default search action
Sebastian Angel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Haoran Zhang, Shuai Mu, Sebastian Angel, Vincent Liu:
CausalMesh: A Causal Cache for Stateful Serverless Computing. Proc. VLDB Endow. 17(13): 4599-4613 (2024) - [c27]Haoran Zhang, Konstantinos Kallas, Spyros Pavlatos, Rajeev Alur, Sebastian Angel, Vincent Liu:
MuCache: A General Framework for Caching in Microservice Graphs. NSDI 2024: 221-238 - [c26]Sebastian Angel, Eleftherios Ioannidis, Elizabeth Margolin, Srinath T. V. Setty, Jess Woods:
Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs. USENIX Security Symposium 2024 - [i19]Eleftherios Ioannidis, Yannick Zakowski, Steve Zdancewic, Sebastian Angel:
Structural temporal logic for mechanized program verification. CoRR abs/2410.14906 (2024) - [i18]Ke Zhong, Sebastian Angel:
Oryx: Private detection of cycles in federated graphs. IACR Cryptol. ePrint Arch. 2024: 1117 (2024) - 2023
- [j3]Konstantinos Kallas
, Haoran Zhang
, Rajeev Alur
, Sebastian Angel
, Vincent Liu
:
Executing Microservice Applications on Serverless, Correctly. Proc. ACM Program. Lang. 7(POPL): 367-395 (2023) - [c25]Ke Zhong, Yiping Ma, Yifeng Mao, Sebastian Angel:
Addax: A fast, private, and accountable ad exchange infrastructure. NSDI 2023: 825-848 - [c24]Sebastian Angel, Aditya Basu, Weidong Cui, Trent Jaeger, Stella Lau, Srinath T. V. Setty, Sudheesh Singanamalla:
Nimble: Rollback Protection for Confidential Cloud Services. OSDI 2023: 193-208 - [c23]Yiping Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, Tal Rabin:
Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning. SP 2023: 477-496 - [i17]Yiping Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, Tal Rabin:
Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning. CoRR abs/2308.09883 (2023) - [i16]Divyanshu Saxena, Nihal Sharma, Donghyun Kim, Rohit Dwivedula, Jiayi Chen, Chenxi Yang, Sriram Ravula, Zichao Hu, Aditya Akella, Sebastian Angel, Joydeep Biswas, Swarat Chaudhuri, Isil Dillig, Alex Dimakis, Philip Brighten Godfrey, Daehyeok Kim, Christopher J. Rossbach, Gang Wang:
On a Foundation Model for Operating Systems. CoRR abs/2312.07813 (2023) - [i15]Yiping Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, Tal Rabin:
Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning. IACR Cryptol. ePrint Arch. 2023: 486 (2023) - [i14]Sebastian Angel, Aditya Basu, Weidong Cui, Trent Jaeger, Stella Lau, Srinath T. V. Setty, Sudheesh Singanamalla:
Nimble: Rollback Protection for Confidential Cloud Services (extended version). IACR Cryptol. ePrint Arch. 2023: 761 (2023) - [i13]Sebastian Angel, Eleftherios Ioannidis, Elizabeth Margolin, Srinath T. V. Setty, Jess Woods:
Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs. IACR Cryptol. ePrint Arch. 2023: 1886 (2023) - 2022
- [c22]Ke Zhong, Yiping Ma, Sebastian Angel:
Ibex: Privacy-preserving Ad Conversion Tracking and Bidding. CCS 2022: 3223-3237 - [c21]Weihai Shen, Ansh Khanna, Sebastian Angel, Siddhartha Sen, Shuai Mu:
Rolis: a software approach to efficiently replicating multi-core transactions. EuroSys 2022: 69-84 - [c20]Qizhen Zhang, Xinyi Chen, Sidharth Sankhe, Zhilei Zheng, Ke Zhong, Sebastian Angel, Ang Chen, Vincent Liu, Boon Thau Loo
:
Optimizing Data-intensive Systems in Disaggregated Data Centers with TELEPORT. SIGMOD Conference 2022: 1345-1359 - [c19]Yiping Ma, Ke Zhong, Tal Rabin, Sebastian Angel:
Incremental Offline/Online PIR. USENIX Security Symposium 2022: 1741-1758 - [c18]Sebastian Angel, Andrew J. Blumberg, Eleftherios Ioannidis, Jess Woods:
Efficient Representation of Numerical Optimization Problems for SNARKs. USENIX Security Symposium 2022: 4273-4290 - [i12]Ke Zhong, Yiping Ma, Sebastian Angel:
Ibex: Privacy-preserving ad conversion tracking and bidding (full version). IACR Cryptol. ePrint Arch. 2022: 1174 (2022) - [i11]Ke Zhong, Yiping Ma, Yifeng Mao, Sebastian Angel:
Addax: A fast, private, and accountable ad exchange infrastructure. IACR Cryptol. ePrint Arch. 2022: 1299 (2022) - 2021
- [c17]Andrew Beams, Sampath Kannan, Sebastian Angel:
Packet Scheduling with Optional Client Privacy. CCS 2021: 3415-3430 - [c16]Mingyu Li, Jinhao Zhu, Tianxu Zhang, Cheng Tan, Yubin Xia, Sebastian Angel, Haibo Chen:
Bringing Decentralized Search to Decentralized Services. OSDI 2021: 331-347 - [c15]Edo Roth, Karan Newatia, Yiping Ma, Ke Zhong, Sebastian Angel, Andreas Haeberlen:
Mycelium: Large-Scale Distributed Graph Queries with Differential Privacy. SOSP 2021: 327-343 - [e1]Sebastian Angel, Baris Kasikci, Eddie Kohler:
HotOS '21: Workshop on Hot Topics in Operating Systems, Ann Arbor, Michigan, USA, June, 1-3, 2021. ACM 2021, ISBN 978-1-4503-8438-4 [contents] - [i10]Sebastian Angel, Andrew J. Blumberg, Eleftherios Ioannidis, Jess Woods:
Efficient Representation of Numerical Optimization Problems for SNARKs. IACR Cryptol. ePrint Arch. 2021: 1436 (2021) - [i9]Yiping Ma, Ke Zhong, Tal Rabin, Sebastian Angel:
Incremental Offline/Online PIR (extended version). IACR Cryptol. ePrint Arch. 2021: 1438 (2021) - 2020
- [j2]Qizhen Zhang, Yifan Cai
, Xinyi Chen, Sebastian Angel, Ang Chen, Vincent Liu
, Boon Thau Loo
:
Understanding the Effect of Data Center Resource Disaggregation on Production DBMSs. Proc. VLDB Endow. 13(9): 1568-1581 (2020) - [j1]Srinath T. V. Setty, Sebastian Angel, Jonathan Lee:
Verifiable state machines: Proofs that untrusted services operate correctly. ACM SIGOPS Oper. Syst. Rev. 54(1): 40-46 (2020) - [c14]Qizhen Zhang, Yifan Cai
, Sebastian Angel, Vincent Liu, Ang Chen, Boon Thau Loo
:
Rethinking Data Management Systems for Disaggregated Data Centers. CIDR 2020 - [c13]Sebastian Angel, Mihir Nanavati, Siddhartha Sen:
Disaggregation and the Application. HotCloud 2020 - [c12]Ke Zhong, Zhihao Jiang, Ke Ma, Sebastian Angel:
A file system for safely interacting with untrusted USB flash drives. HotStorage 2020 - [c11]Haoran Zhang, Adney Cardoza, Peter Baile Chen, Sebastian Angel, Vincent Liu:
Fault-tolerant and transactional stateful serverless workflows. OSDI 2020: 1187-1204 - [c10]Sebastian Angel, Sampath Kannan, Zachary B. Ratliff:
Private resource allocators and their applications. SP 2020: 372-391 - [i8]Haoran Zhang, Adney Cardoza, Peter Baile Chen, Sebastian Angel, Vincent Liu:
Fault-tolerant and Transactional Stateful Serverless Workflows (extended version). CoRR abs/2010.06706 (2020) - [i7]Sebastian Angel, Sampath Kannan, Zachary B. Ratliff:
Private resource allocators and their applications. IACR Cryptol. ePrint Arch. 2020: 287 (2020) - [i6]Srinath T. V. Setty, Sebastian Angel, Jonathan Lee:
Verifiable state machines: Proofs that untrusted services operate correctly. IACR Cryptol. ePrint Arch. 2020: 758 (2020)
2010 – 2019
- 2019
- [c9]Shuai Mu, Sebastian Angel, Dennis E. Shasha:
Deferred Runtime Pipelining for contentious multicore software transactions. EuroSys 2019: 40:1-40:16 - [i5]Sebastian Angel, Mihir Nanavati, Siddhartha Sen:
Disaggregation and the Application. CoRR abs/1910.13056 (2019) - 2018
- [c8]Srinath T. V. Setty, Sebastian Angel, Trinabh Gupta, Jonathan Lee:
Proving the correct execution of concurrent services in zero-knowledge. OSDI 2018: 339-356 - [c7]Sebastian Angel, Hao Chen, Kim Laine, Srinath T. V. Setty:
PIR with Compressed Queries and Amortized Query Processing. IEEE Symposium on Security and Privacy 2018: 962-979 - [c6]Sebastian Angel, David Lazar, Ioanna Tzialla:
What's a Little Leakage Between Friends? WPES@CCS 2018: 104-108 - [i4]Sebastian Angel, David Lazar, Ioanna Tzialla:
What's a little leakage between friends? CoRR abs/1809.00111 (2018) - [i3]Srinath T. V. Setty, Sebastian Angel, Trinabh Gupta, Jonathan Lee:
Proving the correct execution of concurrent services in zero-knowledge. IACR Cryptol. ePrint Arch. 2018: 907 (2018) - 2017
- [i2]Sebastian Angel, Hao Chen, Kim Laine, Srinath T. V. Setty:
PIR with compressed queries and amortized query processing. IACR Cryptol. ePrint Arch. 2017: 1142 (2017) - 2016
- [c5]Sebastian Angel, Srinath T. V. Setty:
Unobservable Communication over Fully Untrusted Infrastructure. OSDI 2016: 551-569 - [c4]Sebastian Angel, Riad S. Wahby, Max Howald, Joshua B. Leners, Michael Spilo, Zhen Sun, Andrew J. Blumberg, Michael Walfish:
Defending against Malicious Peripherals with Cinch. USENIX Security Symposium 2016: 397-414 - 2015
- [i1]Riad S. Wahby, Sebastian Angel, Max Howald, Joshua B. Leners, Andrew J. Blumberg, Michael Walfish:
Harmful devices considered harmless. CoRR abs/1506.01449 (2015) - 2014
- [c3]Sebastian Angel, Hitesh Ballani, Thomas Karagiannis, Greg O'Shea, Eno Thereska:
End-to-end Performance Isolation Through Virtual Datacenters. OSDI 2014: 233-248 - 2013
- [c2]Christopher Michael Hill, Carl H. Albach, Sebastian Angel, Mihai Pop
:
K-mulus: Strategies for BLAST in the Cloud. PPAM (2) 2013: 237-246 - [c1]Sebastian Angel, Michael Walfish:
Verifiable auctions for online ad exchanges. SIGCOMM 2013: 195-206
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-14 02:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint