The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Abhi Shelat: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andrew J. Blumberg, Abhi Shelat
    Searching for Stable Mechanisms: Automated Design for Imperfect Players. [Citation Graph (0, 0)][DBLP]
    AAAI, 2004, pp:8-13 [Conf]
  2. Rafael Pass, Abhi Shelat
    Unconditional Characterizations of Non-interactive Zero-Knowledge. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:118-134 [Conf]
  3. Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan
    Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2006, pp:271-289 [Conf]
  4. Jan Camenisch, Abhi Shelat, Dieter Sommer, Simone Fischer-Hübner, Marit Hansen, Henry Krasemann, Gérard Lacoste, Ronald Leenes, Jimmy C. Tseng
    Privacy and identity management for everyone. [Citation Graph (0, 0)][DBLP]
    Digital Identity Management, 2005, pp:20-27 [Conf]
  5. Jan Camenisch, Abhi Shelat, Dieter Sommer, Roger Zimmermann
    Securing user inputs for the web. [Citation Graph (0, 0)][DBLP]
    Digital Identity Management, 2006, pp:33-44 [Conf]
  6. Matt Lepinski, Silvio Micali, Chris Peikert, Abhi Shelat
    Completely fair SFE and coalition-safe cheap talk. [Citation Graph (0, 0)][DBLP]
    PODC, 2004, pp:1-10 [Conf]
  7. Eric Lehman, Abhi Shelat
    Approximation algorithms for grammar-based compression. [Citation Graph (0, 0)][DBLP]
    SODA, 2002, pp:205-212 [Conf]
  8. Chris Peikert, Abhi Shelat, Adam Smith
    Lower bounds for collusion-secure fingerprinting. [Citation Graph (0, 0)][DBLP]
    SODA, 2003, pp:472-479 [Conf]
  9. Moses Charikar, Eric Lehman, Ding Liu, Rina Panigrahy, Manoj Prabhakaran, April Rasala, Amit Sahai, Abhi Shelat
    Approximating the smallest grammar: Kolmogorov complexity in natural models. [Citation Graph (0, 0)][DBLP]
    STOC, 2002, pp:792-801 [Conf]
  10. Matt Lepinski, Silvio Micali, Abhi Shelat
    Collusion-free protocols. [Citation Graph (0, 0)][DBLP]
    STOC, 2005, pp:543-552 [Conf]
  11. Matt Lepinski, Silvio Micali, Abhi Shelat
    Fair-Zero Knowledge. [Citation Graph (0, 0)][DBLP]
    TCC, 2005, pp:245-263 [Conf]
  12. Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, Vinod Vaikuntanathan
    Securely Obfuscating Re-encryption. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:233-252 [Conf]
  13. Simson L. Garfinkel, Abhi Shelat
    IEEE Security & Privacy: Data Forensics - Rememberance of Data Passed: A Study of Disk Sanitization Practices. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2003, v:4, n:2, pp:- [Journal]
  14. Simson L. Garfinkel, Abhi Shelat
    Remembrance of Data Passed: A Study of Disk Sanitization Practices. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:17-27 [Journal]
  15. Moses Charikar, Eric Lehman, Ding Liu, Rina Panigrahy, Manoj Prabhakaran, Amit Sahai, Abhi Shelat
    The smallest grammar problem. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:7, pp:2554-2576 [Journal]
  16. Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan
    Relations Among Notions of Non-malleability for Encryption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:519-535 [Conf]
  17. Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan
    Bounded CCA2-Secure Encryption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:502-518 [Conf]
  18. Jan Camenisch, Gregory Neven, Abhi Shelat
    Simulatable Adaptive Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:573-590 [Conf]
  19. Christian Cachin, Abhi Shelat, Alexander Shraer
    Efficient fork-linearizable access to untrusted shared memory. [Citation Graph (0, 0)][DBLP]
    PODC, 2007, pp:129-138 [Conf]

  20. Efficient Protocols for Set Membership and Range Proofs. [Citation Graph (, )][DBLP]


  21. Collusion-Free Protocols in the Mediated Model. [Citation Graph (, )][DBLP]


  22. Collusion-Free Multiparty Computation in the Mediated Model. [Citation Graph (, )][DBLP]


  23. Cryptography from Sunspots: How to Use an Imperfect Reference String. [Citation Graph (, )][DBLP]


  24. Bit Encryption Is Complete. [Citation Graph (, )][DBLP]


  25. Purely Rational Secret Sharing (Extended Abstract). [Citation Graph (, )][DBLP]


Search in 0.157secs, Finished in 0.158secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002