BibTeX records: Jalaj Upadhyay

download as .bib file

@article{DBLP:journals/corr/abs-1805-03765,
  author    = {Vladimir Braverman and
               Petros Drineas and
               Jalaj Upadhyay and
               Samson Zhou},
  title     = {Numerical Linear Algebra in the Sliding Window Model},
  journal   = {CoRR},
  volume    = {abs/1805.03765},
  year      = {2018},
  url       = {http://arxiv.org/abs/1805.03765},
  archivePrefix = {arXiv},
  eprint    = {1805.03765},
  timestamp = {Mon, 04 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1805-03765},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SmithTU17,
  author    = {Adam D. Smith and
               Abhradeep Thakurta and
               Jalaj Upadhyay},
  title     = {Is Interaction Necessary for Distributed Private Learning?},
  booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
               CA, USA, May 22-26, 2017},
  pages     = {58--77},
  year      = {2017},
  crossref  = {DBLP:conf/sp/2017},
  url       = {https://doi.org/10.1109/SP.2017.35},
  doi       = {10.1109/SP.2017.35},
  timestamp = {Tue, 27 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/SmithTU17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Upadhyay16,
  author    = {Jalaj Upadhyay},
  title     = {Review of: Distributed Computing Through Combinatorial Topology by
               Maurice Herlihy and Dmitry Kozlov and Sergio Rajsbaum},
  journal   = {{SIGACT} News},
  volume    = {47},
  number    = {2},
  pages     = {18--20},
  year      = {2016},
  url       = {http://doi.acm.org/10.1145/2951860.2951867},
  doi       = {10.1145/2951860.2951867},
  timestamp = {Wed, 08 Jun 2016 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/sigact/Upadhyay16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/ChandranGMPU16,
  author    = {Nishanth Chandran and
               Vipul Goyal and
               Pratyay Mukherjee and
               Omkant Pandey and
               Jalaj Upadhyay},
  title     = {Block-Wise Non-Malleable Codes},
  booktitle = {43rd International Colloquium on Automata, Languages, and Programming,
               {ICALP} 2016, July 11-15, 2016, Rome, Italy},
  pages     = {31:1--31:14},
  year      = {2016},
  crossref  = {DBLP:conf/icalp/2016},
  url       = {https://doi.org/10.4230/LIPIcs.ICALP.2016.31},
  doi       = {10.4230/LIPIcs.ICALP.2016.31},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/ChandranGMPU16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PatersonSU16,
  author    = {Maura B. Paterson and
               Douglas R. Stinson and
               Jalaj Upadhyay},
  title     = {Multi-prover Proof-of-Retrievability},
  journal   = {CoRR},
  volume    = {abs/1603.02671},
  year      = {2016},
  url       = {http://arxiv.org/abs/1603.02671},
  archivePrefix = {arXiv},
  eprint    = {1603.02671},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/PatersonSU16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Upadhyay16,
  author    = {Jalaj Upadhyay},
  title     = {Fast and Space-optimal Low-rank Factorization in the Streaming Model
               With Application in Differential Privacy},
  journal   = {CoRR},
  volume    = {abs/1604.01429},
  year      = {2016},
  url       = {http://arxiv.org/abs/1604.01429},
  archivePrefix = {arXiv},
  eprint    = {1604.01429},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/Upadhyay16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Upadhyay16a,
  author    = {Jalaj Upadhyay},
  title     = {On Low-Space Differentially Private Low-rank Factorization in the
               Spectral Norm},
  journal   = {CoRR},
  volume    = {abs/1611.08954},
  year      = {2016},
  url       = {http://arxiv.org/abs/1611.08954},
  archivePrefix = {arXiv},
  eprint    = {1611.08954},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/Upadhyay16a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonSU16,
  author    = {Maura B. Paterson and
               Douglas R. Stinson and
               Jalaj Upadhyay},
  title     = {Multi-prover Proof-of-Retrievability},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {265},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/265},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/PatersonSU16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Upadhyay15,
  author    = {Jalaj Upadhyay},
  title     = {Integrity and Privacy of Large Data},
  school    = {University of Waterloo, Ontario, Canada},
  year      = {2015},
  url       = {http://hdl.handle.net/10012/10015},
  timestamp = {Thu, 01 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/phd/basesearch/Upadhyay15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranGMPU15,
  author    = {Nishanth Chandran and
               Vipul Goyal and
               Pratyay Mukherjee and
               Omkant Pandey and
               Jalaj Upadhyay},
  title     = {Block-wise Non-Malleable Codes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {129},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/129},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ChandranGMPU15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/StinsonU14,
  author    = {Douglas R. Stinson and
               Jalaj Upadhyay},
  title     = {Is extracting data the same as possessing data?},
  journal   = {J. Mathematical Cryptology},
  volume    = {8},
  number    = {2},
  pages     = {189--207},
  year      = {2014},
  url       = {https://doi.org/10.1515/jmc-2013-0034},
  doi       = {10.1515/jmc-2013-0034},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jmc/StinsonU14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Upadhyay14a,
  author    = {Jalaj Upadhyay},
  title     = {Differentially Private Linear Algebra in the Streaming Model},
  journal   = {CoRR},
  volume    = {abs/1409.5414},
  year      = {2014},
  url       = {http://arxiv.org/abs/1409.5414},
  archivePrefix = {arXiv},
  eprint    = {1409.5414},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/Upadhyay14a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Upadhyay14b,
  author    = {Jalaj Upadhyay},
  title     = {Circulant Matrices and Differential Privacy},
  journal   = {CoRR},
  volume    = {abs/1410.2470},
  year      = {2014},
  url       = {http://arxiv.org/abs/1410.2470},
  archivePrefix = {arXiv},
  eprint    = {1410.2470},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/Upadhyay14b},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Upadhyay14,
  author    = {Jalaj Upadhyay},
  title     = {Differentially Private Linear Algebra in the Streaming Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {730},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/730},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Upadhyay14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/PatersonSU13,
  author    = {Maura B. Paterson and
               Douglas R. Stinson and
               Jalaj Upadhyay},
  title     = {A coding theory foundation for the analysis of general unconditionally
               secure proof-of-retrievability schemes for cloud storage},
  journal   = {J. Mathematical Cryptology},
  volume    = {7},
  number    = {3},
  pages     = {183--216},
  year      = {2013},
  url       = {https://doi.org/10.1515/jmc-2013-5002},
  doi       = {10.1515/jmc-2013-5002},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jmc/PatersonSU13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Upadhyay13,
  author    = {Jalaj Upadhyay},
  title     = {Random Projections, Graph Sparsification, and Differential Privacy},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  pages     = {276--295},
  year      = {2013},
  crossref  = {DBLP:conf/asiacrypt/2013-1},
  url       = {https://doi.org/10.1007/978-3-642-42033-7\_15},
  doi       = {10.1007/978-3-642-42033-7\_15},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/Upadhyay13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Upadhyay13,
  author    = {Jalaj Upadhyay},
  title     = {Random Projections, Graph Sparsification, and Differential Privacy},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {580},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/580},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Upadhyay13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StinsonU13,
  author    = {Douglas R. Stinson and
               Jalaj Upadhyay},
  title     = {Is extracting data the same as possessing data?},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {614},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/614},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/StinsonU13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlackburnSU12,
  author    = {Simon R. Blackburn and
               Douglas R. Stinson and
               Jalaj Upadhyay},
  title     = {On the complexity of the herding attack and some related attacks on
               hash functions},
  journal   = {Des. Codes Cryptography},
  volume    = {64},
  number    = {1-2},
  pages     = {171--193},
  year      = {2012},
  url       = {https://doi.org/10.1007/s10623-010-9481-x},
  doi       = {10.1007/s10623-010-9481-x},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/BlackburnSU12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-7756,
  author    = {Maura B. Paterson and
               Douglas R. Stinson and
               Jalaj Upadhyay},
  title     = {A coding theory foundation for the analysis of general unconditionally
               secure proof-of-retrievability schemes for cloud storage},
  journal   = {CoRR},
  volume    = {abs/1210.7756},
  year      = {2012},
  url       = {http://arxiv.org/abs/1210.7756},
  archivePrefix = {arXiv},
  eprint    = {1210.7756},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1210-7756},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonSU12,
  author    = {Maura B. Paterson and
               Douglas R. Stinson and
               Jalaj Upadhyay},
  title     = {A coding theory foundation for the analysis of general unconditionally
               secure proof-of-retrievability schemes for cloud storage},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {611},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/611},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/PatersonSU12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackburnSU10,
  author    = {Simon R. Blackburn and
               Douglas R. Stinson and
               Jalaj Upadhyay},
  title     = {On the Complexity of the Herding Attack and Some Related Attacks on
               Hash Functions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {30},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/030},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BlackburnSU10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2017,
  title     = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
               CA, USA, May 22-26, 2017},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7957740},
  isbn      = {978-1-5090-5533-3},
  timestamp = {Tue, 27 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2016,
  editor    = {Ioannis Chatzigiannakis and
               Michael Mitzenmacher and
               Yuval Rabani and
               Davide Sangiorgi},
  title     = {43rd International Colloquium on Automata, Languages, and Programming,
               {ICALP} 2016, July 11-15, 2016, Rome, Italy},
  series    = {LIPIcs},
  volume    = {55},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik},
  year      = {2016},
  url       = {http://www.dagstuhl.de/dagpub/978-3-95977-013-2},
  isbn      = {978-3-95977-013-2},
  timestamp = {Tue, 30 Aug 2016 15:33:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2013-1,
  editor    = {Kazue Sako and
               Palash Sarkar},
  title     = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8269},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-42033-7},
  doi       = {10.1007/978-3-642-42033-7},
  isbn      = {978-3-642-42032-0},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2013-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier