CryptDB: Protecting confidentiality with encrypted query processing RA Popa, CMS Redfield, N Zeldovich, H Balakrishnan Proceedings of the twenty-third ACM symposium on operating systems …, 2011 | 1712 | 2011 |
Machine learning classification over encrypted data R Bost, RA Popa, S Tu, S Goldwasser Cryptology ePrint Archive, 2014 | 883 | 2014 |
Cloud programming simplified: A berkeley view on serverless computing E Jonas, J Schleier-Smith, V Sreekanti, CC Tsai, A Khandelwal, Q Pu, ... arXiv preprint arXiv:1902.03383, 2019 | 586 | 2019 |
Relational cloud: A database-as-a-service for the cloud C Curino, EPC Jones, RA Popa, N Malviya, E Wu, S Madden, ... | 511 | 2011 |
An ideal-security protocol for order-preserving encoding RA Popa, FH Li, N Zeldovich 2013 IEEE Symposium on Security and Privacy, 463-477, 2013 | 504 | 2013 |
Reusable garbled circuits and succinct functional encryption S Goldwasser, Y Kalai, RA Popa, V Vaikuntanathan, N Zeldovich Proceedings of the forty-fifth annual ACM symposium on Theory of computing …, 2013 | 495 | 2013 |
Blindbox: Deep packet inspection over encrypted traffic J Sherry, C Lan, RA Popa, S Ratnasamy Proceedings of the 2015 ACM conference on special interest group on data …, 2015 | 440 | 2015 |
Opaque: An oblivious and encrypted distributed analytics platform W Zheng, A Dave, JG Beekman, RA Popa, JE Gonzalez, I Stoica 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2017 | 389 | 2017 |
Enabling security in cloud storage {SLAs} with {CloudProof} RA Popa, JR Lorch, D Molnar, HJ Wang, L Zhuang 2011 USENIX Annual Technical Conference (USENIX ATC 11), 2011 | 383 | 2011 |
Delphi: A cryptographic inference system for neural networks P Mishra, R Lehmkuhl, A Srinivasan, W Zheng, RA Popa Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in …, 2020 | 343 | 2020 |
MUVI: Automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs S Lu, S Park, C Hu, X Ma, W Jiang, Z Li, RA Popa, Y Zhou Proceedings of twenty-first ACM SIGOPS symposium on Operating systems …, 2007 | 280 | 2007 |
How to run turing machines on encrypted data S Goldwasser, YT Kalai, RA Popa, V Vaikuntanathan, N Zeldovich Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013 | 244 | 2013 |
CryptDB: processing queries on an encrypted database RA Popa, CMS Redfield, N Zeldovich, H Balakrishnan Communications of the ACM 55 (9), 103-111, 2012 | 238 | 2012 |
A berkeley view of systems challenges for ai I Stoica, D Song, RA Popa, D Patterson, MW Mahoney, R Katz, ... arXiv preprint arXiv:1712.05855, 2017 | 236 | 2017 |
Oblix: An efficient oblivious search index P Mishra, R Poddar, J Chen, A Chiesa, RA Popa 2018 IEEE Symposium on Security and Privacy (SP), 279-296, 2018 | 186 | 2018 |
Building web applications on top of encrypted data using Mylar RA Popa, E Stark, S Valdez, J Helfer, N Zeldovich, H Balakrishnan 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2014 | 183 | 2014 |
VPriv: Protecting privacy in location-based vehicular services RA Popa, H Balakrishnan, AJ Blumberg USENIX Association, 2009 | 174 | 2009 |
Multi-key searchable encryption RA Popa, N Zeldovich Cryptology ePrint Archive, 2013 | 164 | 2013 |
Embark: Securely outsourcing middleboxes to the cloud C Lan, J Sherry, RA Popa, S Ratnasamy, Z Liu 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2016 | 160 | 2016 |
Methods and apparatus for securing a database H Balakrishnan, RA Popa, N Zeldovich US Patent 9,087,212, 2015 | 160 | 2015 |