Jonathan Katz

Results: 377



#Item
1

vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases Yupeng Zhang∗ , Daniel Genkin†,∗ , Jonathan Katz∗ , Dimitrios Papadopoulos‡,∗ and Charalampos Papamanthou∗ ∗ University † Univers

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2017-03-20 14:40:46
    2

    vRAM: Faster Verifiable RAM With Program-Independent Preprocessing Yupeng Zhang∗ , Daniel Genkin† , ∗ , Jonathan Katz∗ , Dimitrios Papadopoulos‡ , ∗ and Charalampos Papamanthou∗ ∗ University † Universi

    Add to Reading List

    Source URL: web.eecs.umich.edu

    Language: English - Date: 2018-08-09 16:24:59
      3

      vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases Yupeng Zhang∗ , Daniel Genkin†,∗ , Jonathan Katz∗ , Dimitrios Papadopoulos‡,∗ and Charalampos Papamanthou∗ ∗ University † Univers

      Add to Reading List

      Source URL: www.cis.upenn.edu

      Language: English - Date: 2017-03-20 14:40:46
        4

        Including Children with Hearing Loss in Early Childhood Programs Laurie  Katz  and  Teris  K.  Schery   Jonathan is three years old and has a severe hearing loss. He wears hearing aids in both ears,

        Add to Reading List

        Source URL: www.infanthearing.org

        Language: English - Date: 2011-08-08 16:31:22
          5

          Byzantine Agreement with a Rational Adversary Adam Groce, Jonathan Katz? , Aishwarya Thiruvengadam, and Vassilis Zikas?? Department of Computer Science, University of Maryland {agroce,jkatz,aish,vzikas}@cs.umd.edu Abstr

          Add to Reading List

          Source URL: www.cs.rpi.edu

          Language: English - Date: 2012-07-09 12:52:40
            6

            Thinking about Cryptography: Crypto Flaws and How to Avoid Them Jonathan Katz Some good news and some bad news…

            Add to Reading List

            Source URL: cybersec-prod.s3.amazonaws.com

            - Date: 2016-12-05 15:17:30
              7

              Cryptography Resilient to Continual Memory Leakage Zvika Brakerski∗ Yael Tauman Kalai† Jonathan Katz‡

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2010-05-11 17:26:42
                8

                A Forward-Secure Public-Key Encryption Scheme∗ Ran Canetti† Shai Halevi† Jonathan Katz‡

                Add to Reading List

                Source URL: www.cs.umd.edu

                - Date: 2006-12-29 08:35:29
                  9Voting / Politics / Election technology / Electronic voting / Vote counting / Electoral systems / Elections / Voting machine / Ballot / Voting system / Election recount / Voter-verified paper audit trail

                  R. Michael Alvarez Jehoshua Bruck Jonathan Katz D. Roderick Kiewiet Thomas R. Palfrey

                  Add to Reading List

                  Source URL: www.vote.caltech.edu

                  Language: English
                  10Cryptography / Public-key cryptography / Communications protocol / Data transmission / Digital signature / Short Message Service / Adversary / Peer-to-peer / Secure multi-party computation

                  A Game-Theoretic Framework for Analyzing Trust-Inference Protocols∗ Ruggero Morselli† Jonathan Katz†

                  Add to Reading List

                  Source URL: zoo.cs.yale.edu

                  Language: English - Date: 2006-03-28 14:11:04
                  UPDATE