Publication
Cryptography with Tamperable and Leaky Memory
Publication
A Firm Foundation for Private Data Analysis
Publication
AutoLog: facing log redundancy and insufficiency
Publication