Emily Shen

Hamlin, A., Schear, N., Shen, E., Varia, M., Yakoubov, S., Yerukhimovich, A., Cryptography for Big Data Security, Chapter in Big Data: Storage, Sharing, and Security, Fei Hu (editor), Auerbach Publications, May 3, 2016.
(Book Chapter)

Chase, M., Shen, E., Substring-Searchable Symmetric Encryption, Proceedings on Privacy Enhancing Technologies, vol. 2015, issue 2, pp. 263-281, June 2015.

Shen, E., Varia, M., Cunningham, R. K., Vesey, W. K., Cryptographically Secure Computation, IEEE Computer, vol. 48, no. 4, pp. 78-81, April 2015.
(Article)

S. Yakoubov, V. Gadepally, N. Schear, E. Shen and A. Yerukhimovich, A survey of cryptographic approaches to securing big-data analytics in the cloud, High Performance Extreme Computing Conference (HPEC), 2014 IEEE, 1-6, Sept 2014.
(Full Paper)

Bowers, K. D., Juels, A., Rivest, R. L., Shen, E., Drifting Keys: Impersonation Detection for Constrained Devices, IEEE International Conference on Computer Communications (INFOCOM) 2013.

Rivest, R. L., Shen, E.,  A Bayesian Method for Auditing Elections, Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE) 2012.

Magrino, T. R., Rivest, R. L., Shen, E., Wagner, D.,  Computing the Margin of Victory in IRV Elections, Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE) 2011.

Rivest, R. L., Shen, E., An Optimal Single-Winner Preferential Voting System Based on Game Theory, International Workshop on Computational Social Choice (COMSOC) 2010.

Carback, R., Chaum, D., Clark, J., Conway, J., Essex, A., Herrnson, P., Mayberry, T., Popoveniuc, S., Rivest, R. L., Shen, E., Sherman, A. T., Vora, P. L., Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy, USENIX Security Symposium 2010.

Sherman, A. T., Carback, R., Chaum, D., Clark, J., Essex, A., Herrnson, P., Mayberry, T., Popoveniuc, S., Rivest, R. L., Shen, E., Sinha, B., Vora, P., Scantegrity Mock Election at Takoma Park, International Conference on Electronic Voting (EVOTE) 2010.

Chaum, D., Carback, R., Clark, J., Essex, A., Popoveniuc, S., Rivest, R. L., Ryan, P. Y. A., Shen, E., Sherman, A. T., Vora, P. L., Scantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections through Confirmation Codes, IEEE Transactions on Information Forensics and Security, Vol. 4, No. 4, 2009, pp. 611-627.

Dodis, Y., Reyzin, L., Rivest, R. L., Shen, E., Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6, Fast Software Encryption (FSE) 2009.

Shen, E., Shi, E., Waters, B., Predicate Privacy in Encryption Systems, Theory of Cryptography Conference (TCC) 2009.

Chaum, D., Carback, R., Clark, J., Essex, A., Popoveniuc, S., Rivest, R. L., Ryan, P. Y. A., Shen, E., Sherman, A. T., Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems,  Electronic Voting Technology Workshop (EVT) 2008.

Boyen, X., Shacham, H., Shen, E., Waters, B., Forward Secure Signatures with Untrusted Update, ACM Conference on Computer and Communications Security (CCS) 2006.

Boneh, D., Shen, E., Waters, B., Strongly Unforgeable Signatures from Computational Diffie-Hellman, Public Key Cryptography (PKC) 2006.

top of page