IEEE Symposium on Security and Privacy (SP), 2450-2468, 2022
302022
Reducing participation costs via incremental verification for ledger systems
W Chen, A Chiesa, E Dauterman, NP Ward
Cryptology ePrint Archive, 2020
262020
True2F: Backdoor-resistant authentication tokens
E Dauterman, H Corrigan-Gibbs, D Mazières, D Boneh, D Rizzo
2019 IEEE Symposium on Security and Privacy (SP), 398-416, 2019
222019
Snoopy: Surpassing the scalability bottleneck of oblivious storage
E Dauterman, V Fang, I Demertzis, N Crooks, RA Popa
Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles …, 2021
162021
{SafetyPin}: Encrypted backups with {Human-Memorable} secrets
E Dauterman, H Corrigan-Gibbs, D Mazières
14th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2020
82020
Reflections on trusting distributed trust
E Dauterman, V Fang, N Crooks, RA Popa
Proceedings of the 21st ACM Workshop on Hot Topics in Networks, 38-45, 2022
42022
Accountable authentication with privacy protection: The Larch system for universal login
E Dauterman, D Lin, H Corrigan-Gibbs, D Mazières
arXiv preprint arXiv:2305.19241, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–8