scispace - formally typeset
A

Albert Kwon

Researcher at Massachusetts Institute of Technology

Publications -  46
Citations -  2005

Albert Kwon is an academic researcher from Massachusetts Institute of Technology. The author has contributed to research in topics: Oblivious ram & Encryption. The author has an hindex of 22, co-authored 46 publications receiving 1632 citations. Previous affiliations of Albert Kwon include Boston Children's Hospital & New York Medical College.

Papers
More filters
Journal ArticleDOI

Synthetic Ligand-Coated Magnetic Nanoparticles for Microfluidic Bacterial Separation from Blood

TL;DR: In this article, magnetic microfluidic devices were used to remove MNPs bound to Escherichia coli, a Gram-negative bacterium commonly implicated in bacterial sepsis, from bovine whole blood at flows as high as 60 mL/h.
Journal ArticleDOI

Cultivation of Human Embryonic Stem Cells Without the Embryoid Body Step Enhances Osteogenesis In Vitro

TL;DR: C culturing human embryonic stem cells (hESCs) without the EB stage leads to a sevenfold greater number of osteogenic cells and to spontaneous bone nodule formation after 10–12 days, demonstrating that culturing hESCs without an EB step can be used to derive large quantities of functional osteogenic Cells for bone tissue engineering.
Proceedings Article

Constants count: practical improvements to oblivious RAM

TL;DR: This paper proposes Ring ORAM, the most bandwidth-efficient ORAM scheme for the small client storage setting in both theory and practice, the first tree-based ORAM whose bandwidth is independent of the ORAM bucket size, a property that unlocks multiple performance improvements.
Proceedings ArticleDOI

Low-fat pointers: compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security

TL;DR: To achieve the safety of fat pointers without increasing program state, this work compactly encode approximate base and bound pointers along with exact address pointers for a 46b address space into one 64-bit word with a worst-case memory overhead of 3%.
Proceedings Article

Circuit fingerprinting attacks: passive deanonymization of tor hidden services

TL;DR: This paper sheds light on crucial weaknesses in the design of hidden services that allow us to break the anonymity of hidden service clients and operators passively, and proposes two attacks, under two slightly different threat models, that could identify a hidden service client or operator using these weaknesses.