关注
T-H. Hubert Chan
T-H. Hubert Chan
Department of Computer Science, The University of Hong Kong
在 cs.hku.hk 的电子邮件经过验证
标题
引用次数
引用次数
年份
Path ORAM: an extremely simple oblivious RAM protocol
E Stefanov, M Dijk, E Shi, THH Chan, C Fletcher, L Ren, X Yu, S Devadas
Journal of the ACM (JACM) 65 (4), 1-26, 2018
12732018
Multi-dimensional range query over encrypted data
E Shi, J Bethencourt, THH Chan, D Song, A Perrig
2007 IEEE Symposium on Security and Privacy (SP'07), 350-364, 2007
7502007
Private and continual release of statistics
THH Chan, E Shi, D Song
ACM Transactions on Information and System Security (TISSEC) 14 (3), 1-24, 2011
6262011
Oblivious RAM with O((logN)3) Worst-Case Cost
E Shi, THH Chan, E Stefanov, M Li
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
5552011
Circuit oram: On tightness of the goldreich-ostrovsky lower bound
X Wang, H Chan, E Shi
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
3552015
Oblivious data structures
XS Wang, K Nayak, C Liu, THH Chan, E Shi, E Stefanov, Y Huang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
2722014
Privacy-preserving stream aggregation with fault tolerance
THH Chan, E Shi, D Song
Financial Cryptography and Data Security: 16th International Conference, FC …, 2012
2662012
SCORAM: oblivious RAM for secure computation
XS Wang, Y Huang, THH Chan, A Shelat, E Shi
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
2002014
On hierarchical routing in doubling metrics
THH Chan, A Gupta, BM Maggs, S Zhou
ACM Transactions on Algorithms (TALG) 12 (4), 1-22, 2016
1672016
How to vote privately using bitcoin
Z Zhao, THH Chan
Information and Communications Security: 17th International Conference …, 2016
1602016
Communication complexity of byzantine agreement, revisited
I Abraham, THH Chan, D Dolev, K Nayak, R Pass, L Ren, E Shi
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing …, 2019
1432019
Differentially private continual monitoring of heavy hitters from distributed streams
THH Chan, M Li, E Shi, W Xu
Privacy Enhancing Technologies: 12th International Symposium, PETS 2012 …, 2012
1422012
Optimal lower bound for differentially private multi-party aggregation
THH Chan, E Shi, D Song
European Symposium on Algorithms, 277-288, 2012
1312012
A random-surfer web-graph model
A Blum, THH Chan, MR Rwebangira
2006 Proceedings of the Third Workshop on Analytic Algorithmics and …, 2006
1002006
Spectral properties of hypergraph laplacian and approximation algorithms
THH Chan, A Louis, ZG Tang, C Zhang
Journal of the ACM (JACM) 65 (3), 1-48, 2018
982018
Finding subgraphs with maximum total density and limited overlap
OD Balalau, F Bonchi, THH Chan, F Gullo, M Sozio
Proceedings of the Eighth ACM International Conference on Web Search and …, 2015
982015
Privacy-preserving aggregation of Time-series data
R Shi, R Chow, THH Chan
US Patent 8,555,400, 2013
902013
Pala: A simple partially synchronous blockchain
THH Chan, R Pass, E Shi
Cryptology ePrint Archive, 2018
832018
Large scale density-friendly graph decomposition via convex programming
M Danisch, THH Chan, M Sozio
Proceedings of the 26th International Conference on World Wide Web, 233-242, 2017
792017
Foundations of differentially oblivious algorithms
THH Chan, KM Chung, B Maggs, E Shi
ACM Journal of the ACM (JACM) 69 (4), 1-49, 2022
772022
系统目前无法执行此操作,请稍后再试。
文章 1–20