Seuraa
Srinath Setty
Srinath Setty
Principal Researcher at Microsoft Research
Vahvistettu sähköpostiosoite verkkotunnuksessa microsoft.com - Kotisivu
Nimike
Viittaukset
Viittaukset
Vuosi
Airavat: Security and privacy for MapReduce
I Roy, STV Setty, A Kilzer, V Shmatikov, E Witchel
Proceedings of the 7th USENIX conference on Networked systems design and …, 2010
7002010
Depot: Cloud storage with minimal trust
P Mahajan, S Setty, S Lee, A Clement, L Alvisi, M Dahlin, M Walfish
ACM Transactions on Computer Systems (TOCS) 29 (4), 1-38, 2011
4172011
Depot: Cloud storage with minimal trust
P Mahajan, S Setty, S Lee, A Clement, L Alvisi, M Dahlin, M Walfish
USENIX Symposium on Operating Systems Design and Implementation, OSDI 2010 …, 2011
4172011
IronFleet: proving practical distributed systems correct
C Hawblitzel, J Howell, M Kapritsos, JR Lorch, B Parno, ML Roberts, ...
Proceedings of the 25th Symposium on Operating Systems Principles, 1-17, 2015
4122015
PIR with compressed queries and amortized query processing
S Angel, H Chen, K Laine, S Setty
IEEE Symposium on Security and Privacy, 2018
2252018
Verifying computations with state
B Braun, AJ Feldman, Z Ren, S Setty, AJ Blumberg, M Walfish
ACM Symposium on Operating Systems Principles, 2013
2202013
Spartan: Efficient and general-purpose zkSNARKs without trusted setup
S Setty
2152019
Making Argument Systems for Outsourced Computation Practical (Sometimes)
S Setty, R McPherson, AJ Blumberg, M Walfish
NDSS 2012, 2012
2102012
Taking proof-based verified computation a few steps closer to practicality
S Setty, V Vu, N Panpalia, B Braun, AJ Blumberg, M Walfish
USENIX Security Symposium 2012, 2012
2082012
Taking proof-based verified computation a few steps closer to practicality
S Setty, V Vu, N Panpalia, B Braun, AJ Blumberg, M Walfish
21st {USENIX} Security Symposium ({USENIX} Security 12), 253-268, 2012
2082012
Efficient RAM and control flow in verifiable outsourced computation
RS Wahby, S Setty, Z Ren, AJ Blumberg, M Walfish
NDSS 2015, 2015
2052015
A hybrid architecture for interactive verifiable computation
V Vu, S Setty, AJ Blumberg, M Walfish
IEEE Symposium on Security and Privacy, 2013
1812013
Unobservable communication over fully untrusted infrastructure
S Angel, S Setty
Proceedings of the 12th Symposium on Operating Systems Design and …, 2016
1732016
Vale: Verifying high-performance cryptographic assembly code
B Bond, C Hawblitzel, M Kapritsos, KRM Leino, JR Lorch, B Parno, ...
26th {USENIX} Security Symposium ({USENIX} Security 17), 917-934, 2017
1702017
Resolving the conflict between generality and plausibility in verified computation
S Setty, B Braun, V Vu, AJ Blumberg, B Parno, M Walfish
ACM European Conference on Computer Systems, EuroSys 2013, 2012
1562012
Scalable and private media consumption with Popcorn
T Gupta, N Crooks, W Mulhern, S Setty, L Alvisi, M Walfish
Symposium on Networked Systems Design and Implementation (NSDI), 2016
1172016
Verifiable outsourced ledgers
S Setty, R Venkatesan
US Patent 10,587,628, 2020
1062020
Byzantine Ordered Consensus without Byzantine Oligarchy
Y Zhang, S Setty, Q Chen, L Zhou, L Alvisi
14th {USENIX} Symposium on Operating Systems Design and Implementation …, 2020
762020
Toward practical and unconditional verification of remote computations
S Setty, AJ Blumberg, M Walfish
Proc. of HotOS Workshop, 1-5, 2011
722011
IronFleet: proving safety and liveness of practical distributed systems
C Hawblitzel, J Howell, M Kapritsos, JR Lorch, B Parno, ML Roberts, ...
Communications of the ACM 60 (7), 83-92, 2017
652017
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20