H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 66 Citations 25,011 160 World Ranking 1102 National Ranking 647

Overview

What is she best known for?

The fields of study she is best known for:

  • Operating system
  • Computer network
  • The Internet

Elaine Shi mainly investigates Computer security, Encryption, Cryptography, Theoretical computer science and Computer network. Her research in Encryption intersects with topics in Utility computing, Cloud computing security, Business intelligence and Flexibility. While the research belongs to areas of Cryptography, she spends her time largely on the problem of Information security, intersecting her research to questions surrounding Digital currency, Software deployment and Medical privacy.

Her Theoretical computer science study incorporates themes from Functional encryption, Plaintext, Probabilistic encryption, Data structure and Delegate. In her research, Oblivious ram is intimately related to Secure two-party computation, which falls under the overarching field of Data structure. In her research on the topic of Smart contract, Event, Cryptographic primitive, Financial transaction and Cryptographic protocol is strongly related with Cryptocurrency.

Her most cited work include:

  • The Sybil attack in sensor networks: analysis & defenses (1190 citations)
  • Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts (954 citations)
  • Controlling data in the cloud: outsourcing computation without outsourcing control (745 citations)

What are the main themes of her work throughout her whole career to date?

Her primary scientific interests are in Computer security, Theoretical computer science, Oblivious ram, Cryptography and Parallel computing. Her study on Computer security is mostly dedicated to connecting different topics, such as Internet privacy. Her work investigates the relationship between Theoretical computer science and topics such as Set that intersect with problems in State machine replication.

Her studies deal with areas such as Binary logarithm, Block and Bandwidth as well as Oblivious ram. Her Cryptography research includes themes of Compiler, Adversary, Model of computation, Hash function and Node. Her Parallel computing research incorporates themes from Secure multi-party computation and Computation.

She most often published in these fields:

  • Computer security (26.29%)
  • Theoretical computer science (22.84%)
  • Oblivious ram (21.55%)

What were the highlights of her more recent work (between 2019-2021)?

  • Theoretical computer science (22.84%)
  • Computer network (13.79%)
  • Binary logarithm (7.76%)

In recent papers she was focusing on the following fields of study:

Her scientific interests lie mostly in Theoretical computer science, Computer network, Binary logarithm, Sorting and Byzantine architecture. Her Theoretical computer science research includes elements of Private information retrieval, Turing machine, Set and Merge sort, Sorting algorithm. Elaine Shi has included themes like Communication complexity, Cryptography and Extension in her Computer network study.

Her study of Security parameter is a part of Cryptography. Her work deals with themes such as Oblivious ram, Model of computation, Upper and lower bounds and Compiler, which intersect with Binary logarithm. As part of the same scientific family, Elaine Shi usually focuses on Homomorphic encryption, concentrating on Parallel computing and intersecting with Overhead.

Between 2019 and 2021, her most popular works were:

  • OptORAMa: Optimal Oblivious RAM. (29 citations)
  • Streamlet: Textbook Streamlined Blockchains (19 citations)
  • Locally Decodable and Updatable Non-malleable Codes and Their Applications (6 citations)

In her most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer network

Elaine Shi focuses on Binary logarithm, Sorting, Byzantine architecture, Discrete mathematics and Theoretical computer science. Her research integrates issues of Oblivious ram, Upper and lower bounds, Compiler and Open problem in her study of Binary logarithm. Her Oblivious ram research is multidisciplinary, relying on both Randomized algorithm, Computational security and Logical address.

There are a combination of areas like Constant, Communication complexity, Asynchronous communication, Extension and Computer network integrated together with her Byzantine architecture study. The Theoretical computer science study combines topics in areas such as Private information retrieval, Value, Code word, Leakage resilience and Set. Her Task study integrates concerns from other disciplines, such as Security parameter and Cryptography.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

The Sybil attack in sensor networks: analysis & defenses

James Newsome;Elaine Shi;Dawn Song;Adrian Perrig.
information processing in sensor networks (2004)

1917 Citations

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts

Ahmed Kosba;Andrew Miller;Elaine Shi;Zikai Wen.
ieee symposium on security and privacy (2016)

1705 Citations

Controlling data in the cloud: outsourcing computation without outsourcing control

Richard Chow;Philippe Golle;Markus Jakobsson;Elaine Shi.
ieee international conference on cloud computing technology and science (2009)

1116 Citations

On Scaling Decentralized Blockchains

Kyle Croman;Christian Decker;Ittay Eyal;Adem Efe Gencer.
financial cryptography (2016)

833 Citations

Designing secure sensor networks

E. Shi;A. Perrig.
IEEE Wireless Communications (2004)

792 Citations

Bitter to Better — How to Make Bitcoin a Better Currency

Simon Barber;Xavier Boyen;Elaine Shi;Ersin Uzun.
financial cryptography (2012)

752 Citations

Path ORAM: an extremely simple oblivious RAM protocol

Emil Stefanov;Marten van Dijk;Elaine Shi;Christopher W. Fletcher.
computer and communications security (2013)

727 Citations

Multi-Dimensional Range Query over Encrypted Data

E. Shi;J. Bethencourt;T.-H.H. Chan;Dawn Song.
ieee symposium on security and privacy (2007)

645 Citations

Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems

Arvind Seshadri;Mark Luk;Elaine Shi;Adrian Perrig.
symposium on operating systems principles (2005)

488 Citations

Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab

Kevin Delmolino;Mitchell Arnett;Ahmed E. Kosba;Andrew Miller;Andrew Miller.
financial cryptography (2016)

474 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Elaine Shi

Adrian Perrig

Adrian Perrig

ETH Zurich

Publications: 51

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 36

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 33

Cong Wang

Cong Wang

City University of Hong Kong

Publications: 33

Wenjing Lou

Wenjing Lou

Virginia Tech

Publications: 33

Prateek Saxena

Prateek Saxena

National University of Singapore

Publications: 28

Aggelos Kiayias

Aggelos Kiayias

University of Edinburgh

Publications: 27

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 26

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 26

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 25

Kui Ren

Kui Ren

Zhejiang University

Publications: 25

Srdjan Capkun

Srdjan Capkun

ETH Zurich

Publications: 24

Dan Boneh

Dan Boneh

Stanford University

Publications: 24

Bryan Parno

Bryan Parno

Carnegie Mellon University

Publications: 23

Amit Sahai

Amit Sahai

University of California, Los Angeles

Publications: 23

Something went wrong. Please try again later.