A study of MAC address randomization in mobile devices and when it fails J Martin, T Mayberry, C Donahue, L Foppe, L Brown, C Riggins, EC Rye, ... arXiv preprint arXiv:1703.02874, 2017 | 293 | 2017 |
Scantegrity {II} Municipal Election at Takoma Park: The First {E2E} Binding Governmental Election with Ballot Privacy R Carback, D Chaum, J Clark, J Conway, A Essex, PS Herrnson, ... 19th USENIX Security Symposium (USENIX Security 10), 2010 | 149 | 2010 |
Efficient private file retrieval by combining ORAM and PIR T Mayberry, EO Blass, AH Chan Cryptology ePrint Archive, 2013 | 121 | 2013 |
Toward robust hidden volumes using write-only oblivious RAM EO Blass, T Mayberry, G Noubir, K Onarlioglu Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 84 | 2014 |
Constant communication ORAM with small blocksize T Moataz, T Mayberry, EO Blass Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 81 | 2015 |
Survey of cyber moving target techniques H Okhravi, MA Rabe, TJ Mayberry, WG Leonard, TR Hobson, D Bigelow, ... (No Title), 2013 | 76 | 2013 |
Handoff all your privacy: A review of apple's bluetooth low energy continuity protocol J Martin, D Alpuche, K Bodeman, L Brown, E Fenske, L Foppe, ... arXiv preprint arXiv:1904.10600, 2019 | 66 | 2019 |
Three years later: A study of mac address randomization in mobile devices and when it succeeds E Fenske, D Brown, J Martin, T Mayberry, P Ryan, E Rye Proceedings on Privacy Enhancing Technologies, 2021 | 60 | 2021 |
PIRMAP: Efficient private information retrieval for MapReduce T Mayberry, EO Blass, AH Chan Financial Cryptography and Data Security: 17th International Conference, FC …, 2013 | 59 | 2013 |
Survey of cyber moving targets H Okhravi, MA Rabe, TJ Mayberry, WG Leonard, TR Hobson, D Bigelow, ... Lincoln Laboratory-Massachusetts Institute of Technology Technical Report, 2013 | 54* | 2013 |
Deterministic, stash-free write-only oram DS Roche, A Aviv, SG Choi, T Mayberry Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 37 | 2017 |
Multi-client oblivious RAM secure against malicious servers EO Blass, T Mayberry, G Noubir Applied Cryptography and Network Security: 15th International Conference …, 2017 | 32* | 2017 |
Scantegrity mock election at Takoma Park AT Sherman, R Carback, D Chaum, J Clark, A Essex, PS Herrnson, ... Gesellschaft für Informatik eV, 2010 | 28* | 2010 |
rORAM: Efficient Range ORAM with O (log2 N) Locality. A Chakraborti, AJ Aviv, SG Choi, T Mayberry, DS Roche, R Sion NDSS, 2019 | 27 | 2019 |
Who tracks the trackers? circumventing apple's anti-tracking alerts in the find my network T Mayberry, E Fenske, D Brown, J Martin, C Fossaceca, EC Rye, S Teplov, ... Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic …, 2021 | 19 | 2021 |
Oblivisync: Practical oblivious file backup and synchronization AJ Aviv, SG Choi, T Mayberry, DS Roche arXiv preprint arXiv:1605.09779, 2016 | 17 | 2016 |
Scantegrity II election at takoma park RT Carback, D Chaum, J Clark, J Conway, A Essex, PS Hernson, ... USENIX Security Symposium 45, 141-142, 2010 | 13 | 2010 |
Chf-oram: a constant communication oram without homomorphic encryption T Moataz, EO Blass, T Mayberry Cryptology ePrint Archive, 2015 | 11 | 2015 |
Constant Communication ORAM without Encryption. T Moataz, EO Blass, T Mayberry IACR Cryptol. ePrint Arch. 2015, 1116, 2015 | 8 | 2015 |
Practical forward-secure range and sort queries with update-oblivious linked lists EO Blass, T Mayberry, G Noubir Proceedings on Privacy Enhancing Technologies, 2015 | 6 | 2015 |