D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 68 Citations 25,936 232 World Ranking 1279 National Ranking 737

Overview

What is she best known for?

The fields of study she is best known for:

  • Operating system
  • Computer network
  • The Internet

Elaine Shi mainly investigates Computer security, Encryption, Cryptography, Theoretical computer science and Computer network. Her research in Encryption intersects with topics in Utility computing, Cloud computing security, Business intelligence and Flexibility. While the research belongs to areas of Cryptography, she spends her time largely on the problem of Information security, intersecting her research to questions surrounding Digital currency, Software deployment and Medical privacy.

Her Theoretical computer science study incorporates themes from Functional encryption, Plaintext, Probabilistic encryption, Data structure and Delegate. In her research, Oblivious ram is intimately related to Secure two-party computation, which falls under the overarching field of Data structure. In her research on the topic of Smart contract, Event, Cryptographic primitive, Financial transaction and Cryptographic protocol is strongly related with Cryptocurrency.

Her most cited work include:

  • The Sybil attack in sensor networks: analysis & defenses (1190 citations)
  • Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts (954 citations)
  • Controlling data in the cloud: outsourcing computation without outsourcing control (745 citations)

What are the main themes of her work throughout her whole career to date?

Her primary scientific interests are in Computer security, Theoretical computer science, Oblivious ram, Cryptography and Parallel computing. Her study on Computer security is mostly dedicated to connecting different topics, such as Internet privacy. Her work investigates the relationship between Theoretical computer science and topics such as Set that intersect with problems in State machine replication.

Her studies deal with areas such as Binary logarithm, Block and Bandwidth as well as Oblivious ram. Her Cryptography research includes themes of Compiler, Adversary, Model of computation, Hash function and Node. Her Parallel computing research incorporates themes from Secure multi-party computation and Computation.

She most often published in these fields:

  • Computer security (26.29%)
  • Theoretical computer science (22.84%)
  • Oblivious ram (21.55%)

What were the highlights of her more recent work (between 2019-2021)?

  • Theoretical computer science (22.84%)
  • Computer network (13.79%)
  • Binary logarithm (7.76%)

In recent papers she was focusing on the following fields of study:

Her scientific interests lie mostly in Theoretical computer science, Computer network, Binary logarithm, Sorting and Byzantine architecture. Her Theoretical computer science research includes elements of Private information retrieval, Turing machine, Set and Merge sort, Sorting algorithm. Elaine Shi has included themes like Communication complexity, Cryptography and Extension in her Computer network study.

Her study of Security parameter is a part of Cryptography. Her work deals with themes such as Oblivious ram, Model of computation, Upper and lower bounds and Compiler, which intersect with Binary logarithm. As part of the same scientific family, Elaine Shi usually focuses on Homomorphic encryption, concentrating on Parallel computing and intersecting with Overhead.

Between 2019 and 2021, her most popular works were:

  • OptORAMa: Optimal Oblivious RAM. (29 citations)
  • Streamlet: Textbook Streamlined Blockchains (19 citations)
  • Locally Decodable and Updatable Non-malleable Codes and Their Applications (6 citations)

In her most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer network

Elaine Shi focuses on Binary logarithm, Sorting, Byzantine architecture, Discrete mathematics and Theoretical computer science. Her research integrates issues of Oblivious ram, Upper and lower bounds, Compiler and Open problem in her study of Binary logarithm. Her Oblivious ram research is multidisciplinary, relying on both Randomized algorithm, Computational security and Logical address.

There are a combination of areas like Constant, Communication complexity, Asynchronous communication, Extension and Computer network integrated together with her Byzantine architecture study. The Theoretical computer science study combines topics in areas such as Private information retrieval, Value, Code word, Leakage resilience and Set. Her Task study integrates concerns from other disciplines, such as Security parameter and Cryptography.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts

Ahmed Kosba;Andrew Miller;Elaine Shi;Zikai Wen.
ieee symposium on security and privacy (2016)

2108 Citations

The Sybil attack in sensor networks: analysis & defenses

James Newsome;Elaine Shi;Dawn Song;Adrian Perrig.
information processing in sensor networks (2004)

2087 Citations

On Scaling Decentralized Blockchains

Kyle Croman;Christian Decker;Ittay Eyal;Adem Efe Gencer.
financial cryptography (2016)

1219 Citations

Controlling data in the cloud: outsourcing computation without outsourcing control

Richard Chow;Philippe Golle;Markus Jakobsson;Elaine Shi.
ieee international conference on cloud computing technology and science (2009)

1160 Citations

Path ORAM: An Extremely Simple Oblivious RAM Protocol.

Emil Stefanov;Marten van Dijk;Elaine Shi;Christopher W. Fletcher.
IACR Cryptology ePrint Archive (2013)

1035 Citations

Designing secure sensor networks

E. Shi;A. Perrig.
IEEE Wireless Communications (2004)

862 Citations

Bitter to Better — How to Make Bitcoin a Better Currency

Simon Barber;Xavier Boyen;Elaine Shi;Ersin Uzun.
financial cryptography (2012)

824 Citations

Multi-Dimensional Range Query over Encrypted Data

E. Shi;J. Bethencourt;T.-H.H. Chan;Dawn Song.
ieee symposium on security and privacy (2007)

716 Citations

The Honey Badger of BFT Protocols

Andrew Miller;Yu Xia;Kyle Croman;Elaine Shi.
computer and communications security (2016)

576 Citations

Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab

Kevin Delmolino;Mitchell Arnett;Ahmed E. Kosba;Andrew Miller;Andrew Miller.
financial cryptography (2016)

559 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Elaine Shi

Adrian Perrig

Adrian Perrig

ETH Zurich

Publications: 51

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 36

Wenjing Lou

Wenjing Lou

Virginia Tech

Publications: 33

Cong Wang

Cong Wang

City University of Hong Kong

Publications: 33

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 33

Prateek Saxena

Prateek Saxena

National University of Singapore

Publications: 28

Aggelos Kiayias

Aggelos Kiayias

University of Edinburgh

Publications: 27

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 26

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 26

Charalampos Papamanthou

Charalampos Papamanthou

Yale University

Publications: 26

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 25

Kui Ren

Kui Ren

Zhejiang University

Publications: 25

Srdjan Capkun

Srdjan Capkun

ETH Zurich

Publications: 24

Dan Boneh

Dan Boneh

Stanford University

Publications: 24

Amit Sahai

Amit Sahai

University of California, Los Angeles

Publications: 23

Jonathan Katz

Jonathan Katz

University of Maryland, College Park

Publications: 23

Trending Scientists

Carlos Henggeler Antunes

Carlos Henggeler Antunes

University of Coimbra

Lai-Man Po

Lai-Man Po

City University of Hong Kong

Jianjun Shi

Jianjun Shi

Georgia Institute of Technology

William J. Weber

William J. Weber

University of Tennessee at Knoxville

John D. Helmann

John D. Helmann

Cornell University

William E. Finch-Savage

William E. Finch-Savage

University of Warwick

Patrick Prunet

Patrick Prunet

INRAE : Institut national de recherche pour l'agriculture, l'alimentation et l'environnement

Eva-Mari Aro

Eva-Mari Aro

University of Turku

Jingshan Ren

Jingshan Ren

University of Oxford

Hartmut Laatsch

Hartmut Laatsch

University of Göttingen

Lora V. Hooper

Lora V. Hooper

The University of Texas Southwestern Medical Center

Isabelle Cremer

Isabelle Cremer

Sorbonne University

Nelson Cowan

Nelson Cowan

University of Missouri

Hans-Henrik Parving

Hans-Henrik Parving

University of Copenhagen

Philippe Armand

Philippe Armand

Harvard University

Miriam A. Golden

Miriam A. Golden

University of California, Los Angeles

Something went wrong. Please try again later.