Follow
Mayank Varia
Mayank Varia
Boston University, Computing and Data Sciences
Verified email at bu.edu - Homepage
Title
Cited by
Cited by
Year
SoK: Cryptographically protected database search
B Fuller, M Varia, A Yerukhimovich, E Shen, A Hamlin, V Gadepally, ...
2017 IEEE Symposium on Security and Privacy (SP), 172-191, 2017
1672017
Conclave: secure multi-party computation on big data
N Volgushev, M Schwarzkopf, B Getchell, M Varia, A Lapets, A Bestavros
Proceedings of the Fourteenth EuroSys Conference 2019, 1-18, 2019
1652019
Obfuscation of hyperplane membership
R Canetti, GN Rothblum, M Varia
Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010
1242010
Computing on masked data: a high performance method for improving big data veracity
J Kepner, V Gadepally, P Michaleas, N Schear, M Varia, A Yerukhimovich, ...
2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014
1142014
On symmetric encryption and point obfuscation
R Canetti, Y Tauman Kalai, M Varia, D Wichs
Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010
912010
Principal inertia components and applications
F du Pin Calmon, A Makhdoumi, M Médard, M Varia, M Christiansen, ...
IEEE Transactions on Information Theory 63 (8), 5011-5038, 2017
842017
Accessible privacy-preserving web-based data analysis for assessing and addressing economic inequalities
A Lapets, F Jansen, KD Albab, R Issa, L Qin, M Varia, A Bestavros
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable …, 2018
642018
EasyUC: Using EasyCrypt to mechanize proofs of universally composable security
R Canetti, A Stoughton, M Varia
2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 167-183, 2019
622019
Privacy-Preserving Automated Exposure Notification
R Canetti, YT Kalai, A Lysyanskaya, RL Rivest, A Shamir, E Shen, ...
IACR Cryptol. ePrint Arch. 2020, 863, 2020
522020
Secure MPC for analytics as a web application
A Lapets, N Volgushev, A Bestavros, F Jansen, M Varia
2016 IEEE Cybersecurity Development (SecDev), 73-74, 2016
51*2016
User-centric distributed solutions for privacy-preserving analytics
A Bestavros, A Lapets, M Varia
Communications of the ACM 60 (2), 37-39, 2017
472017
The PACT protocol specification
RL Rivest, J Callas, R Canetti, K Esvelt, DK Gillmor, YT Kalai, ...
Private Automated Contact Tracing Team, MIT, Cambridge, MA, USA, Tech. Rep. 0.1, 2020
462020
Anonymous collocation discovery: Harnessing privacy to tame the coronavirus
R Canetti, A Trachtenberg, M Varia
arXiv e-prints, arXiv: 2003.13670, 2020
45*2020
Privacy with estimation guarantees
H Wang, L Vo, FP Calmon, M Médard, KR Duffy, M Varia
IEEE Transactions on Information Theory 65 (12), 8025-8042, 2019
442019
Callisto: A cryptographic approach to detecting serial perpetrators of sexual misconduct
A Rajan, L Qin, DW Archer, D Boneh, T Lepoint, M Varia
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable …, 2018
392018
Bounds on inference
FP Calmon, M Varia, M Médard, MM Christiansen, KR Duffy, S Tessaro
2013 51st Annual Allerton Conference on Communication, Control, and …, 2013
372013
The security of NTP’s datagram protocol
A Malhotra, M Van Gundy, M Varia, H Kennedy, J Gardner, S Goldberg
International Conference on Financial Cryptography and Data Security, 405-423, 2017
362017
Cryptography for Big Data Security
A Hamlin, N Schear, E Shen, M Varia, S Yakoubov, A Yerukhimovich
Big Data, 257-304, 2016
362016
Non-malleable obfuscation
R Canetti, M Varia
Theory of Cryptography Conference, 73-90, 2009
362009
HEtest: A homomorphic encryption testing framework
M Varia, S Yakoubov, Y Yang
International Conference on Financial Cryptography and Data Security, 213-230, 2015
332015
The system can't perform the operation now. Try again later.
Articles 1–20