Publication
Leakage-Resilient Signatures
Publication
Differential Privacy in New Settings
Publication
Pan-Private Streaming Algorithms
Publication
Mining Program Workflow from Interleaved Logs
Publication
Processing Sequential Sensor Data
Publication