2009 |
8 | EE | Emily Shen,
Elaine Shi,
Brent Waters:
Predicate Privacy in Encryption Systems.
TCC 2009: 457-473 |
2008 |
7 | EE | Elaine Shi,
Brent Waters:
Delegating Capabilities in Predicate Encryption Systems.
ICALP (2) 2008: 560-578 |
2007 |
6 | EE | Elaine Shi,
John Bethencourt,
Hubert T.-H. Chan,
Dawn Xiaodong Song,
Adrian Perrig:
Multi-Dimensional Range Query over Encrypted Data.
IEEE Symposium on Security and Privacy 2007: 350-364 |
5 | EE | Bryan Parno,
Dan Wendlandt,
Elaine Shi,
Adrian Perrig,
Bruce M. Maggs,
Yih-Chun Hu:
Portcullis: protecting connection setup from denial-of-capability attacks.
SIGCOMM 2007: 289-300 |
2005 |
4 | EE | Elaine Shi,
Adrian Perrig,
Leendert van Doorn:
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems.
IEEE Symposium on Security and Privacy 2005: 154-168 |
3 | EE | Jonathan M. McCune,
Elaine Shi,
Adrian Perrig,
Michael K. Reiter:
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts.
IEEE Symposium on Security and Privacy 2005: 64-78 |
2 | EE | Arvind Seshadri,
Mark Luk,
Elaine Shi,
Adrian Perrig,
Leendert van Doorn,
Pradeep K. Khosla:
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems.
SOSP 2005: 1-16 |
2004 |
1 | EE | James Newsome,
Elaine Shi,
Dawn Xiaodong Song,
Adrian Perrig:
The sybil attack in sensor networks: analysis & defenses.
IPSN 2004: 259-268 |