Hawk: The blockchain model of cryptography and privacy-preserving smart contracts A Kosba, A Miller, E Shi, Z Wen, C Papamanthou 2016 IEEE symposium on security and privacy (SP), 839-858, 2016 | 3193 | 2016 |
The sybil attack in sensor networks: analysis & defenses J Newsome, E Shi, D Song, A Perrig Proceedings of the 3rd international symposium on Information processing in …, 2004 | 2184 | 2004 |
On Scaling Decentralized Blockchains: (A Position Paper) K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ... International conference on financial cryptography and data security, 106-125, 2016 | 1689 | 2016 |
Controlling data in the cloud: outsourcing computation without outsourcing control R Chow, P Golle, M Jakobsson, E Shi, J Staddon, R Masuoka, J Molina Proceedings of the 2009 ACM workshop on Cloud computing security, 85-90, 2009 | 1257 | 2009 |
Path ORAM: an extremely simple oblivious RAM protocol E Stefanov, M Dijk, E Shi, THH Chan, C Fletcher, L Ren, X Yu, S Devadas Journal of the ACM (JACM) 65 (4), 1-26, 2018 | 1245 | 2018 |
Bitter to better—how to make bitcoin a better currency S Barber, X Boyen, E Shi, E Uzun Financial Cryptography and Data Security: 16th International Conference, FC …, 2012 | 1007 | 2012 |
The honey badger of BFT protocols A Miller, Y Xia, K Croman, E Shi, D Song Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 1003 | 2016 |
Privacy-preserving aggregation of time-series data E Shi, THH Chan, E Rieffel, R Chow, D Song Network and Distributed System Security Symposium (NDSS), 2011 | 946 | 2011 |
Designing secure sensor networks E Shi, A Perrig IEEE Wireless Communications 11 (6), 38-43, 2004 | 911 | 2004 |
Town crier: An authenticated data feed for smart contracts F Zhang, E Cecchetti, K Croman, A Juels, E Shi Proceedings of the 2016 aCM sIGSAC conference on computer and communications …, 2016 | 818 | 2016 |
Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab K Delmolino, M Arnett, A Kosba, A Miller, E Shi Financial Cryptography and Data Security: FC 2016 International Workshops …, 2016 | 784 | 2016 |
Multi-dimensional range query over encrypted data E Shi, J Bethencourt, THH Chan, D Song, A Perrig 2007 IEEE Symposium on Security and Privacy (SP'07), 350-364, 2007 | 768 | 2007 |
Practical dynamic searchable encryption with small leakage E Stefanov, C Papamanthou, E Shi Cryptology ePrint Archive, 2013 | 732 | 2013 |
Stubborn mining: Generalizing selfish mining and combining with an eclipse attack K Nayak, S Kumar, A Miller, E Shi 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 305-320, 2016 | 632 | 2016 |
Private and continual release of statistics THH Chan, E Shi, D Song ACM Transactions on Information and System Security (TISSEC) 14 (3), 1-24, 2011 | 609 | 2011 |
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems A Seshadri, M Luk, E Shi, A Perrig, L Van Doorn, P Khosla Proceedings of the twentieth ACM symposium on Operating systems principles, 1-16, 2005 | 560 | 2005 |
Oblivious RAM with O((logN)3) Worst-Case Cost E Shi, THH Chan, E Stefanov, M Li Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011 | 549 | 2011 |
Predicate privacy in encryption systems E Shen, E Shi, B Waters Theory of Cryptography Conference, 457-473, 2009 | 549 | 2009 |
Hybrid consensus: Efficient consensus in the permissionless model R Pass, E Shi Cryptology ePrint Archive, 2016 | 482 | 2016 |
Fruitchains: A fair blockchain R Pass, E Shi Proceedings of the ACM symposium on principles of distributed computing, 315-324, 2017 | 450 | 2017 |