default search action
Radu Sion
Person information
- affiliation: Stony Brook University, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2004
- [b1]Radu Sion:
Rights assessment for discrete digital data. Purdue University, USA, 2004
Journal Articles
- 2022
- [j31]Anrin Chakraborti, Reza Curtmola, Jonathan Katz, Jason Nieh, Ahmad-Reza Sadeghi, Radu Sion, Yinqian Zhang:
Cloud Computing Security: Foundations and Research Directions. Found. Trends Priv. Secur. 3(2): 103-213 (2022) - [j30]Chen Chen, Xiao Liang, Bogdan Carbunar, Radu Sion:
SoK: Plausibly Deniable Storage. Proc. Priv. Enhancing Technol. 2022(2): 132-151 (2022) - 2021
- [j29]Sumeet Bajaj, Anrin Chakraborti, Radu Sion:
ConcurDB: Concurrent Query Authentication for Outsourced Databases. IEEE Trans. Knowl. Data Eng. 33(4): 1401-1412 (2021) - 2020
- [j28]Anrin Chakraborti, Radu Sion:
SqORAM: Read-Optimized Sequential Write-Only Oblivious RAM. Proc. Priv. Enhancing Technol. 2020(1): 216-234 (2020) - [j27]Chen Chen, Anrin Chakraborti, Radu Sion:
INFUSE: Invisible plausibly-deniable file system for NAND flash. Proc. Priv. Enhancing Technol. 2020(4): 239-254 (2020) - 2019
- [j26]Chen Chen, Anrin Chakraborti, Radu Sion:
PD-DM: An efficient locality-preserving block device mapper with plausible deniability. Proc. Priv. Enhancing Technol. 2019(1): 153-171 (2019) - [j25]Moussa Ehsan, Karthiek Chandrasekaran, Yao Chen, Radu Sion:
Cost-Efficient Tasks and Data Co-Scheduling with AffordHadoop. IEEE Trans. Cloud Comput. 7(3): 719-732 (2019) - 2017
- [j24]Anrin Chakraborti, Chen Chen, Radu Sion:
DataLair: Efficient Block Storage with Plausible Deniability against Multi-Snapshot Adversaries. Proc. Priv. Enhancing Technol. 2017(3): 179 (2017) - 2016
- [j23]Sumeet Bajaj, Anrin Chakraborti, Radu Sion:
Practical Foundations of History Independence. IEEE Trans. Inf. Forensics Secur. 11(2): 303-312 (2016) - 2015
- [j22]Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, Radu Sion:
Introspections on the Semantic Gap. IEEE Secur. Priv. 13(2): 48-55 (2015) - 2014
- [j21]Sumeet Bajaj, Radu Sion:
TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality. IEEE Trans. Knowl. Data Eng. 26(3): 752-765 (2014) - [j20]Bogdan Carbunar, Radu Sion, Rahul Potharaju, Moussa Ehsan:
Private Badges for Geosocial Networks. IEEE Trans. Mob. Comput. 13(10): 2382-2396 (2014) - 2013
- [j19]Sumeet Bajaj, Radu Sion:
CorrectDB: SQL Engine with Practical Query Authentication. Proc. VLDB Endow. 6(7): 529-540 (2013) - [j18]Peter Williams, Radu Sion:
Access privacy and correctness on untrusted storage. ACM Trans. Inf. Syst. Secur. 16(3): 12 (2013) - 2012
- [j17]Yao Chen, Radu Sion:
On Securing Untrusted Clouds with Cryptography. IEEE Data Eng. Bull. 35(4): 9-20 (2012) - [j16]Radu Sion, Yao Chen:
Fighting Mallory the Insider: Strong Write-Once Read-Many Storage Assurances. IEEE Trans. Inf. Forensics Secur. 7(2): 755-764 (2012) - [j15]Bogdan Carbunar, Yao Chen, Radu Sion:
Tipping Pennies? Privately Practical Anonymous Micropayments. IEEE Trans. Inf. Forensics Secur. 7(5): 1628-1637 (2012) - [j14]Bogdan Carbunar, Radu Sion:
Toward Private Joins on Outsourced Data. IEEE Trans. Knowl. Data Eng. 24(9): 1699-1710 (2012) - 2011
- [j13]Bogdan Carbunar, Weidong Shi, Radu Sion:
Conditional e-payments with transferability. J. Parallel Distributed Comput. 71(1): 16-26 (2011) - [j12]Sumeet Bajaj, Radu Sion:
TrustedDB: A Trusted Hardware based Outsourced Database Engine. Proc. VLDB Endow. 4(12): 1359-1362 (2011) - [j11]Bogdan Carbunar, Radu Sion:
Write-Once Read-Many Oblivious RAM. IEEE Trans. Inf. Forensics Secur. 6(4): 1394-1403 (2011) - [j10]Peter Williams, Radu Sion, Miroslava Sotáková:
Practical Oblivious Outsourced Storage. ACM Trans. Inf. Syst. Secur. 14(2): 20:1-20:28 (2011) - 2010
- [j9]Jie Gao, Radu Sion, Sol Lederer:
Collaborative location certification for sensor networks. ACM Trans. Sens. Networks 6(4): 30:1-30:26 (2010) - 2009
- [j8]Siddharth Bhatt, Radu Sion, Bogdan Carbunar:
A personal mobile DRM manager for smartphones. Comput. Secur. 28(6): 327-340 (2009) - [j7]Ragib Hasan, Radu Sion, Marianne Winslett:
Preventing history forgery with secure provenance. ACM Trans. Storage 5(4): 12:1-12:43 (2009) - [j6]Ragib Hasan, Radu Sion, Marianne Winslett:
Secure Provenance: Protecting theGenealogy of Bits. login Usenix Mag. 34(3) (2009) - 2007
- [j5]Ramesh Natarajan, Radu Sion, Thomas Phan:
A grid-based approach for enterprise-scale data mining. Future Gener. Comput. Syst. 23(1): 48-54 (2007) - 2006
- [j4]Radu Sion, Mikhail J. Atallah, Sunil Prabhakar:
Rights Protection for Discrete Numeric Streams. IEEE Trans. Knowl. Data Eng. 18(5): 699-714 (2006) - 2005
- [j3]Radu Sion, Mikhail J. Atallah, Sunil Prabhakar:
Rights Protection for Categorical Data. IEEE Trans. Knowl. Data Eng. 17(7): 912-926 (2005) - 2004
- [j2]Mikhail J. Atallah, Sunil Prabhakar, Keith B. Frikken, Radu Sion:
Digital Rights Protection. IEEE Data Eng. Bull. 27(1): 19-25 (2004) - [j1]Radu Sion, Mikhail J. Atallah, Sunil Prabhakar:
Rights Protection for Relational Data. IEEE Trans. Knowl. Data Eng. 16(12): 1509-1525 (2004)
Conference and Workshop Papers
- 2024
- [c79]Sandeep Kiran Pinjala, Bogdan Carbunar, Anrin Chakraborti, Radu Sion:
INVISILINE: Invisible Plausibly-Deniable Storage. SP 2024: 2722-2739 - 2023
- [c78]Anrin Chakraborti, Darius Suciu, Radu Sion:
Wink: Deniable Secure Messaging. USENIX Security Symposium 2023: 1271-1288 - [c77]Yuzhou Feng, Ruyu Zhai, Radu Sion, Bogdan Carbunar:
A Study of China's Censorship and Its Evasion Through the Lens of Online Gaming. USENIX Security Symposium 2023: 2599-2616 - 2022
- [c76]Antonio Ken Iannillo, Sean Rivera, Darius Suciu, Radu Sion, Radu State:
An REE-independent Approach to Identify Callers of TEEs in TrustZone-enabled Cortex-M Devices. CPSS@AsiaCCS 2022: 85-94 - [c75]Darius Suciu, Radu Sion, Michael Ferdman:
AppBastion: Protection from Untrusted Apps and OSes on ARM. ESORICS (2) 2022: 692-715 - 2021
- [c74]Chen Chen, Anrin Chakraborti, Radu Sion:
PEARL: Plausibly Deniable Flash Translation Layer using WOM coding. USENIX Security Symposium 2021: 1109-1126 - 2020
- [c73]Radu Sion, Yinqian Zhang:
CCSW'20: 2020 Cloud Computing Security Workshop. CCS 2020: 2133-2134 - [c72]Jake Christensen, Ionut Mugurel Anghel, Rob Taglang, Mihai Chiroiu, Radu Sion:
DECAF: Automatic, Adaptive De-bloating and Hardening of COTS Firmware. USENIX Security Symposium 2020: 1713-1730 - [c71]Darius Suciu, Stephen E. McLaughlin, Laurent Simon, Radu Sion:
Horizontal Privilege Escalation in Trusted Applications. USENIX Security Symposium 2020 - 2019
- [c70]Yinqian Zhang, Radu Sion:
Speculative Execution Attacks and Cloud Security. CCSW 2019: 201 - [c69]Radu Sion, Charalampos Papamanthou:
CCSW'19 Workshop Summary: 2019 Cloud Computing Security Workshop. CCS 2019: 2693-2694 - [c68]Anrin Chakraborti, Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche, Radu Sion:
rORAM: Efficient Range ORAM with O(log2 N) Locality. NDSS 2019 - [c67]Anrin Chakraborti, Radu Sion:
ConcurORAM: High-Throughput Stateless Parallel Multi-Client ORAM. NDSS 2019 - 2018
- [c66]Jan Kasiak, Bogdan Carbunar, Jake Christensen, Maria Lyukova, Sumeet Bajaj, Mike Boruta, Radu Sion, Viorel Popescu, Alex Sorodoc, Gabriel Stan:
CipherLocker: Encrypted File Sharing with Ranked Search https: //cipherlocker.com. CCS 2018: 2234-2236 - 2017
- [c65]Anrin Chakraborti, Bhushan Jain, Jan Kasiak, Tao Zhang, Donald E. Porter, Radu Sion:
dm-x: Protecting Volume-level Integrity for Cloud Volumes and Local Block Devices. APSys 2017: 16:1-16:7 - [c64]Darius Andrei Suciu, Radu Sion:
Droidsentry: Efficient Code Integrity and Control Flow Verification on TrustZone Devices. CSCS 2017: 156-158 - 2016
- [c63]Anrin Chakraborti, Radu Sion:
POSTER: ConcurORAM: High-Throughput Parallel Multi-Client ORAM. CCS 2016: 1754-1756 - [c62]Anrin Chakraborti, Chen Chen, Radu Sion:
POSTER: DataLair: A Storage Block Device with Plausible Deniability. CCS 2016: 1757-1759 - [c61]Darius Suciu, Radu Sion:
POSTER: DroidShield: Protecting User Applications from Normal World Access. CCS 2016: 1760-1762 - [c60]Chen Chen, Darius Suciu, Radu Sion:
POSTER: KXRay: Introspecting the Kernel for Rootkit Timing Footprints. CCS 2016: 1781-1783 - 2015
- [c59]Chen Chen, Moussa Ehsan, Radu Sion:
Quantitative Musings on the Feasibility of Smartphone Clouds. CCGRID 2015: 535-544 - 2014
- [c58]Dongli Zhang, Moussa Ehsan, Michael Ferdman, Radu Sion:
DIMMer: A case for turning off DIMMs in clouds. SoCC 2014: 11:1-11:8 - [c57]Mirza Basim Baig, Connor Fitzsimons, Suryanarayanan Balasubramanian, Radu Sion, Donald E. Porter:
CloudFlow: Cloud-wide Policy Enforcement Using Fast VM Introspection. IC2E 2014: 159-164 - [c56]Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, Radu Sion:
SoK: Introspections on Trust and the Semantic Gap. IEEE Symposium on Security and Privacy 2014: 605-620 - 2013
- [c55]Sumeet Bajaj, Radu Sion:
HIFS: history independence for file systems. CCS 2013: 1285-1296 - [c54]Moussa Ehsan, Yao Chen, Hui Kang, Radu Sion, Jennifer L. Wong:
LiPS: A cost-efficient data and task co-scheduler for MapReduce. HiPC 2013: 49-58 - [c53]Radu Sion:
To cloud my big data or not to?: musings at the intersection of big data, intense computing and clouds. ScienceCloud@HPDC 2013: 3-4 - [c52]Sumeet Bajaj, Radu Sion:
Ficklebase: Looking into the future to erase the past. ICDE 2013: 86-97 - [c51]Moussa Ehsan, Radu Sion:
LiPS: A Cost-Efficient Data and Task Co-Scheduler for MapReduce. IPDPS Workshops 2013: 2230-2233 - [c50]Radu Sion:
To Cloud Or Not To? Musings on Clouds, Security and Big Data. Secure Data Management 2013: 3-5 - 2012
- [c49]Bogdan Carbunar, Radu Sion, Rahul Potharaju, Moussa Ehsan:
The Shy Mayor: Private Badges in GeoSocial Networks. ACNS 2012: 436-454 - [c48]Peter Williams, Radu Sion:
Single round access privacy on outsourced storage. CCS 2012: 293-304 - [c47]Peter Williams, Radu Sion, Alin Tomescu:
PrivateFS: a parallel oblivious file system. CCS 2012: 977-988 - 2011
- [c46]Rishab Nithyanand, Radu Sion, John Solis:
Poster: making the case for intrinsic personal physical unclonable functions (IP-PUFs). CCS 2011: 825-828 - [c45]Yao Chen, Radu Sion:
To cloud or not to cloud?: musings on costs and viability. SoCC 2011: 29 - [c44]Martin Franz, Peter Williams, Bogdan Carbunar, Stefan Katzenbeisser, Andreas Peter, Radu Sion, Miroslava Sotáková:
Oblivious Outsourced Storage with Delegation. Financial Cryptography 2011: 127-140 - [c43]Bogdan Carbunar, Radu Sion:
Private geosocial networking. GIS 2011: 365-368 - [c42]Hui Kang, Yao Chen, Jennifer L. Wong, Radu Sion, Jason Wu:
Enhancement of Xen's scheduler for MapReduce workloads. HPDC 2011: 251-262 - [c41]Sumeet Bajaj, Radu Sion:
TrustedDB: a trusted hardware based database with privacy and data confidentiality. SIGMOD Conference 2011: 205-216 - 2010
- [c40]Bogdan Carbunar, Radu Sion:
Regulatory Compliant Oblivious RAM. ACNS 2010: 456-474 - [c39]Bogdan Carbunar, Radu Sion:
Joining Privately on Outsourced Data. Secure Data Management 2010: 70-86 - [c38]Patrick D. McDaniel, Kevin R. B. Butler, Stephen E. McLaughlin, Radu Sion, Erez Zadok, Marianne Winslett:
Towards a Secure and Efficient System for End-to-End Provenance. TaPP 2010 - [c37]Heike Busch, Miroslava Sotáková, Stefan Katzenbeisser, Radu Sion:
The PUF Promise. TRUST 2010: 290-297 - [c36]Yao Chen, Radu Sion:
On securing untrusted clouds with cryptography. WPES 2010: 109-114 - 2009
- [c35]Ragib Hasan, Radu Sion, Marianne Winslett:
Remembrance: The Unbearable Sentience of Being Digital. CIDR 2009 - [c34]Ragib Hasan, Radu Sion, Marianne Winslett:
The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance. FAST 2009: 1-14 - [c33]Peter Williams, Radu Sion, Dennis E. Shasha:
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties. NDSS 2009 - [c32]Yao Chen, Radu Sion, Bogdan Carbunar:
XPay: practical anonymous payments for tor routing and other networked services. WPES 2009: 41-50 - 2008
- [c31]Peter Williams, Radu Sion, Bogdan Carbunar:
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. CCS 2008: 139-148 - [c30]Radu Sion:
Strong WORM. ICDCS 2008: 69-76 - [c29]Peter Williams, Radu Sion:
Usable PIR. NDSS 2008 - 2007
- [c28]Larry Shi, Bogdan Carbunar, Radu Sion:
Conditional E-Cash. Financial Cryptography 2007: 15-28 - [c27]Siddharth Bhatt, Bogdan Carbunar, Radu Sion, Venu Vasudevan:
Personal Digital Rights Management for Mobile Cellular Devices. Financial Cryptography 2007: 246 - [c26]Radu Sion, Bogdan Carbunar:
On the Practicality of Private Information Retrieval. NDSS 2007 - [c25]Ragib Hasan, Marianne Winslett, Radu Sion:
Requirements of Secure Storage Systems for Healthcare Records. Secure Data Management 2007: 174-180 - [c24]Ragib Hasan, Radu Sion, Marianne Winslett:
Introducing secure provenance: problems and challenges. StorageSS 2007: 13-18 - [c23]Radu Sion, Sumeet Bajaj, Bogdan Carbunar, Stefan Katzenbeisser:
NS2: Networked Searchable Store with Correctness. VLDB 2007: 1342-1345 - [c22]Radu Sion:
Secure Data Outsourcing. VLDB 2007: 1431-1432 - [c21]Radu Sion, Marianne Winslett:
Regulatory-Compliant Data Management. VLDB 2007: 1433-1434 - 2006
- [c20]Radu Sion:
Secure Data Outsourcing. COMAD 2006: 247 - [c19]Radu Sion, Ramesh Natarajan, Inderpal Narang, Thomas Phan:
XG: A Grid-Enabled Query Processing Engine. EDBT 2006: 1115-1120 - [c18]Bogdan Carbunar, Radu Sion:
Uncheatable Reputation for Distributed Computation Markets. Financial Cryptography 2006: 96-110 - 2005
- [c17]Radu Sion, Ramesh Natarajan, Inderpal Narang, Wen-Syan Li, Thomas Phan:
XG: A Data-Driven Computation Grid for Enterprise-Scale Mining. DEXA 2005: 828-837 - [c16]Radu Sion, Jun'ichi Tatemura:
Dynamic Stochastic Models for Workflow Response Optimization. ICWS 2005: 657-664 - [c15]Thomas Phan, Kavitha Ranganathan, Radu Sion:
Evolving Toward the Perfect Schedule: Co-scheduling Job Assignments and Data Replication in Wide-Area Systems Using a Genetic Algorithm. JSSPP 2005: 173-193 - [c14]Radu Sion:
Query Execution Assurance for Outsourced Databases. VLDB 2005: 601-612 - 2004
- [c13]Yi-Cheng Tu, Sunil Prabhakar, Ahmed K. Elmagarmid, Radu Sion:
QuaSAQ: An Approach to Enabling End-to-End QoS for Multimedia Databases. EDBT 2004: 694-711 - [c12]Radu Sion:
Proving Ownership over Categorical Data. ICDE 2004: 584-595 - [c11]Radu Sion, Mikhail J. Atallah, Sunil Prabhakar:
wmdb.: Rights Protection for Numeric Relational Data. ICDE 2004: 863 - [c10]Radu Sion, Mikhail J. Atallah:
Attacking digital watermarks. Security, Steganography, and Watermarking of Multimedia Contents 2004: 848-858 - [c9]Radu Sion, Mikhail J. Atallah, Sunil Prabhakar:
Resilient Rights Protection for Sensor Streams. VLDB 2004: 732-743 - 2003
- [c8]Radu Sion, Mikhail J. Atallah, Sunil Prabhakar:
On-the-fly Intrusion Detection for Web Portals. ITCC 2003: 325-330 - [c7]Radu Sion, Mikhail J. Atallah, Sunil Prabhakar:
Resilient Information Hiding for Abstract Semi-structures. IWDW 2003: 141-153 - [c6]Radu Sion, Mikhail J. Atallah, Sunil Prabhakar:
Rights Protection for Relational Data. SIGMOD Conference 2003: 98-109 - 2002
- [c5]Mikhail J. Atallah, Victor Raskin, Christian Hempelmann, Mercan Karahan, Radu Sion, Umut Topkara, Katrina E. Triezenberg:
Natural Language Watermarking and Tamperproofing. Information Hiding 2002: 196-212 - [c4]Radu Sion:
Power: A Metric for Evaluating Watermarking Algorithms. ITCC 2002: 95-99 - [c3]Radu Sion, Mikhail J. Atallah, Sunil Prabhakar:
On Watermarking Numeric Sets. IWDW 2002: 130-146 - [c2]Wen-Syan Li, Wang-Pin Hsiung, Dmitri V. Kalashnikov, Radu Sion, Oliver Po, Divyakant Agrawal, K. Selçuk Candan:
Issues and Evaluations of Caching Solutions for Web Application Acceleration. VLDB 2002: 1019-1030 - 2000
- [c1]Ladislau Bölöni, Kyungkoo Jun, Krzysztof Palacz, Radu Sion, Dan C. Marinescu:
The Bond Agent System and Applications. ASA/MA 2000: 99-112
Parts in Books or Collections
- 2014
- [p5]Yao Chen, Radu Sion:
Costs and Security in Clouds. Secure Cloud Computing 2014: 31-56 - 2008
- [p4]Radu Sion:
Towards Secure Data Outsourcing. Handbook of Database Security 2008: 137-161 - [p3]Radu Sion:
Database Watermarking for Copyright Protection. Handbook of Database Security 2008: 297-328 - [p2]Ragib Hasan, Marianne Winslett, Soumyadeb Mitra, Windsor W. Hsu, Radu Sion:
Trustworthy Records Retention. Handbook of Database Security 2008: 357-381 - 2007
- [p1]Radu Sion:
Rights Assessment for Relational Data. Secure Data Management in Decentralized Systems 2007: 427-457
Editorship
- 2020
- [e6]Yinqian Zhang, Radu Sion:
CCSW'20, Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop, Virtual Event, USA, November 9, 2020. ACM 2020, ISBN 978-1-4503-8084-3 [contents] - 2019
- [e5]Radu Sion, Charalampos Papamanthou:
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, CCSW@CCS 2019, London, UK, November 11, 2019. ACM 2019, ISBN 978-1-4503-6826-1 [contents] - 2010
- [e4]Adrian Perrig, Radu Sion:
Proceedings of the 2nd ACM Cloud Computing Security Workshop, CCSW 2010, Chicago, IL, USA, October 8, 2010. ACM 2010, ISBN 978-1-4503-0089-6 [contents] - [e3]Radu Sion:
Financial Cryptography and Data Security, 14th International Conference, FC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6052, Springer 2010, ISBN 978-3-642-14576-6 [contents] - [e2]Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, Francesc Sebé:
Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6054, Springer 2010, ISBN 978-3-642-14991-7 [contents] - 2009
- [e1]Radu Sion, Dawn Song:
Proceedings of the first ACM Cloud Computing Security Workshop, CCSW 2009, Chicago, IL, USA, November 13, 2009. ACM 2009, ISBN 978-1-60558-784-4 [contents]
Reference Works
- 2018
- [r10]Radu Sion:
Digital Rights Management. Encyclopedia of Database Systems (2nd ed.) 2018 - [r9]Radu Sion:
Steganography. Encyclopedia of Database Systems (2nd ed.) 2018 - [r8]Radu Sion:
Trusted Hardware. Encyclopedia of Database Systems (2nd ed.) 2018 - [r7]Radu Sion, Sumeet Bajaj:
Regulatory Compliance in Data Management. Encyclopedia of Database Systems (2nd ed.) 2018 - 2011
- [r6]Radu Sion:
Secure Data Outsourcing: A Brief Overview. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1105-1111 - 2010
- [r5]Radu Sion, Marianne Winslett:
Regulatory Compliance. Handbook of Financial Cryptography and Security 2010: 555-584 - 2009
- [r4]Radu Sion:
Digital Rights Management. Encyclopedia of Database Systems 2009: 825-830 - [r3]Radu Sion:
Regulatory Compliance in Data Management. Encyclopedia of Database Systems 2009: 2364-2368 - [r2]Radu Sion:
Steganography. Encyclopedia of Database Systems 2009: 2789-2790 - [r1]Radu Sion:
Trusted Hardware. Encyclopedia of Database Systems 2009: 3191-3192
Informal and Other Publications
- 2023
- [i13]Yuzhou Feng, Ruyu Zhai, Radu Sion, Bogdan Carbunar:
A Study of China's Censorship and Its Evasion Through the Lens of Online Gaming. CoRR abs/2308.02961 (2023) - 2022
- [i12]Anrin Chakraborti, Darius Suciu, Radu Sion:
Wink: Deniable Secure Messaging. CoRR abs/2207.08891 (2022) - 2021
- [i11]Chen Chen, Xiao Liang, Bogdan Carbunar, Radu Sion:
SoK: Plausibly Deniable Storage. CoRR abs/2111.12809 (2021) - [i10]Chen Chen, Xiao Liang, Bogdan Carbunar, Radu Sion:
SoK: Plausibly Deniable Storage. IACR Cryptol. ePrint Arch. 2021: 1547 (2021) - 2020
- [i9]Chen Chen, Anrin Chakraborti, Radu Sion:
PEARL: Plausibly Deniable Flash Translation Layer using WOM coding. CoRR abs/2009.02011 (2020) - 2018
- [i8]Anrin Chakraborti, Radu Sion:
ConcurORAM: High-Throughput Stateless Parallel Multi-Client ORAM. CoRR abs/1811.04366 (2018) - [i7]Anrin Chakraborti, Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche, Radu Sion:
Efficient Range ORAM with 핆(log2N) Locality. IACR Cryptol. ePrint Arch. 2018: 471 (2018) - 2017
- [i6]Anrin Chakraborti, Chen Chen, Radu Sion:
DataLair: Efficient Block Storage with Plausible Deniability against Multi-Snapshot Adversaries. CoRR abs/1706.10276 (2017) - [i5]Anrin Chakraborti, Radu Sion:
SeqORAM: A Locality-Preserving Write-Only Oblivious RAM. CoRR abs/1707.01211 (2017) - 2016
- [i4]Kristin E. Lauter, Radu Sion, Nigel P. Smart:
Modern Cryptography and Security: An Inter-Community Dialogue (Dagstuhl Seminar 16051). Dagstuhl Reports 6(1): 207-223 (2016) - 2015
- [i3]Sumeet Bajaj, Anrin Chakraborti, Radu Sion:
Practical Foundations of History Independence. CoRR abs/1501.06508 (2015) - [i2]Bo Chen, Radu Sion:
HiFlash: A History Independent Flash Device. CoRR abs/1511.05180 (2015) - 2009
- [i1]Ragib Hasan, Radu Sion, Marianne Winslett:
Remembrance: The Unbearable Sentience of Being Digital. CoRR abs/0909.1763 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint