Hawk: The blockchain model of cryptography and privacy-preserving smart contracts A Kosba, A Miller, E Shi, Z Wen, C Papamanthou 2016 IEEE symposium on security and privacy (SP), 839-858, 2016 | 2232 | 2016 |
The sybil attack in sensor networks: analysis & defenses J Newsome, E Shi, D Song, A Perrig Third international symposium on information processing in sensor networks …, 2004 | 2053 | 2004 |
On scaling decentralized blockchains K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ... International conference on financial cryptography and data security, 106-125, 2016 | 1219 | 2016 |
Controlling data in the cloud: outsourcing computation without outsourcing control R Chow, P Golle, M Jakobsson, E Shi, J Staddon, R Masuoka, J Molina Proceedings of the 2009 ACM workshop on Cloud computing security, 85-90, 2009 | 1146 | 2009 |
Path ORAM: an extremely simple oblivious RAM protocol E Stefanov, MV Dijk, E Shi, THH Chan, C Fletcher, L Ren, X Yu, ... Journal of the ACM (JACM) 65 (4), 1-26, 2018 | 942 | 2018 |
Designing secure sensor networks E Shi, A Perrig IEEE Wireless Communications 11 (6), 38-43, 2004 | 850 | 2004 |
Bitter to better—how to make bitcoin a better currency S Barber, X Boyen, E Shi, E Uzun International conference on financial cryptography and data security, 399-414, 2012 | 825 | 2012 |
Privacy-preserving aggregation of time-series data R Shi, R Chow, THH Chan | 766 | 2016 |
Multi-dimensional range query over encrypted data E Shi, J Bethencourt, THH Chan, D Song, A Perrig 2007 IEEE Symposium on Security and Privacy (SP'07), 350-364, 2007 | 704 | 2007 |
Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab K Delmolino, M Arnett, A Kosba, A Miller, E Shi International conference on financial cryptography and data security, 79-94, 2016 | 600 | 2016 |
The honey badger of BFT protocols A Miller, Y Xia, K Croman, E Shi, D Song Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 582 | 2016 |
Practical dynamic searchable encryption with small leakage E Stefanov, C Papamanthou, E Shi Cryptology ePrint Archive, 2013 | 565 | 2013 |
Town crier: An authenticated data feed for smart contracts F Zhang, E Cecchetti, K Croman, A Juels, E Shi Proceedings of the 2016 aCM sIGSAC conference on computer and communications …, 2016 | 549 | 2016 |
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems A Seshadri, M Luk, E Shi, A Perrig, L Van Doorn, P Khosla Proceedings of the twentieth ACM symposium on Operating systems principles, 1-16, 2005 | 515 | 2005 |
Predicate privacy in encryption systems E Shen, E Shi, B Waters Theory of Cryptography Conference, 457-473, 2009 | 483 | 2009 |
Stubborn mining: Generalizing selfish mining and combining with an eclipse attack K Nayak, S Kumar, A Miller, E Shi 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 305-320, 2016 | 460 | 2016 |
Oblivious RAM with O ((logN) 3) worst-case cost E Shi, THH Chan, E Stefanov, M Li International Conference on The Theory and Application of Cryptology and …, 2011 | 459 | 2011 |
Private and continual release of statistics THH Chan, E Shi, D Song ACM Transactions on Information and System Security (TISSEC) 14 (3), 1-24, 2011 | 424 | 2011 |
Bind: A fine-grained attestation service for secure distributed systems E Shi, A Perrig, L Van Doorn 2005 IEEE Symposium on Security and Privacy (S&P'05), 154-168, 2005 | 372 | 2005 |
Towards practical oblivious RAM E Stefanov, E Shi, D Song arXiv preprint arXiv:1106.3652, 2011 | 369 | 2011 |