Resources‎ > ‎

Publications 2011-2013


Accuracy-Privacy Tradeoffs for Two-party Differentially Private Protocols

Vipul Goyal, Ilya Mironov, Omkant Pandey, and Amit Sahai.

CRYPTO 2013.


On Linear-Size Pseudorandom Generators and Hardcore Functions

Joshua Baron, Yuval Ishai, and Rafail Ostrovsky.

International Computing and Combinatorics Conference (COCOON) 2013.

(pdf download link provided below)

 

Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles

Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters.

Journal of Cryptology, Vol. 26(2), pp 340-373, April 2013.

(pdf download link provided below)

Quantize-Map-Forward (QMF) Relaying: an experimental study

M. Duarte, A. Sengupta, S. Brahma, C. Fragouli and S. Diggavi.

International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) 2013.

(pdf download link provided below)

Securing Broadcast Against Dishonest Receivers

Laszlo Czap, Vinod Prabhakaran, Suhas Diggavi and Christina Fragouli.

International Symposium on Network Coding (NetCod) 2013.

(pdf download link provided below)

Using Feedback for Secrecy over Graphs

Shaunak Mishra, Christina Fragouli, Vinod Prabhakaran, and Suhas Diggavi.

International Symposium on Information Theory (ISIT) 2013.


Minimax Control For Cyber-Physical Systems under Network Packet Scheduling Attacks

Yasser Shoukry, Jose Araujo, Paulo Tabuada, Mani Srivastava, and Karl H. Johansson.

Conference on High Confidence Networked Systems (HiCoNS) at CPS Week 2013.

(pdf download link provided below)

Noninvasive Spoofing Attacks For Anti-Lock Braking Systems

Yasser Shoukry, Paul Martin, Paulo Tabuada, and Mani Srivastava.

Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2013.

(pdf download link provided below)

Secure estimation and control for cyber-physical systems under adversarial attacks

Hamza Fawzi, Paulo Tabuada and Suhas Diggavi

Accepted for publication in the IEEE Transactions on Automatic Control.

(pdf download link provided below) 


On the Maximum Achievable Sum-Rate With Successive Decoding in Interference Channels

Zhao Yue, Wei Tan Chee, Salman Avestimehr, Suhas Diggavi, and Gregory Pottie.

IEEE Transactions on Information Theory, Volume 58 , Issue 6, June 2012 , Pages: 3798 - 3820.

(pdf download link provided below)

Adaptively Secure Multi-Party Computation with Dishonest Majority

Sanjam Garg and Amit Sahai. 

CRYPTO 2012 

(pdf download link provided below)

Almost-Everywhere Secure Computation with Edge Corruptions

N. Chandran, J. Garay and R. Ostrovsky.

International Colloquium on Automata, Languages and Programming (ICALP) 2012.

(pdf download link provided below)

Secure state-estimation for dynamical systems under active adversaries

Hamza Fawzi, Paulo Tabuada, and Suhas Diggavi.

Allerton Conference on Communication, Control, and Computing 2011.

(pdf download link provided below)

**For all material posted on this page: This material is presented to ensure timely dissemination of scholarly and technical work. All persons copying this material are expected to adhere to the terms and constraints invoked by the copyright holder. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
SelectionFile type iconFile nameDescriptionSizeRevisionTimeUser
Ċ
View Download
  315k v. 1 Aug 1, 2014, 2:43 PM admin uclacps
Ċ
View Download
  290k v. 1 Aug 1, 2014, 2:43 PM admin uclacps
Ċ
View Download
  457k v. 1 Aug 1, 2014, 2:43 PM admin uclacps
Ċ
View Download
  396k v. 1 Aug 1, 2014, 2:42 PM admin uclacps
Ċ
View Download
  636k v. 1 Aug 1, 2014, 2:42 PM admin uclacps
Ċ
View Download
  1139k v. 1 Aug 1, 2014, 2:42 PM admin uclacps
Ċ
View Download
  231k v. 1 Aug 1, 2014, 2:42 PM admin uclacps
Ċ
View Download
  1208k v. 1 Aug 1, 2014, 2:42 PM admin uclacps
Ċ
View Download
  484k v. 1 Aug 1, 2014, 2:42 PM admin uclacps
Ċ
View Download
  133k v. 1 Aug 1, 2014, 2:42 PM admin uclacps
Ċ
View Download
  441k v. 1 Aug 1, 2014, 2:42 PM admin uclacps
Comments