Seny Kamara, Ph.D.
Affiliations: | 2008 | Johns Hopkins University, Baltimore, MD |
Area:
Computer ScienceGoogle:
"Seny Kamara"Parents
Sign in to add mentorFabian Monrose | grad student | 2008 | Johns Hopkins | |
(Computing securely with untrusted resources.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Meng X, Kamara S, Nissim K, et al. (2015) GRECS: Graph EnCryption for approximate Shortest distance queries Proceedings of the Acm Conference On Computer and Communications Security. 2015: 504-517 |
Naveed M, Kamara S, Wright CV. (2015) Inference attacks on property-preserving encrypted databases Proceedings of the Acm Conference On Computer and Communications Security. 2015: 644-655 |
Ateniese G, Faonio A, Kamara S. (2015) Leakage-resilient identification schemes from zero-knowledge proofs of storage Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9496: 311-328 |
Kamara S. (2015) Encrypted search: Theory, practice and cryptanalysis Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9462 |
Azar Y, Kamara S, Menache I, et al. (2014) Co-location-resistant clouds Proceedings of the Acm Conference On Computer and Communications Security. 2014: 9-20 |
Valamehr JK, Chase M, Kamara S, et al. (2013) Inspection-resistant memory architectures Ieee Micro. 33: 48-56 |
Kamara S, Raykova M. (2013) Parallel homomorphic encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7862: 213-225 |
Kamara S, Wei L. (2013) Garbled circuits via structured encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7862: 177-188 |
Kamara S, Papamanthou C. (2013) Parallel and dynamic searchable symmetric encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7859: 258-274 |
Kamara S, Papamanthou C, Roeder T. (2012) Dynamic searchable symmetric encryption Proceedings of the Acm Conference On Computer and Communications Security. 965-976 |