default search action
Andrei Lapets
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i10]Andrei Lapets:
Implementing Arbitrary Maps over Small Finite Domains using Ring Addition and Scalar Multiplication. IACR Cryptol. ePrint Arch. 2023: 1695 (2023) - [i9]Miguel de Vega, Andrei Lapets, Stanislaw Jarecki, Wicher Malten, Mehmet Ugurbil, Wyatt Howe:
Evaluation of Arithmetic Sum-of-Products Expressions in Linear Secret Sharing Schemes with a Non-Interactive Computation Phase. IACR Cryptol. ePrint Arch. 2023: 1740 (2023) - 2022
- [i8]Wyatt Howe, Andrei Lapets, Frederick Jansen, Tanner Braun, Ben Getchell:
Asynchronous Delegated Private Set Intersection with Hiding of Intersection Size. IACR Cryptol. ePrint Arch. 2022: 1778 (2022) - 2021
- [i7]Wyatt Howe, Andrei Lapets:
Privacy-Preserving Privacy Profile Proposal Protocol. IACR Cryptol. ePrint Arch. 2021: 6 (2021) - 2020
- [i6]Andrei Lapets, Wyatt Howe, Ben Getchell, Frederick Jansen:
An Embedded Domain-Specific Language for Logical Circuit Descriptions with Applications to Garbled Circuits. IACR Cryptol. ePrint Arch. 2020: 1604 (2020)
2010 – 2019
- 2019
- [c20]Nikolaj Volgushev, Malte Schwarzkopf, Ben Getchell, Mayank Varia, Andrei Lapets, Azer Bestavros:
Conclave: secure multi-party computation on big data. EuroSys 2019: 3:1-3:18 - [c19]Kinan Dak Albab, Rawane Issa, Andrei Lapets, Peter Flockhart, Lucy Qin, Ira Globus-Harris:
Tutorial: Deploying Secure Multi-Party Computation on the Web Using JIFF. SecDev 2019: 3 - [c18]Andrei Lapets, Kinan Dak Albab, Rawane Issa, Lucy Qin, Mayank Varia, Azer Bestavros, Frederick Jansen:
Role-Based Ecosystem for the Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications. SecDev 2019: 129-140 - [c17]Lucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, Ira Globus-Harris, Shannon Roberts, Mayank Varia:
From Usability to Secure Computing and Back Again. SOUPS @ USENIX Security Symposium 2019 - [i5]Nikolaj Volgushev, Malte Schwarzkopf, Ben Getchell, Mayank Varia, Andrei Lapets, Azer Bestavros:
Conclave: secure multi-party computation on big data (extended TR). CoRR abs/1902.06288 (2019) - [i4]Lucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, Ira Globus-Harris, Shannon Roberts, Mayank Varia:
From Usability to Secure Computing and Back Again. IACR Cryptol. ePrint Arch. 2019: 734 (2019) - 2018
- [c16]Andrei Lapets, Frederick Jansen, Kinan Dak Albab, Rawane Issa, Lucy Qin, Mayank Varia, Azer Bestavros:
Accessible Privacy-Preserving Web-Based Data Analysis for Assessing and Addressing Economic Inequalities. COMPASS 2018: 48:1-48:5 - 2017
- [j4]Azer Bestavros, Andrei Lapets, Mayank Varia:
User-centric distributed solutions for privacy-preserving analytics. Commun. ACM 60(2): 37-39 (2017) - [c15]Kinan Dak Albab, Rawane Issa, Andrei Lapets, Azer Bestavros, Nikolaj Volgushev:
Scalable Secure Multi-party Network Vulnerability Analysis via Symbolic Optimization. IEEE Symposium on Security and Privacy Workshops 2017: 211-216 - [c14]Frederick Jansen, Kinan Dak Albab, Andrei Lapets, Mayank Varia:
Brief Announcement: Federated Code Auditing and Delivery for MPC. SSS 2017: 298-302 - [i3]Andrei Lapets, Mayank Varia, Azer Bestavros, Frederick Jansen:
Role-Based Ecosystem Model for Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications. IACR Cryptol. ePrint Arch. 2017: 803 (2017) - 2016
- [c13]Nikolaj Volgushev, Malte Schwarzkopf, Andrei Lapets, Mayank Varia, Azer Bestavros:
DEMO: Integrating MPC in Big Data Workflows. CCS 2016: 1844-1846 - [c12]Andrei Lapets, Nikolaj Volgushev, Azer Bestavros, Frederick Jansen, Mayank Varia:
Secure MPC for Analytics as a Web Application. SecDev 2016: 73-74 - [i2]Nikolaj Volgushev, Malte Schwarzkopf, Andrei Lapets, Mayank Varia, Azer Bestavros:
DEMO: Integrating MPC in Big Data Workflows. IACR Cryptol. ePrint Arch. 2016: 883 (2016) - 2015
- [c11]Nikolaj Volgushev, Andrei Lapets, Azer Bestavros:
Programming Support for an Integrated Multi-Party Computation and MapReduce Infrastructure. HotWeb 2015: 60-66 - 2014
- [c10]Richard Skowyra, Andrei Lapets, Azer Bestavros, Assaf J. Kfoury:
A Verification Platform for SDN-Enabled Applications. IC2E 2014: 337-342 - 2013
- [j3]Azer Bestavros, Assaf J. Kfoury, Andrei Lapets:
Postlude: seamless composition and integration - a perspective on formal methods research. Math. Struct. Comput. Sci. 23(4): 934-943 (2013) - [c9]Richard William Skowyra, Andrei Lapets, Azer Bestavros, Assaf J. Kfoury:
Verifiably-safe software-defined networks for CPS. HiCoNS 2013: 101-110 - [c8]Andrei Lapets, Marcus P. da Silva, Mike Thome, Aaron Adler, Jacob Beal, Martin Roetteler:
QuaFL: a typed DSL for quantum programming. FPCDSL@ICFP 2013: 19-26 - [c7]Andrei Lapets, Martin Roetteler:
Abstract resource cost derivation for logical quantum circuit descriptions. FPCDSL@ICFP 2013: 35-42 - [c6]Andrei Lapets, Richard Skowyra, Azer Bestavros, Assaf J. Kfoury:
Towards accessible integration and deployment of formal tools and techniques. TOPI@ICSE 2013: 19-24 - 2012
- [j2]Dóra Erdös, Vatche Ishakian, Andrei Lapets, Evimaria Terzi, Azer Bestavros:
The Filter-Placement Problem and its Application to Minimizing Information Multiplicity. Proc. VLDB Endow. 5(5): 418-429 (2012) - [i1]Dóra Erdös, Vatche Ishakian, Andrei Lapets, Evimaria Terzi, Azer Bestavros:
The Filter-Placement Problem and its Application to Minimizing Information Multiplicity. CoRR abs/1201.6565 (2012) - 2011
- [c5]Nate Soule, Azer Bestavros, Assaf J. Kfoury, Andrei Lapets:
Safe Compositional Equation-based Modeling of Constrained Flow Networks. EOOLT 2011: 35-44 - [c4]Vatche Ishakian, Andrei Lapets, Azer Bestavros, Assaf J. Kfoury:
Formal Verification of SLA Transformations. SERVICES 2011: 540-547 - 2010
- [j1]Kevin Donnelly, Assaf J. Kfoury, Andrei Lapets:
The Complexity of Restricted Variants of the Stable Paths Problem. Fundam. Informaticae 103(1-4): 69-87 (2010) - [c3]Andrei Lapets:
User-friendly Support for Common Mathematical Concepts in a Lightweight Verifier. VERIFY@IJCAR 2010: 94-109 - [c2]Azer Bestavros, Assaf J. Kfoury, Andrei Lapets, Michael J. Ocean:
Safe compositional network sketches: formal framework. HSCC 2010: 231-241 - [c1]Andrei Lapets, Assaf J. Kfoury:
A User-friendly Interface for a Lightweight Verification System. UITP 2010: 29-41
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint