Hawk: The blockchain model of cryptography and privacy-preserving smart contracts A Kosba, A Miller, E Shi, Z Wen, C Papamanthou 2016 IEEE symposium on security and privacy (SP), 839-858, 2016 | 3230 | 2016 |
The sybil attack in sensor networks: analysis & defenses J Newsome, E Shi, D Song, A Perrig Proceedings of the 3rd international symposium on Information processing in …, 2004 | 2189 | 2004 |
On Scaling Decentralized Blockchains: (A Position Paper) K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ... International conference on financial cryptography and data security, 106-125, 2016 | 1712 | 2016 |
Controlling data in the cloud: outsourcing computation without outsourcing control R Chow, P Golle, M Jakobsson, E Shi, J Staddon, R Masuoka, J Molina Proceedings of the 2009 ACM workshop on Cloud computing security, 85-90, 2009 | 1263 | 2009 |
Path ORAM: an extremely simple oblivious RAM protocol E Stefanov, M Dijk, E Shi, THH Chan, C Fletcher, L Ren, X Yu, S Devadas Journal of the ACM (JACM) 65 (4), 1-26, 2018 | 1260 | 2018 |
The honey badger of BFT protocols A Miller, Y Xia, K Croman, E Shi, D Song Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 1028 | 2016 |
Bitter to better—how to make bitcoin a better currency S Barber, X Boyen, E Shi, E Uzun Financial Cryptography and Data Security: 16th International Conference, FC …, 2012 | 1010 | 2012 |
Privacy-preserving aggregation of time-series data E Shi, THH Chan, E Rieffel, R Chow, D Song Network and Distributed System Security Symposium (NDSS), 2011 | 948 | 2011 |
Designing secure sensor networks E Shi, A Perrig IEEE Wireless Communications 11 (6), 38-43, 2004 | 911 | 2004 |
Town crier: An authenticated data feed for smart contracts F Zhang, E Cecchetti, K Croman, A Juels, E Shi Proceedings of the 2016 aCM sIGSAC conference on computer and communications …, 2016 | 831 | 2016 |
Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab K Delmolino, M Arnett, A Kosba, A Miller, E Shi Financial Cryptography and Data Security: FC 2016 International Workshops …, 2016 | 790 | 2016 |
Multi-dimensional range query over encrypted data E Shi, J Bethencourt, THH Chan, D Song, A Perrig 2007 IEEE Symposium on Security and Privacy (SP'07), 350-364, 2007 | 770 | 2007 |
Practical dynamic searchable encryption with small leakage E Stefanov, C Papamanthou, E Shi Cryptology ePrint Archive, 2013 | 740 | 2013 |
Stubborn mining: Generalizing selfish mining and combining with an eclipse attack K Nayak, S Kumar, A Miller, E Shi 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 305-320, 2016 | 638 | 2016 |
Private and continual release of statistics THH Chan, E Shi, D Song ACM Transactions on Information and System Security (TISSEC) 14 (3), 1-24, 2011 | 621 | 2011 |
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems A Seshadri, M Luk, E Shi, A Perrig, L Van Doorn, P Khosla Proceedings of the twentieth ACM symposium on Operating systems principles, 1-16, 2005 | 564 | 2005 |
Oblivious RAM with O((logN)3) Worst-Case Cost E Shi, THH Chan, E Stefanov, M Li Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011 | 552 | 2011 |
Predicate privacy in encryption systems E Shen, E Shi, B Waters Theory of Cryptography Conference, 457-473, 2009 | 552 | 2009 |
Hybrid consensus: Efficient consensus in the permissionless model R Pass, E Shi Cryptology ePrint Archive, 2016 | 485 | 2016 |
Oblivm: A programming framework for secure computation C Liu, XS Wang, K Nayak, Y Huang, E Shi 2015 IEEE Symposium on Security and Privacy, 359-376, 2015 | 454 | 2015 |