Follow
Raluca Ada Popa
Raluca Ada Popa
Professor of computer science, UC Berkeley
Verified email at berkeley.edu - Homepage
Title
Cited by
Cited by
Year
CryptDB: Protecting confidentiality with encrypted query processing
RA Popa, CMS Redfield, N Zeldovich, H Balakrishnan
Proceedings of the twenty-third ACM symposium on operating systems …, 2011
17842011
Machine learning classification over encrypted data
R Bost, RA Popa, S Tu, S Goldwasser
Cryptology ePrint Archive, 2014
9612014
Cloud programming simplified: A berkeley view on serverless computing
E Jonas, J Schleier-Smith, V Sreekanti, CC Tsai, A Khandelwal, Q Pu, ...
arXiv preprint arXiv:1902.03383, 2019
7262019
Relational cloud: A database-as-a-service for the cloud
C Curino, EPC Jones, RA Popa, N Malviya, E Wu, S Madden, ...
5262011
Reusable garbled circuits and succinct functional encryption
S Goldwasser, Y Kalai, RA Popa, V Vaikuntanathan, N Zeldovich
Proceedings of the forty-fifth annual ACM symposium on Theory of computing …, 2013
5222013
An ideal-security protocol for order-preserving encoding
RA Popa, FH Li, N Zeldovich
2013 IEEE Symposium on Security and Privacy, 463-477, 2013
5222013
Blindbox: Deep packet inspection over encrypted traffic
J Sherry, C Lan, RA Popa, S Ratnasamy
Proceedings of the 2015 ACM conference on special interest group on data …, 2015
4802015
Delphi: A cryptographic inference system for neural networks
P Mishra, R Lehmkuhl, A Srinivasan, W Zheng, RA Popa
Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in …, 2020
4542020
Opaque: An oblivious and encrypted distributed analytics platform
W Zheng, A Dave, JG Beekman, RA Popa, JE Gonzalez, I Stoica
14th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2017
4412017
Enabling security in cloud storage {SLAs} with {CloudProof}
RA Popa, JR Lorch, D Molnar, HJ Wang, L Zhuang
2011 USENIX Annual Technical Conference (USENIX ATC 11), 2011
3842011
MUVI: Automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs
S Lu, S Park, C Hu, X Ma, W Jiang, Z Li, RA Popa, Y Zhou
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems …, 2007
2842007
A berkeley view of systems challenges for ai
I Stoica, D Song, RA Popa, D Patterson, MW Mahoney, R Katz, ...
arXiv preprint arXiv:1712.05855, 2017
2652017
How to run turing machines on encrypted data
S Goldwasser, YT Kalai, RA Popa, V Vaikuntanathan, N Zeldovich
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
2622013
CryptDB: processing queries on an encrypted database
RA Popa, CMS Redfield, N Zeldovich, H Balakrishnan
Communications of the ACM 55 (9), 103-111, 2012
2412012
Oblix: An efficient oblivious search index
P Mishra, R Poddar, J Chen, A Chiesa, RA Popa
2018 IEEE symposium on security and privacy (SP), 279-296, 2018
2212018
What serverless computing is and should become: The next phase of cloud computing
J Schleier-Smith, V Sreekanti, A Khandelwal, J Carreira, NJ Yadwadkar, ...
Communications of the ACM 64 (5), 76-84, 2021
2112021
Building web applications on top of encrypted data using Mylar
RA Popa, E Stark, S Valdez, J Helfer, N Zeldovich, H Balakrishnan
11th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2014
1952014
VPriv: Protecting privacy in location-based vehicular services
RA Popa, H Balakrishnan, AJ Blumberg
USENIX Association, 2009
1782009
Helen: Maliciously secure coopetitive learning for linear models
W Zheng, RA Popa, JE Gonzalez, I Stoica
2019 IEEE symposium on security and privacy (SP), 724-738, 2019
1762019
Multi-key searchable encryption
RA Popa, N Zeldovich
Cryptology ePrint Archive, 2013
1742013
The system can't perform the operation now. Try again later.
Articles 1–20