Folgen
Kevin Yeo
Kevin Yeo
Bestätigte E-Mail-Adresse bei google.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Protecting accounts from credential stuffing with password breach alerting
K Thomas, J Pullman, K Yeo, A Raghunathan, PG Kelley, L Invernizzi, ...
28th USENIX Security Symposium (USENIX Security 19), 1556-1571, 2019
1612019
Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing
S Patel, G Persiano, K Yeo, M Yung
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
1272019
PanORAMa: Oblivious RAM with logarithmic overhead
S Patel, G Persiano, M Raykova, K Yeo
2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS …, 2018
1022018
Communication–Computation Trade-offs in PIR
A Ali, T Lepoint, S Patel, M Raykova, P Schoppmann, K Seth, K Yeo
30th USENIX Security Symposium (USENIX Security 21), 1811-1828, 2021
872021
Private stateful information retrieval
S Patel, G Persiano, K Yeo
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
702018
Symmetric searchable encryption with sharing and unsharing
S Patel, G Persiano, K Yeo
European Symposium on Research in Computer Security, 207-227, 2018
342018
Lower bounds for differentially private RAMs
G Persiano, K Yeo
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
332019
Dynamic volume-hiding encrypted multi-maps with applications to searchable encryption
G Amjad, S Patel, G Persiano, K Yeo, M Yung
Proceedings on Privacy Enhancing Technologies 2023 (1), 417–436, 2023
282023
Lower bounds for encrypted multi-maps and searchable encryption in the leakage cell probe model
S Patel, G Persiano, K Yeo
Annual International Cryptology Conference, 433-463, 2020
27*2020
Lower bounds for oblivious near-neighbor search
KG Larsen, T Malkin, O Weinstein, K Yeo
Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete …, 2020
242020
Lower bounds for multi-server oblivious RAMs
KG Larsen, M Simkin, K Yeo
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020
232020
Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume-Hiding Multi-Maps
A Bienstock, S Patel, JY Seo, K Yeo
32nd USENIX Security Symposium (USENIX Security 23), 301-318, 2023
212023
What Storage Access Privacy is Achievable with Small Overhead?
S Patel, G Persiano, K Yeo
Proceedings of the 38th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of …, 2019
212019
CacheShuffle: A family of oblivious shuffles
S Patel, G Persiano, K Yeo
45th International Colloquium on Automata, Languages, and Programming (ICALP …, 2018
21*2018
Lower bounds for (batch) PIR with private preprocessing
K Yeo
Annual International Conference on the Theory and Applications of …, 2023
172023
Cuckoo hashing in cryptography: Optimal parameters, robustness and applications
K Yeo
Annual International Cryptology Conference, 197-230, 2023
162023
Limits of preprocessing for single-server PIR
G Persiano, K Yeo
Proceedings of the 2022 Annual ACM-SIAM Symposium on Discrete Algorithms …, 2022
152022
Don’t be Dense: Efficient Keyword PIR for Sparse Databases
S Patel, JY Seo, K Yeo
32nd USENIX Security Symposium (USENIX Security 23), 3853-3870, 2023
132023
Efficient boolean search over encrypted data with reduced leakage
S Patel, G Persiano, JY Seo, K Yeo
International Conference on the Theory and Application of Cryptology and …, 2021
122021
SoK: SCT Auditing in Certificate Transparency
S Meiklejohn, J DeBlasio, D O'Brien, C Thompson, K Yeo, E Stark
Proceedings on Privacy Enhancing Technologies 2022 (3), 336–353, 2022
112022
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20