Seny Kamara, Ph.D. - Publications

Affiliations: 
2008 Johns Hopkins University, Baltimore, MD 
Area:
Computer Science

23 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2015 Meng X, Kamara S, Nissim K, Kollios G. GRECS: Graph EnCryption for approximate Shortest distance queries Proceedings of the Acm Conference On Computer and Communications Security. 2015: 504-517. DOI: 10.1145/2810103.2813672  0.323
2015 Naveed M, Kamara S, Wright CV. Inference attacks on property-preserving encrypted databases Proceedings of the Acm Conference On Computer and Communications Security. 2015: 644-655. DOI: 10.1145/2810103.2813651  0.365
2015 Ateniese G, Faonio A, Kamara S. Leakage-resilient identification schemes from zero-knowledge proofs of storage Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9496: 311-328. DOI: 10.1007/978-3-319-27239-9_19  0.401
2015 Kamara S. Encrypted search: Theory, practice and cryptanalysis Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9462.  0.382
2014 Azar Y, Kamara S, Menache I, Raykovau M, Shepherdu B. Co-location-resistant clouds Proceedings of the Acm Conference On Computer and Communications Security. 2014: 9-20. DOI: 10.1145/2664168.2664179  0.437
2013 Valamehr JK, Chase M, Kamara S, Putnam A, Shumow D, Vaikuntanathan V, Sherwood T. Inspection-resistant memory architectures Ieee Micro. 33: 48-56. DOI: 10.1109/Mm.2013.27  0.402
2013 Kamara S, Raykova M. Parallel homomorphic encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7862: 213-225. DOI: 10.1007/978-3-642-41320-9_15  0.386
2013 Kamara S, Wei L. Garbled circuits via structured encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7862: 177-188. DOI: 10.1007/978-3-642-41320-9_12  0.303
2013 Kamara S, Papamanthou C. Parallel and dynamic searchable symmetric encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7859: 258-274. DOI: 10.1007/978-3-642-39884-1_22  0.412
2012 Kamara S, Papamanthou C, Roeder T. Dynamic searchable symmetric encryption Proceedings of the Acm Conference On Computer and Communications Security. 965-976. DOI: 10.1145/2382196.2382298  0.511
2012 Kamara S, Mohassel P, Riva B. Salus: A system for server-aided secure function evaluation Proceedings of the Acm Conference On Computer and Communications Security. 797-808. DOI: 10.1145/2382196.2382280  0.422
2012 Valamehr J, Chase M, Kamara S, Putnam A, Shumow D, Vaikuntanathan V, Sherwood T. Inspection resistant memory: Architectural support for security from physical examination Proceedings - International Symposium On Computer Architecture. 130-141. DOI: 10.1109/ISCA.2012.6237012  0.338
2011 Curtmola R, Garay J, Kamara S, Ostrovsky R. Searchable symmetric encryption: Improved definitions and efficient constructions Journal of Computer Security. 19: 895-934. DOI: 10.3233/Jcs-2011-0426  0.55
2010 Chase M, Kamara S. Structured encryption and controlled disclosure Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6477: 577-594. DOI: 10.1007/978-3-642-17373-8_33  0.336
2009 Ateniese G, Kamara S, Katz J. Proofs of storage from homomorphic identification protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5912: 319-333. DOI: 10.1007/978-3-642-10366-7_19  0.411
2008 Ballard L, Kamara S, Reiter MK, Monrose F. Towards practical biometric key generation with randomized biometric templates Proceedings of the Acm Conference On Computer and Communications Security. 235-244. DOI: 10.1145/1455770.1455801  0.523
2008 Kamara S, Katz J. How to encrypt with a malicious random number generator Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5086: 303-315. DOI: 10.1007/978-3-540-71039-4_19  0.43
2007 Curtmola R, Kamara S. A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks Electronic Notes in Theoretical Computer Science. 171: 57-69. DOI: 10.1016/J.Entcs.2006.11.009  0.402
2007 Kamara S, de Medeiros B, Wetzel S. Secret Locking: Exploring New Approaches to Biometric Key Encapsulation Communications in Computer and Information Science. 3: 101-112. DOI: 10.1007/978-3-540-75993-5_9  0.461
2005 Kamara S, Davis D, Ballard L, Caudy R, Monrose F. An extensible platform for evaluating security protocols Proceedings - Simulation Symposium. 204-213. DOI: 10.1109/ANSS.2005.11  0.557
2005 Ballard L, Kamara S, Monrose F. Achieving efficient conjunctive keyword searches over encrypted data Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3783: 414-426. DOI: 10.1007/11602897_35  0.559
2003 Kamara S, Fahmy S, Schultz E, Kerschbaum F, Frantzen M. Analysis of vulnerabilities in internet firewalls Computers and Security. 22: 214-232. DOI: 10.1016/S0167-4048(03)00310-9  0.414
2002 Meunier P, Nystrom S, Kamara S, Yost S, Alexander K, Noland D, Crane J. ActiveSync, TCP/IP and 802.11b wireless vulnerabilities of WinCE-based PDAs Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2002: 145-150. DOI: 10.1109/ENABL.2002.1030001  0.347
Show low-probability matches.