Volgen
Eu-Jin Goh
Eu-Jin Goh
Onbekend partnerschap
Geverifieerd e-mailadres voor cs.stanford.edu
Titel
Geciteerd door
Geciteerd door
Jaar
Evaluating 2-DNF formulas on ciphertexts
D Boneh, EJ Goh, K Nissim
Theory of cryptography conference, 325-341, 2005
20092005
Secure indexes
EJ Goh
Cryptology ePrint Archive, 2003
17012003
Hierarchical identity based encryption with constant size ciphertext
D Boneh, X Boyen, EJ Goh
Annual international conference on the theory and applications of …, 2005
16752005
On the effectiveness of address-space randomization
H Shacham, M Page, B Pfaff, EJ Goh, N Modadugu, D Boneh
Proceedings of the 11th ACM conference on Computer and communications …, 2004
12292004
SiRiUS: Securing Remote Untrusted Storage.
EJ Goh, H Shacham, N Modadugu, D Boneh
NDSS 3, 131-145, 2003
7772003
A signature scheme as secure as the Diffie-Hellman problem
EJ Goh, S Jarecki
International Conference on the Theory and Applications of Cryptographic …, 2003
1652003
Efficient signature schemes with tight reductions to the Diffie-Hellman problems
EJ Goh, S Jarecki, J Katz, N Wang
Journal of Cryptology 20 (4), 493-514, 2007
1022007
Secure function evaluation with ordered binary decision diagrams
L Kruger, S Jha, EJ Goh, D Boneh
Proceedings of the 13th ACM conference on Computer and communications …, 2006
792006
Method and apparatus for transparent encryption
D Boneh, R Chawla, A Frindell, EJ Goh, N Modadugu, P Tsirigotis
US Patent 7,757,278, 2010
772010
Encryption schemes from bilinear maps
EJ Goh
Stanford University, 2007
422007
The design and implementation of protocol-based hidden key recovery
EJ Goh, D Boneh, B Pinkas, P Golle
International Conference on Information Security, 165-179, 2003
342003
Covert channels in privacy-preserving identification systems
DV Bailey, D Boneh, EJ Goh, A Juels
Proceedings of the 14th ACM conference on Computer and communications …, 2007
222007
Delegation system for decryption rights
T Matsuo, D Boneh, EJ Goh
US Patent App. 11/894,448, 2008
212008
Event driven private counters
EJ Goh, P Golle
International Conference on Financial Cryptography and Data Security, 313-327, 2005
122005
Secure indexes
E jin Goh
In submission, 2004
92004
How to Search on Encrypted data
EJ Goh
slides available at http://crypto. stanford. edu/~ eujin/papers/secureindex …, 2003
32003
Searching on Encrypted Data
EJ Goh
2003
14th USENIX Security Symposium
P McDaniel, H Adkins, S Bellovin, D Boneh, P Chen, EJ Goh, T Jaeger, ...
DIMACS/PORTIA Workshop on Privacy-Preserving Data Mining
K Nissim, G Aggarwal, E Pontikakis, EJ Goh, YC Chang, M Naor
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–19