Shantanu Sharma

Calculated based on number of publications stored in Pure and citations from Scopus
20102025

Research activity per year

Filter
Conference contribution

Search results

  • 2025

    Reminisce for Securing Private-Keys in Public

    Dolev, S., Kumari, K., Mehrotra, S., Schieber, B. & Sharma, S., 2025, Cyber Security, Cryptology, and Machine Learning - 8th International Symposium, CSCML 2024, Proceedings. Dolev, S., Elhadad, M., Kutyłowski, M. & Persiano, G. (eds.). Springer Science and Business Media Deutschland GmbH, p. 168-177 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15349 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2024

    Secure Normal Form: Mediation among Cross Cryptographic Leakages in Encrypted Databases

    Zhang, S., He, X., Kundu, A., Mehrotra, S. & Sharma, S., 2024, Proceedings - 2024 IEEE 40th International Conference on Data Engineering, ICDE 2024. IEEE Computer Society, p. 5560-5573 14 p. (Proceedings - International Conference on Data Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2023

    Data-CASE: Grounding Data Regulations for Compliant Data Processing Systems

    Chakraborty, V., Ann-Elvy, S., Mehrotra, S., Nawab, F., Sadoghi, M., Sharma, S., Venkatasubramanian, N. & Saeed, F., Aug 18 2023, Advances in Database Technology - EDBT. 1 ed. OpenProceedings.org, p. 108-115 8 p. (Advances in Database Technology - EDBT; vol. 27, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Supporting Complex Query Time Enrichment For Analytics

    Ghosh, D., Gupta, P., Mehrotra, S. & Sharma, S., 2023, Proceedings of the 26th International Conference on Extending Database Technology, EDBT 2023. OpenProceedings.org, p. 92-104 13 p. (Advances in Database Technology - EDBT; vol. 26).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2022

    Cryptographic Techniques for Data Processing

    Sharma, S. & Mehrotra, S., Jan 8 2022, CODS-COMAD 2022 - Proceedings of the 5th Joint International Conference on Data Science and Management of Data (9th ACM IKDD CODS and 27th COMAD). Association for Computing Machinery, p. 344-347 4 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • QUEST: Privacy-Preserving Monitoring of Network Data

    Sharma, S., Mehrotra, S., Panwar, N., Venkatasubramanian, N., Gupta, P., Han, S. & Wang, G., 2022, Proceedings - 2022 IEEE World Congress on Services, SERVICES 2022. Ardagna, C. A., Chang, C. K., Chang, R. N., Damiani, E., Ward, R., Xhafa, F. & Zhang, J. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 21 1 p. (Proceedings - 2022 IEEE World Congress on Services, SERVICES 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Sentaur: Sensor Observable Data Model for Smart Spaces

    Gupta, P., Mehrotra, S., Sharma, S., Yus, R. & Venkatasubramanian, N., Oct 17 2022, CIKM 2022 - Proceedings of the 31st ACM International Conference on Information and Knowledge Management. Association for Computing Machinery, p. 3131-3140 10 p. (International Conference on Information and Knowledge Management, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2021

    Concealer: SGX-based secure, volume hiding, and verifiable processing of spatial time-series datasets

    Gupta, P., Mehrotra, S., Sharma, S., Venkatasubramanian, N. & Wang, G., 2021, Advances in Database Technology - EDBT 2021: 24th International Conference on Extending Database Technology, Proceedings. Velegrakis, Y., Velegrakis, Y., Zeinalipour, D., Chrysanthis, P. K., Chrysanthis, P. K. & Guerra, F. (eds.). OpenProceedings.org, p. 277-288 12 p. (Advances in Database Technology - EDBT; vol. 2021-March).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Meta-X: A Technique for Reducing Communication in Geographically Distributed Computations

    Afrati, F., Dolev, S., Sharma, S. & Ullman, J. D., 2021, Cyber Security Cryptography and Machine Learning - 5th International Symposium, CSCML 2021, Proceedings. Dolev, S., Margalit, O., Pinkas, B. & Schwarzmann, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 467-486 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12716 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2020

    Advances in cryptography and secure hardware for data outsourcing

    Sharma, S., Burtsev, A. & Mehrotra, S., Apr 2020, Proceedings - 2020 IEEE 36th International Conference on Data Engineering, ICDE 2020. IEEE Computer Society, p. 1798-1801 4 p. 9101509. (Proceedings - International Conference on Data Engineering; vol. 2020-April).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • A privacy-enabled platform for COVID-19 applications: Poster abstract

    August, M., Davison, C., Diallo, M., Ghosh, D., Gupta, P., Graves, C., Han, S., Holstrom, M., Khargonekar, P., Kline, M., Mehrotra, S., Sharma, S., Venkatasubramanian, N., Wang, G. & Yus, R., Nov 16 2020, SenSys 2020 - Proceedings of the 2020 18th ACM Conference on Embedded Networked Sensor Systems. Association for Computing Machinery, Inc, p. 745-746 2 p. (SenSys 2020 - Proceedings of the 2020 18th ACM Conference on Embedded Networked Sensor Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Scopus citations
  • IoT Expunge: Implementing Verifiable Retention of IoT Data

    Panwar, N., Sharma, S., Gupta, P., Ghosh, D., Mehrotra, S. & Venkatasubramanian, N., Mar 16 2020, CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 283-294 12 p. (CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Scopus citations
  • Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries

    Gupta, P., Li, Y., Mehrotra, S., Panwar, N. & Sharma, S., Mar 16 2020, CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 165-167 3 p. (CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Recent advances in information-theoretically secure data outsourcing

    Mehrotra, S. & Sharma, S., Mar 16 2020, IWSPA 2020 - Proceedings of the 6th International Workshop on Security and Privacy Analytics. Association for Computing Machinery, Inc, p. 31-32 2 p. (IWSPA 2020 - Proceedings of the 6th International Workshop on Security and Privacy Analytics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Security and Privacy Aspects in 5G Networks

    Panwar, N. & Sharma, S., Nov 24 2020, 2020 IEEE 19th International Symposium on Network Computing and Applications, NCA 2020. Gkoulalas-Divanis, A., Marchetti, M. & Avresky, D. R. (eds.). Institute of Electrical and Electronics Engineers Inc., 9306740. (2020 IEEE 19th International Symposium on Network Computing and Applications, NCA 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • 2019

    IoT Notary: Sensor Data Attestation in Smart Environment

    Panwar, N., Sharma, S., Wang, G., Mehrotra, S., Venkatasubramanian, N., Diallo, M. H. & Sani, A. A., Sep 2019, 2019 IEEE 18th International Symposium on Network Computing and Applications, NCA 2019. Gkoulalas-Divanis, A., Marchetti, M. & Avresky, D. R. (eds.). Institute of Electrical and Electronics Engineers Inc., 8935047. (2019 IEEE 18th International Symposium on Network Computing and Applications, NCA 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 Scopus citations
  • Partitioned data security on outsourced sensitive and non-sensitive data

    Mehrotra, S., Sharma, S., Ullman, J. & Mishra, A., Apr 2019, Proceedings - 2019 IEEE 35th International Conference on Data Engineering, ICDE 2019. IEEE Computer Society, p. 650-661 12 p. 8731601. (Proceedings - International Conference on Data Engineering; vol. 2019-April).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    13 Scopus citations
  • Scaling cryptographic techniques by exploiting data sensitivity at a public cloud

    Mehrotra, S., Sharma, S. & Ullman, J. D., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 165-167 3 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Verifiable round-robin scheme for smart homes

    Panwar, N., Sharma, S., Wang, G., Mehrotra, S. & Venkatasubramanian, N., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 49-60 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    3 Scopus citations
  • 2016

    Computing marginals using MapReduce

    Afrati, F. N., Sharma, S., Ullman, J. D. & Ullman, J. R., Jul 11 2016, Proceedings of the 20th International Database Engineering and Applications Symposium, IDEAS 2016. Desai, E. & Desai, B. C. (eds.). Association for Computing Machinery, p. 12-23 12 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Private and secure secret shared mapreduce (Extended Abstract)

    Dolev, S., Li, Y. & Sharma, S., 2016, Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Proceedings. Ranise, S. & Swarup, V. (eds.). Springer Verlag, p. 151-160 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    15 Scopus citations
  • 2015

    Brief announcement: Meta-mapreduce a technique for reducing communication in mapreduce computations

    Afrati, F., Dolev, S., Sharma, S. & Ullman, J. D., 2015, Stabilization, Safety and Security of Distributed Systems - 17th International Symposium, SSS 2015, Proceedings. Pelc, A. & Schwarzmann, A. A. (eds.). Springer Verlag, p. 272-274 3 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9212).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Reducer capacity and communication cost in MapReduce algorithms design

    Afrati, F., Dolev, S., Korach, E., Sharma, S. & Ullman, J. D., May 26 2015, SYSTOR 2015 - Proceedings of the 8th ACM International Systems and Storage Conference. Association for Computing Machinery, Inc, 2778188. (SYSTOR 2015 - Proceedings of the 8th ACM International Systems and Storage Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2014

    Brief announcement: Assignment of different-sized inputs in mapreduce

    Afrati, F., Dolev, S., Korach, E., Sharma, S. & Ullman, J. D., 2014, Distributed Computing - 28th International Symposium, DISC 2014, Proceedings. Kuhn, F. (ed.). Springer Verlag, p. 536-537 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8784).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2012

    Self-stabilizing end-to-end communication in (bounded capacity, omitting, duplicating and non-FIFO) dynamic networks

    Dolev, S., Hanemann, A., Schiller, E. M. & Sharma, S., 2012, Stabilization, Safety, and Security of Distributed Systems - 14th International Symposium, SSS 2012, Proceedings. p. 133-147 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7596 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    21 Scopus citations
  • 2011

    Democratic leader finding algorithm for large mobile ad hoc networks

    Sharma, S. & Singh, A. K., 2011, Proceedings - 31st International Conference on Distributed Computing Systems Workshops, ICDCSW 2011. p. 304-312 9 p. 5961504. (Proceedings - International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Elite leader finding algorithm for MANETs

    Singh, A. K. & Sharma, S., 2011, Proceedings - 2011 10th International Symposium on Parallel and Distributed Computing, ISPDC 2011. p. 125-132 8 p. 6108264. (Proceedings - 2011 10th International Symposium on Parallel and Distributed Computing, ISPDC 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Message efficient leader finding algorithm for mobile ad hoc networks

    Singh, A. K. & Sharma, S., 2011, 2011 3rd International Conference on Communication Systems and Networks, COMSNETS 2011. 5716512. (2011 3rd International Conference on Communication Systems and Networks, COMSNETS 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • On detecting termination in cognitive radio networks

    Sharma, S. & Singh, A. K., 2011, Proceedings - 2011 17th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2011. p. 71-78 8 p. 6133068. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    4 Scopus citations
  • Trivial solution for a non-trivial problem in MANETs

    Singh, A. K. & Sharma, S., 2011, Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, ACAI 2011. p. 111-119 9 p. (Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, ACAI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2010

    An efficient approach for Web-log mining using ART

    Sharma, S. & Varshney, M., 2010, ICEMT 2010 - 2010 International Conference on Education and Management Technology, Proceedings. p. 196-199 4 p. 5657673. (ICEMT 2010 - 2010 International Conference on Education and Management Technology, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution