[go: up one dir, main page]

Follow
T-H. Hubert Chan
T-H. Hubert Chan
Department of Computer Science, The University of Hong Kong
Verified email at cs.hku.hk
Title
Cited by
Cited by
Year
Path ORAM: an extremely simple oblivious RAM protocol
E Stefanov, M Dijk, E Shi, THH Chan, C Fletcher, L Ren, X Yu, S Devadas
Journal of the ACM (JACM) 65 (4), 1-26, 2018
14222018
Privacy-preserving aggregation of time-series data
E Shi, HTH Chan, E Rieffel, R Chow, D Song
Annual Network & Distributed System Security Symposium (NDSS), 2011
10132011
Multi-dimensional range query over encrypted data
E Shi, J Bethencourt, THH Chan, D Song, A Perrig
2007 IEEE Symposium on Security and Privacy (SP'07), 350-364, 2007
7552007
Private and continual release of statistics
THH Chan, E Shi, D Song
ACM Transactions on Information and System Security (TISSEC) 14 (3), 1-24, 2011
7032011
Oblivious RAM with O((logN)3) Worst-Case Cost
E Shi, THH Chan, E Stefanov, M Li
International Conference on The Theory and Application of Cryptology and …, 2011
5762011
Circuit oram: On tightness of the goldreich-ostrovsky lower bound
X Wang, H Chan, E Shi
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
4012015
Oblivious data structures
XS Wang, K Nayak, C Liu, THH Chan, E Shi, E Stefanov, Y Huang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
3002014
Privacy-preserving stream aggregation with fault tolerance
THH Chan, E Shi, D Song
International Conference on Financial Cryptography and Data Security, 200-214, 2012
2832012
SCORAM: oblivious RAM for secure computation
XS Wang, Y Huang, THH Chan, A Shelat, E Shi
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
2122014
Communication complexity of byzantine agreement, revisited
I Abraham, THH Chan, D Dolev, K Nayak, R Pass, L Ren, E Shi
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing …, 2019
1932019
On hierarchical routing in doubling metrics
THH Chan, A Gupta, BM Maggs, S Zhou
ACM Transactions on Algorithms (TALG) 12 (4), 1-22, 2016
1882016
How to vote privately using bitcoin
Z Zhao, THH Chan
International Conference on Information and Communications Security, 82-96, 2015
1702015
Optimal lower bound for differentially private multi-party aggregation
THH Chan, E Shi, D Song
European Symposium on Algorithms, 277-288, 2012
1552012
Differentially private continual monitoring of heavy hitters from distributed streams
THH Chan, M Li, E Shi, W Xu
International Symposium on Privacy Enhancing Technologies Symposium, 140-159, 2012
1552012
Spectral properties of hypergraph laplacian and approximation algorithms
THH Chan, A Louis, ZG Tang, C Zhang
Journal of the ACM (JACM) 65 (3), 1-48, 2018
1202018
Finding subgraphs with maximum total density and limited overlap
OD Balalau, F Bonchi, THH Chan, F Gullo, M Sozio
Proceedings of the Eighth ACM International Conference on Web Search and …, 2015
1142015
C∅ c∅: A framework for building composable zero-knowledge proofs
A Kosba, Z Zhao, A Miller, Y Qian, H Chan, C Papamanthou, R Pass, ...
Cryptology ePrint Archive, Report 2015/1093, 2015
1112015
Large scale density-friendly graph decomposition via convex programming
M Danisch, THH Chan, M Sozio
Proceedings of the 26th International Conference on World Wide Web, 233-242, 2017
1052017
A random-surfer web-graph model
A Blum, THH Chan, MR Rwebangira
2006 Proceedings of the Third Workshop on Analytic Algorithmics and …, 2006
1042006
Pala: A simple partially synchronous blockchain
THH Chan, R Pass, E Shi
Cryptology ePrint Archive, 2018
1022018
The system can't perform the operation now. Try again later.
Articles 1–20