scispace - formally typeset
J

Jessica Staddon

Researcher at Google

Publications -  93
Citations -  6167

Jessica Staddon is an academic researcher from Google. The author has contributed to research in topics: Encryption & Information privacy. The author has an hindex of 31, co-authored 92 publications receiving 5916 citations. Previous affiliations of Jessica Staddon include Bell Labs & PARC.

Papers
More filters
Proceedings ArticleDOI

Controlling data in the cloud: outsourcing computation without outsourcing control

TL;DR: It is argued that with continued research advances in trusted computing and computation-supporting encryption, life in the cloud can be advantageous from a business intelligence standpoint over the isolated alternative that is more common today.
Book ChapterDOI

Secure Conjunctive Keyword Search over Encrypted Data

TL;DR: The setting in which a user stores encrypted documents on an untrusted server is studied, in order to retrieve documents satisfying a certain search criterion, the user gives the server a capability that allows the server to identify exactly those documents.
Proceedings ArticleDOI

Detecting and correcting malicious data in VANETs

TL;DR: A general approach to evaluating the validity of VANET data, where a node searches for possible explanations for the data it has collected based on the fact that malicious nodes may be present and accepts the data as dictated by the highest scoring explanations.
Journal ArticleDOI

Combinatorial properties of frameproof and traceability codes

TL;DR: In this paper, the authors studied different notions of traceability (TA) for pirated data and discussed equivalent formulations using structures such as perfect hash families, and used methods from combinatorics and coding theory to provide bounds (necessary conditions) and constructions (sufficient conditions) for the objects of interest.
Proceedings ArticleDOI

Secret handshakes from pairing-based key agreements

TL;DR: A formal definition for secure secret handshakes is proposed, and it is proved that the pairing-based schemes are secure under the Bilinear Diffie-Hellman assumption.