default search action
Shantanu Sharma 0001
Person information
- affiliation: New Jersey Institute of Technology, Newark, NJ, USA
- affiliation (2016-2021): University of California, Irvine, CA, USA
- affiliation (PhD 2016): Ben-Gurion University of the Negev, Israel
Other persons with the same name
- Shantanu Sharma 0002 — University of North Carolina at Chapel Hill, NC, USA
- Shantanu Sharma 0003 — California State University, Pomona, CA, USA
- Shantanu Sharma 0004 — Nanyang Technological University, School of Computer Science and Engineering, Singapore
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Peeyush Gupta, Dhrubajyoti Ghosh:
Prism: Privacy-Preserving and Verifiable Set Computation Over Multi-Owner Secret Shared Outsourced Databases. IEEE Trans. Dependable Secur. Comput. 21(3): 1355-1371 (2024) - [c34]Vishal Chakraborty, Stacy Ann-Elvy, Sharad Mehrotra, Faisal Nawab, Mohammad Sadoghi, Shantanu Sharma, Nalini Venkatasubramanian, Farhan Saeed:
Data-CASE: Grounding Data Regulations for Compliant Data Processing Systems. EDBT 2024: 108-115 - [c33]Komal Kumari, Sharad Mehrotra, Shantanu Sharma:
Tutorial: Information Leakage from Cryptographic Techniques. ICDCSW 2024: 9-12 - [c32]Shufan Zhang, Xi He, Ashish Kundu, Sharad Mehrotra, Shantanu Sharma:
Secure Normal Form: Mediation Among Cross Cryptographic Leakages in Encrypted Databases. ICDE 2024: 5560-5573 - [c31]Shlomi Dolev, Komal Kumari, Sharad Mehrotra, Baruch Schieber, Shantanu Sharma:
Brief Announcement: Make Master Private-Keys Secure by Keeping It Public. SSS 2024: 338-343 - 2023
- [j20]Shanshan Han, Vishal Chakraborty, Michael T. Goodrich, Sharad Mehrotra, Shantanu Sharma:
Veil: A Storage and Communication Efficient Volume-Hiding Algorithm. Proc. ACM Manag. Data 1(4): 265:1-265:27 (2023) - [j19]Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Komal Kumari, Swagnik Roychoudhury:
Information-Theoretically Secure and Highly Efficient Search and Row Retrieval. Proc. VLDB Endow. 16(10): 2391-2403 (2023) - [c30]Dhrubajyoti Ghosh, Peeyush Gupta, Sharad Mehrotra, Shantanu Sharma:
Supporting Complex Query Time Enrichment For Analytics. EDBT 2023: 92-104 - [c29]Abhishek A. Singh, Yinan Zhou, Mohammad Sadoghi, Sharad Mehrotra, Shantanu Sharma, Faisal Nawab:
WedgeBlock: An Off-Chain Secure Logging Platform for Blockchain Applications. EDBT 2023: 526-539 - [i27]Ahmed Roushdy Elkordy, Yahya H. Ezzeldin, Shanshan Han, Shantanu Sharma, Chaoyang He, Sharad Mehrotra, Salman Avestimehr:
Federated Analytics: A survey. CoRR abs/2302.01326 (2023) - [i26]Vishal Chakraborty, Stacy Ann-Elvy, Sharad Mehrotra, Faisal Nawab, Mohammad Sadoghi, Shantanu Sharma, Nalini Venkatasubramanian, Farhan Saeed:
Data-CASE: Grounding Data Regulations for Compliant Data Processing Systems. CoRR abs/2308.07501 (2023) - [i25]Shanshan Han, Vishal Chakraborty, Michael T. Goodrich, Sharad Mehrotra, Shantanu Sharma:
Hiding Access-pattern is Not Enough! Veil: A Storage and Communication Efficient Volume-Hiding Algorithm. CoRR abs/2310.12491 (2023) - [i24]Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Dhrubajyoti Ghosh, Peeyush Gupta:
Prism: Private Set Intersection and Union with Aggregation over Multi-Owner Outsourced Data. IACR Cryptol. ePrint Arch. 2023: 133 (2023) - 2022
- [j18]Dhrubajyoti Ghosh, Peeyush Gupta, Sharad Mehrotra, Shantanu Sharma:
A Case for Enrichment in Data Management Systems. SIGMOD Rec. 51(2): 38-43 (2022) - [j17]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani:
IoT Notary: Attestable Sensor Data Capture in IoT Environments. ACM Trans. Internet Things 3(1): 3:1-3:30 (2022) - [j16]Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Sumaya Almanee:
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data. IEEE Trans. Knowl. Data Eng. 34(2): 843-864 (2022) - [j15]Shantanu Sharma, Sharad Mehrotra, Nisha Panwar, Nalini Venkatasubramanian, Peeyush Gupta, Shanshan Han, Guoxi Wang:
Quest: Privacy-Preserving Monitoring of Network Data: A System for Organizational Response to Pandemics. IEEE Trans. Serv. Comput. 15(3): 1233-1250 (2022) - [c28]Peeyush Gupta, Sharad Mehrotra, Shantanu Sharma, Roberto Yus, Nalini Venkatasubramanian:
Sentaur: Sensor Observable Data Model for Smart Spaces. CIKM 2022: 3131-3140 - [c27]Shantanu Sharma, Sharad Mehrotra:
Cryptographic Techniques for Data Processing. COMAD/CODS 2022: 344-347 - [c26]Shantanu Sharma, Sharad Mehrotra, Nisha Panwar, Nalini Venkatasubramanian, Peeyush Gupta, Shanshan Han, Guoxi Wang:
QUEST: Privacy-Preserving Monitoring of Network Data. SERVICES 2022: 21 - 2021
- [j14]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
CANOPY: A Verifiable Privacy-Preserving Token Ring-Based Communication Protocol for Smart Homes. ACM Trans. Cyber Phys. Syst. 5(1): 3:1-3:34 (2021) - [j13]Shlomi Dolev, Peeyush Gupta, Yin Li, Sharad Mehrotra, Shantanu Sharma:
Privacy-Preserving Secret Shared Computations Using MapReduce. IEEE Trans. Dependable Secur. Comput. 18(4): 1645-1666 (2021) - [c25]Foto N. Afrati, Shlomi Dolev, Shantanu Sharma, Jeffrey D. Ullman:
Meta-X: A Technique for Reducing Communication in Geographically Distributed Computations. CSCML 2021: 467-486 - [c24]Peeyush Gupta, Sharad Mehrotra, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang:
Concealer: SGX-based Secure, Volume Hiding, and Verifiable Processing of Spatial Time-Series Datasets. EDBT 2021: 277-288 - [c23]Yin Li, Dhrubajyoti Ghosh, Peeyush Gupta, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma:
PRISM: Private Verifiable Set Computation over Multi-Owner Outsourced Databases. SIGMOD Conference 2021: 1116-1128 - [i23]Peeyush Gupta, Sharad Mehrotra, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang:
Concealer: SGX-based Secure, Volume Hiding, and Verifiable Processing of Spatial Time-Series Datasets. CoRR abs/2102.05238 (2021) - [i22]Yin Li, Dhrubajyoti Ghosh, Peeyush Gupta, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma:
Prism: Private Verifiable Set Computation over Multi-Owner Outsourced Databases. CoRR abs/2104.03354 (2021) - [i21]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani:
IoT Notary: Attestable Sensor Data Capture in IoT Environments. CoRR abs/2108.02293 (2021) - 2020
- [j12]Yin Li, Shantanu Sharma, Yu Zhang, Xingpo Ma, Chuanda Qi:
On the Complexity of Hybrid n-Term Karatsuba Multiplier for Trinomials. IEEE Trans. Circuits Syst. I Regul. Pap. 67-I(3): 852-865 (2020) - [j11]Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman, Dhrubajyoti Ghosh, Peeyush Gupta, Anurag Mishra:
PANDA: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data. ACM Trans. Manag. Inf. Syst. 11(4): 23:1-23:41 (2020) - [c22]Sharad Mehrotra, Shantanu Sharma:
Recent Advances in Information-Theoretically Secure Data Outsourcing. IWSPA@CODASPY 2020: 31-32 - [c21]Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma:
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries. CODASPY 2020: 165-167 - [c20]Nisha Panwar, Shantanu Sharma, Peeyush Gupta, Dhrubajyoti Ghosh, Sharad Mehrotra, Nalini Venkatasubramanian:
IoT Expunge: Implementing Verifiable Retention of IoT Data. CODASPY 2020: 283-294 - [c19]Shantanu Sharma, Anton Burtsev, Sharad Mehrotra:
Advances in Cryptography and Secure Hardware for Data Outsourcing. ICDE 2020: 1798-1801 - [c18]Nisha Panwar, Shantanu Sharma:
Security and Privacy Aspects in 5G Networks. NCA 2020: 1-5 - [c17]Michael August, Christopher Davison, Mamadou H. Diallo, Dhrubajyoti Ghosh, Peeyush Gupta, Christopher T. Graves, Shanshan Han, Michael Holstrom, Pramod P. Khargonekar, Megan Kline, Sharad Mehrotra, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang, Roberto Yus:
A privacy-enabled platform for COVID-19 applications: poster abstract. SenSys 2020: 745-746 - [i20]Nisha Panwar, Shantanu Sharma, Peeyush Gupta, Dhrubajyoti Ghosh, Sharad Mehrotra, Nalini Venkatasubramanian:
IoT Expunge: Implementing Verifiable Retention of IoT Data. CoRR abs/2003.04969 (2020) - [i19]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
Canopy: A Verifiable Privacy-Preserving Token Ring based Communication Protocol for Smart Homes. CoRR abs/2004.03841 (2020) - [i18]Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Sumaya Almanee:
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data - Full Version. CoRR abs/2004.13115 (2020) - [i17]Peeyush Gupta, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang:
Quest: Practical and Oblivious Mitigation Strategies for COVID-19 using WiFi Datasets. CoRR abs/2005.02510 (2020) - [i16]Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman, Dhrubajyoti Ghosh, Peeyush Gupta:
Panda: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data. CoRR abs/2005.06154 (2020) - [i15]Shlomi Dolev, Ariel Hanemann, Elad Michael Schiller, Shantanu Sharma:
Self-Stabilizing Automatic Repeat Request Algorithms for (Bounded Capacity, Omitting, Duplicating and non-FIFO) Computer Networks. CoRR abs/2006.05901 (2020)
2010 – 2019
- 2019
- [j10]Shantanu Sharma:
Five do's and don'ts as a postdoctoral scholar. XRDS 26(2): 10-11 (2019) - [j9]Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Sumaya Almanee:
Obscure: Information-Theoretic Oblivious and Verifiable Aggregation Queries. Proc. VLDB Endow. 12(9): 1030-1043 (2019) - [j8]Shlomi Dolev, Patricia Florissi, Ehud Gudes, Shantanu Sharma, Ido Singer:
A Survey on Geographically Distributed Big-Data Processing Using MapReduce. IEEE Trans. Big Data 5(1): 60-80 (2019) - [c16]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
Verifiable Round-Robin Scheme for Smart Homes. CODASPY 2019: 49-60 - [c15]Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman:
Scaling Cryptographic Techniques by Exploiting Data Sensitivity at a Public Cloud. CODASPY 2019: 165-167 - [c14]Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman, Anurag Mishra:
Partitioned Data Security on Outsourced Sensitive and Non-Sensitive Data. ICDE 2019: 650-661 - [c13]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani:
IoT Notary: Sensor Data Attestation in Smart Environment. NCA 2019: 1-9 - [i14]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
Verifiable Round-Robin Scheme for Smart Homes. CoRR abs/1901.08618 (2019) - [i13]Nisha Panwar, Shantanu Sharma, Sharad Mehrotra, Lukasz Krzywiecki, Nalini Venkatasubramanian:
Smart Home Survey on Security and Privacy. CoRR abs/1904.05476 (2019) - [i12]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani:
IoT Notary: Sensor Data Attestation in Smart Environment. CoRR abs/1908.10033 (2019) - 2018
- [j7]Foto N. Afrati, Shantanu Sharma, Jonathan R. Ullman, Jeffrey D. Ullman:
Computing marginals using MapReduce. J. Comput. Syst. Sci. 94: 98-117 (2018) - [j6]Shantanu Sharma, Awadhesh Kumar Singh:
An election algorithm to ensure the high availability of leader in large mobile ad hoc networks. Int. J. Parallel Emergent Distributed Syst. 33(2): 172-196 (2018) - [c12]Sharad Mehrotra, Kerim Yasin Oktay, Shantanu Sharma:
Exploiting Data Sensitivity on Partitioned Data. From Database to Cyber Security 2018: 274-299 - [i11]Shlomi Dolev, Yin Li, Shantanu Sharma:
Privacy-Preserving Secret Shared Computations using MapReduce. CoRR abs/1801.10323 (2018) - [i10]Sharad Mehrotra, Kerim Yasin Oktay, Shantanu Sharma:
Exploiting Data Sensitivity on Partitioned Data. CoRR abs/1812.01741 (2018) - [i9]Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman, Anurag Mishra:
Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data. CoRR abs/1812.09233 (2018) - 2017
- [j5]Nisha Panwar, Shantanu Sharma:
The excessive power of Ctrl+C and Ctrl+V in CS research and career development. XRDS 24(2): 10-11 (2017) - [i8]Shlomi Dolev, Patricia Florissi, Ehud Gudes, Shantanu Sharma, Ido Singer:
A Survey on Geographically Distributed Big-Data Processing using MapReduce. CoRR abs/1707.01869 (2017) - 2016
- [j4]Philip Derbeko, Shlomi Dolev, Ehud Gudes, Shantanu Sharma:
Security and privacy aspects in MapReduce on clouds: A survey. Comput. Sci. Rev. 20: 1-28 (2016) - [j3]Nisha Panwar, Shantanu Sharma, Awadhesh Kumar Singh:
A survey on 5G: The next generation of mobile communication. Phys. Commun. 18: 64-84 (2016) - [j2]Foto N. Afrati, Shlomi Dolev, Ephraim Korach, Shantanu Sharma, Jeffrey D. Ullman:
Assignment Problems of Different-Sized Inputs in MapReduce. ACM Trans. Knowl. Discov. Data 11(2): 18:1-18:35 (2016) - [c11]Shlomi Dolev, Yin Li, Shantanu Sharma:
Private and Secure Secret Shared MapReduce (Extended Abstract) - (Extended Abstract). DBSec 2016: 151-160 - [c10]Foto N. Afrati, Shantanu Sharma, Jeffrey D. Ullman, Jonathan R. Ullman:
Computing Marginals Using MapReduce: Keynote talk paper. IDEAS 2016: 12-23 - [i7]Philip Derbeko, Shlomi Dolev, Ehud Gudes, Shantanu Sharma:
Security and Privacy Aspects in MapReduce on Clouds: A Survey. CoRR abs/1605.00677 (2016) - 2015
- [c9]Foto N. Afrati, Shlomi Dolev, Shantanu Sharma, Jeffrey D. Ullman:
Bounds for Overlapping Interval Join on MapReduce. EDBT/ICDT Workshops 2015: 3-6 - [c8]Foto N. Afrati, Shlomi Dolev, Ephraim Korach, Shantanu Sharma, Jeffrey D. Ullman:
Assignment of Different-Sized Inputs in MapReduce. EDBT/ICDT Workshops 2015: 28-37 - [i6]Foto N. Afrati, Shlomi Dolev, Ephraim Korach, Shantanu Sharma, Jeffrey D. Ullman:
Assignment of Different-Sized Inputs in MapReduce. CoRR abs/1501.06758 (2015) - [i5]Foto N. Afrati, Shlomi Dolev, Ephraim Korach, Shantanu Sharma, Jeffrey D. Ullman:
Assignment Problems of Different-Sized Inputs in MapReduce. CoRR abs/1507.04461 (2015) - [i4]Shantanu Sharma, Awadhesh Kumar Singh:
On Detecting Termination in Cognitive Radio Networks. CoRR abs/1507.04462 (2015) - [i3]Foto N. Afrati, Shlomi Dolev, Shantanu Sharma, Jeffrey D. Ullman:
Meta-MapReduce: A Technique for Reducing Communication in MapReduce Computations. CoRR abs/1508.01171 (2015) - [i2]Foto N. Afrati, Shantanu Sharma, Jeffrey D. Ullman, Jonathan R. Ullman:
Computing Marginals Using MapReduce. CoRR abs/1509.08855 (2015) - [i1]Nisha Panwar, Shantanu Sharma, Awadhesh Kumar Singh:
A Survey on 5G: The Next Generation of Mobile Communication. CoRR abs/1511.01643 (2015) - 2014
- [j1]Shantanu Sharma, Awadhesh Kumar Singh:
On detecting termination in cognitive radio networks. Int. J. Netw. Manag. 24(6): 499-527 (2014) - [c7]Foto N. Afrati, Shlomi Dolev, Ephraim Korach, Shantanu Sharma, Jeffrey D. Ullman:
Assignment of Different-Sized Inputs in MapReduce. DISC 2014: 536-537 - 2012
- [c6]Shlomi Dolev, Ariel Hanemann, Elad Michael Schiller, Shantanu Sharma:
Self-stabilizing End-to-End Communication in (Bounded Capacity, Omitting, Duplicating and non-FIFO) Dynamic Networks - (Extended Abstract). SSS 2012: 133-147 - 2011
- [c5]Awadhesh Kumar Singh, Shantanu Sharma:
Trivial solution for a non-trivial problem in MANETs. ACAI 2011: 111-119 - [c4]Awadhesh Kumar Singh, Shantanu Sharma:
Message efficient leader finding algorithm for mobile ad hoc networks. COMSNETS 2011: 1-6 - [c3]Shantanu Sharma, Awadhesh Kumar Singh:
Democratic Leader Finding Algorithm for Large Mobile Ad Hoc Networks. ICDCS Workshops 2011: 304-312 - [c2]Awadhesh Kumar Singh, Shantanu Sharma:
Elite Leader Finding Algorithm for MANETs. ISPDC 2011: 125-132 - [c1]Shantanu Sharma, Awadhesh Kumar Singh:
On Detecting Termination in Cognitive Radio Networks. PRDC 2011: 71-78
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 20:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint