Takip et
Sarvar Patel
Sarvar Patel
google.com üzerinde doğrulanmış e-posta adresine sahip
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Practical secure aggregation for privacy-preserving machine learning
K Bonawitz, V Ivanov, B Kreuter, A Marcedone, HB McMahan, S Patel, ...
proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
36102017
Provably secure password-authenticated key exchange using Diffie-Hellman
V Boyko, P MacKenzie, S Patel
Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000
10782000
Practical secure aggregation for federated learning on user-held data
K Bonawitz, V Ivanov, B Kreuter, A Marcedone, HB McMahan, S Patel, ...
arXiv preprint arXiv:1611.04482, 2016
6162016
Password-authenticated key exchange based on RSA
P MacKenzie, S Patel, R Swaminathan
International conference on the theory and application of cryptology and …, 2000
2472000
Number theoretic attacks on secure password schemes
S Patel
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
1811997
On deploying secure computing: Private intersection-sum-with-cardinality
M Ion, B Kreuter, AE Nergiz, S Patel, S Saxena, K Seth, M Raykova, ...
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 370-389, 2020
1692020
Protecting accounts from credential stuffing with password breach alerting
K Thomas, J Pullman, K Yeo, A Raghunathan, PG Kelley, L Invernizzi, ...
28th USENIX Security Symposium (USENIX Security 19), 1556-1571, 2019
1672019
Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing
S Patel, G Persiano, K Yeo, M Yung
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
1442019
{GRIMOIRE}: Synthesizing structure while fuzzing
T Blazytko, M Bishop, C Aschermann, J Cappos, M Schlögel, N Korshun, ...
28th USENIX Security Symposium (USENIX Security 19), 1985-2002, 2019
1362019
Private intersection-sum protocol with applications to attributing aggregate ad conversions
M Ion, B Kreuter, E Nergiz, S Patel, S Saxena, K Seth, D Shanahan, ...
Cryptology ePrint Archive, 2017
1282017
Efficient authentication and key distribution in wireless IP networks
L Salgarelli, M Buddhikot, J Garay, S Patel, S Miller
IEEE Wireless Communications 10 (6), 52-61, 2003
1232003
Downlink scheduling in CDMA data networks
N Joshi, SR Kadaba, S Patel, GS Sundaram
Proceedings of the 6th annual international conference on Mobile computing …, 2000
1142000
PanORAMa: Oblivious RAM with logarithmic overhead
S Patel, G Persiano, M Raykova, K Yeo
2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS …, 2018
1082018
Storing encrypted objects
U Shankar, A Kulik, B Moller, S Patel, BN Bershad, D Erb
US Patent 8,601,263, 2013
1072013
Square hash: Fast message authentication via optimized universal hash functions
M Etzel, S Patel, Z Ramzan
Annual International Cryptology Conference, 234-251, 1999
1021999
An efficient discrete log pseudo random generator
S Patel, GS Sundaram
Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998
991998
{Communication–Computation} trade-offs in {PIR}
A Ali, T Lepoint, S Patel, M Raykova, P Schoppmann, K Seth, K Yeo
30th USENIX security symposium (USENIX Security 21), 1811-1828, 2021
982021
Method for authenticating a mobile unit attached to a femtocell that operates according to code division multiple access
TC Morgan, S Patel, RJ Thompson
US Patent 8,428,554, 2013
842013
Method for establishing session key agreement
S Patel
US Patent 6,591,364, 2003
832003
Private stateful information retrieval
S Patel, G Persiano, K Yeo
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
772018
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20