Follow
Olga Ohrimenko
Olga Ohrimenko
Associate Professor, School of Computing and Information Systems, The University of Melbourne
Verified email at unimelb.edu.au - Homepage
Title
Cited by
Cited by
Year
Oblivious {Multi-Party} machine learning on trusted processors
O Ohrimenko, F Schuster, C Fournet, A Mehta, S Nowozin, K Vaswani, ...
25th USENIX Security Symposium (USENIX Security 16), 619-636, 2016
6732016
Forward and backward private searchable encryption from constrained cryptographic primitives
R Bost, B Minaud, O Ohrimenko
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
4562017
Strong and efficient cache {Side-Channel} protection using hardware transactional memory
D Gruss, J Lettner, F Schuster, O Ohrimenko, I Haller, M Costa
26th USENIX Security Symposium (USENIX Security 17), 217-233, 2017
3302017
Propagation via lazy clause generation
O Ohrimenko, PJ Stuckey, M Codish
Constraints 14, 357-391, 2009
3142009
Privacy-preserving group data access via stateless oblivious RAM simulation
MT Goodrich, M Mitzenmacher, O Ohrimenko, R Tamassia
Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete …, 2012
2812012
Oblivious RAM simulation with efficient worst-case access overhead
MT Goodrich, M Mitzenmacher, O Ohrimenko, R Tamassia
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 95-100, 2011
1762011
Structured encryption and leakage suppression
S Kamara, T Moataz, O Ohrimenko
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
1352018
Analyzing information leakage of updates to natural language models
S Zanella-Béguelin, L Wutschitz, S Tople, V Rühle, A Paverd, ...
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
1262020
Observing and preventing leakage in MapReduce
O Ohrimenko, M Costa, C Fournet, C Gkantsidis, M Kohlweiss, D Sharma
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1092015
Practical oblivious storage
MT Goodrich, M Mitzenmacher, O Ohrimenko, R Tamassia
Proceedings of the second ACM conference on Data and Application Security …, 2012
1082012
Propagation= lazy clause generation
O Ohrimenko, PJ Stuckey, M Codish
Principles and Practice of Constraint Programming–CP 2007: 13th …, 2007
1052007
Contamination attacks and mitigation in multi-party machine learning
J Hayes, O Ohrimenko
Advances in neural information processing systems 31, 2018
1012018
Leakage of dataset properties in {Multi-Party} machine learning
W Zhang, S Tople, O Ohrimenko
30th USENIX security symposium (USENIX Security 21), 2687-2704, 2021
96*2021
Hash first, argue later: Adaptive verifiable computations on outsourced data
D Fiore, C Fournet, E Ghosh, M Kohlweiss, O Ohrimenko, B Parno
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
952016
The Melbourne shuffle: Improving oblivious storage in the cloud
O Ohrimenko, MT Goodrich, R Tamassia, E Upfal
Automata, Languages, and Programming: 41st International Colloquium, ICALP …, 2014
882014
CCF: A framework for building confidential verifiable replicated services
M Russinovich, E Ashton, C Avanessians, M Castro, A Chamayou, ...
Microsoft, Redmond, WA, USA, Tech. Rep. MSR-TR-2019-16, 2019
842019
Sorting and searching behind the curtain
F Baldimtsi, O Ohrimenko
Financial Cryptography and Data Security: 19th International Conference, FC …, 2015
832015
Privacy-preserving machine learning
MSDS Costa, CAMC Fournet, A Mehta, S Nowozin, O Ohrimenko, ...
US Patent App. 15/245,141, 2017
552017
Haze: Privacy-preserving real-time traffic statistics
JWS Brown, O Ohrimenko, R Tamassia
Proceedings of the 21st ACM SIGSPATIAL international conference on advances …, 2013
482013
Advancing differential privacy: Where we are now and future directions for real-world deployment
R Cummings, D Desfontaines, D Evans, R Geambasu, Y Huang, ...
arXiv preprint arXiv:2304.06929, 2023
47*2023
The system can't perform the operation now. Try again later.
Articles 1–20