Olga Ohrimenko
Olga Ohrimenko
Associate Professor, School of Computing and Information Systems, The University of Melbourne
No verified email
Cited by
Cited by
Oblivious {Multi-Party} machine learning on trusted processors
O Ohrimenko, F Schuster, C Fournet, A Mehta, S Nowozin, K Vaswani, ...
25th USENIX Security Symposium (USENIX Security 16), 619-636, 2016
Forward and backward private searchable encryption from constrained cryptographic primitives
R Bost, B Minaud, O Ohrimenko
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Strong and efficient cache {Side-Channel} protection using hardware transactional memory
D Gruss, J Lettner, F Schuster, O Ohrimenko, I Haller, M Costa
26th USENIX Security Symposium (USENIX Security 17), 217-233, 2017
Propagation via lazy clause generation
O Ohrimenko, PJ Stuckey, M Codish
Constraints 14, 357-391, 2009
Privacy-preserving group data access via stateless oblivious RAM simulation
MT Goodrich, M Mitzenmacher, O Ohrimenko, R Tamassia
Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete …, 2012
Oblivious RAM simulation with efficient worst-case access overhead
MT Goodrich, M Mitzenmacher, O Ohrimenko, R Tamassia
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 95-100, 2011
Structured encryption and leakage suppression
S Kamara, T Moataz, O Ohrimenko
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
Practical oblivious storage
MT Goodrich, M Mitzenmacher, O Ohrimenko, R Tamassia
Proceedings of the second ACM conference on Data and Application Security …, 2012
Observing and preventing leakage in MapReduce
O Ohrimenko, M Costa, C Fournet, C Gkantsidis, M Kohlweiss, D Sharma
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Propagation= lazy clause generation
O Ohrimenko, PJ Stuckey, M Codish
Principles and Practice of Constraint Programming–CP 2007: 13th …, 2007
Contamination attacks and mitigation in multi-party machine learning
J Hayes, O Ohrimenko
Advances in neural information processing systems 31, 2018
Analyzing information leakage of updates to natural language models
S Zanella-Béguelin, L Wutschitz, S Tople, V Rühle, A Paverd, ...
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
Hash first, argue later: Adaptive verifiable computations on outsourced data
D Fiore, C Fournet, E Ghosh, M Kohlweiss, O Ohrimenko, B Parno
Proceedings of the 2016 ACM SIGSAC Conference on computer and Communications …, 2016
Sorting and searching behind the curtain
F Baldimtsi, O Ohrimenko
Financial Cryptography and Data Security: 19th International Conference, FC …, 2015
The Melbourne shuffle: Improving oblivious storage in the cloud
O Ohrimenko, MT Goodrich, R Tamassia, E Upfal
Automata, Languages, and Programming: 41st International Colloquium, ICALP …, 2014
CCF: A framework for building confidential verifiable replicated services
M Russinovich, E Ashton, C Avanessians, M Castro, A Chamayou, ...
Technical Report MSR-TR-201916, 2019
Leakage of dataset properties in {Multi-Party} machine learning
W Zhang, S Tople, O Ohrimenko
30th USENIX security symposium (USENIX Security 21), 2687-2704, 2021
Haze: Privacy-preserving real-time traffic statistics
JWS Brown, O Ohrimenko, R Tamassia
Proceedings of the 21st ACM SIGSPATIAL international conference on advances …, 2013
An algorithmic framework for differentially private data analysis on trusted processors
J Allen, B Ding, J Kulkarni, H Nori, O Ohrimenko, S Yekhanin
Advances in Neural Information Processing Systems 32, 2019
Privacy-preserving machine learning
MSDS Costa, CAMC Fournet, A Mehta, S Nowozin, O Ohrimenko, ...
US Patent App. 15/245,141, 2017
The system can't perform the operation now. Try again later.
Articles 1–20