Cryptography with One-Way CommunicationSanjam Garg, Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai CRYPTO 2015 (pdf download link provided below) Secure Computation from Leaky Correlated RandomnessDivya Gupta, Yuval Ishai, Hemanta K. Maji, Amit Sahai CRYPTO 2015 (pdf download link provided below) Locally Decodable Codes for Edit DistanceRafail Ostrovsky, Anat Paskin-Cherniavsky ICITS 2015 (pdf download link provided below) The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive FaultsNishanth Chandran, Wutichai Chongchitmate, Juan A. Garay, Shafi Goldwasser, Rafail Ostrovsky, Vassilis Zikas ITCS 2015 (pdf download link provided below) Secure state estimation and control using multiple (insecure) observersS. Mishra, N Karamchandani, P. Tabuada and S N. Diggavi CDC 2014 (pdf download link provided below) Secure State Estimation: Optimal Guarantees against Sensor Attacks in the Presence of NoiseShaunak Mishra, Yasser Shoukry Nikhil Karamchandani, Suhas Diggavi, Paulo Tabuada ISIT 2015 (pdf download link provided below) Sound and Complete State Estimation for Linear Dynamical Systems Under Sensor Attack Using Satisfiability Modulo Theory SolvingYasser Shoukry, Alberto Puggelli, Pierluigi Nuzzo, Alberto Sangiovanni-Vincentelli, Sanjit A. Seshia, and Paulo Tabuada ACC 2015 (pdf download link provided below) IMHOTEP-SMT: A Satisfiability Modulo Theory Solver For Secure State EstimationYasser Shoukry, Pierluigi Nuzzo, Alberto Puggelli, Alberto Sangiovanni-Vincentelli, Sanjit A. Seshia, Mani Srivastava,
and Paulo Tabuada SMT 2015 (pdf download link provided below) Optimal Coding for Streaming Authentication and Interactive CommunicationMatthew K. Franklin; Ran Gelles; Rafail Ostrovsky; Leonard J. Schulman IEEE Transactions on Information Theory 61(1): 133-145, 2015 (pdf download link provided below) Event-Triggered Projected Luenberger Observer for Linear Systems Under Sensor AttacksYasser Shoukry and Paulo Tabuada CDC 2014 (pdf download link provided below) Attack Detection and State Reconstruction in Differentially Flat Systems Under Sensor Attacks Using Satis- fiability Modulo Theory Solving.Yasser Shoukry, Pierluigi Nuzzo, Nicola Bezzo, Alberto Sangiovanni-Vincentelli, Sanjit A. Seshia, and Paulo Tabuada CDC 2015 AnonyCast: Privacy Preserving Location Distribution for Anonymous Crowd Tracking SystemsTakamasa Higuchi, Paul Martin, Supriyo Chakraborty, and Mani Srivastava ACM Ubicomp 2015 |
Resources >
Publications 2014-2015
Č

Updating...
Ċ
admin uclacps,
Jul 22, 2015, 12:46 PM
Ċ
admin uclacps,
Jul 27, 2015, 5:51 PM
Ċ
admin uclacps,
Jul 23, 2015, 1:28 PM
Ċ
admin uclacps,
Jul 22, 2015, 12:46 PM
Ċ
Optimal Coding for Streaming Authentication and Interactive Communication IEEE Tran IT 2015.pdf
(661k)
admin uclacps,
Jul 22, 2015, 12:47 PM
Ċ
admin uclacps,
Jul 22, 2015, 12:46 PM
Ċ
admin uclacps,
Jul 23, 2015, 1:28 PM
Ċ
admin uclacps,
Jul 22, 2015, 12:46 PM
Ċ
admin uclacps,
Jul 23, 2015, 1:28 PM
Ċ
admin uclacps,
Jul 22, 2015, 12:46 PM
Comments