Year |
Citation |
Score |
2015 |
Meng X, Kamara S, Nissim K, Kollios G. GRECS: Graph EnCryption for approximate Shortest distance queries Proceedings of the Acm Conference On Computer and Communications Security. 2015: 504-517. DOI: 10.1145/2810103.2813672 |
0.323 |
|
2015 |
Naveed M, Kamara S, Wright CV. Inference attacks on property-preserving encrypted databases Proceedings of the Acm Conference On Computer and Communications Security. 2015: 644-655. DOI: 10.1145/2810103.2813651 |
0.365 |
|
2015 |
Ateniese G, Faonio A, Kamara S. Leakage-resilient identification schemes from zero-knowledge proofs of storage Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9496: 311-328. DOI: 10.1007/978-3-319-27239-9_19 |
0.401 |
|
2015 |
Kamara S. Encrypted search: Theory, practice and cryptanalysis Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9462. |
0.382 |
|
2014 |
Azar Y, Kamara S, Menache I, Raykovau M, Shepherdu B. Co-location-resistant clouds Proceedings of the Acm Conference On Computer and Communications Security. 2014: 9-20. DOI: 10.1145/2664168.2664179 |
0.437 |
|
2013 |
Valamehr JK, Chase M, Kamara S, Putnam A, Shumow D, Vaikuntanathan V, Sherwood T. Inspection-resistant memory architectures Ieee Micro. 33: 48-56. DOI: 10.1109/Mm.2013.27 |
0.402 |
|
2013 |
Kamara S, Raykova M. Parallel homomorphic encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7862: 213-225. DOI: 10.1007/978-3-642-41320-9_15 |
0.386 |
|
2013 |
Kamara S, Wei L. Garbled circuits via structured encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7862: 177-188. DOI: 10.1007/978-3-642-41320-9_12 |
0.303 |
|
2013 |
Kamara S, Papamanthou C. Parallel and dynamic searchable symmetric encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7859: 258-274. DOI: 10.1007/978-3-642-39884-1_22 |
0.412 |
|
2012 |
Kamara S, Papamanthou C, Roeder T. Dynamic searchable symmetric encryption Proceedings of the Acm Conference On Computer and Communications Security. 965-976. DOI: 10.1145/2382196.2382298 |
0.511 |
|
2012 |
Kamara S, Mohassel P, Riva B. Salus: A system for server-aided secure function evaluation Proceedings of the Acm Conference On Computer and Communications Security. 797-808. DOI: 10.1145/2382196.2382280 |
0.422 |
|
2012 |
Valamehr J, Chase M, Kamara S, Putnam A, Shumow D, Vaikuntanathan V, Sherwood T. Inspection resistant memory: Architectural support for security from physical examination Proceedings - International Symposium On Computer Architecture. 130-141. DOI: 10.1109/ISCA.2012.6237012 |
0.338 |
|
2011 |
Curtmola R, Garay J, Kamara S, Ostrovsky R. Searchable symmetric encryption: Improved definitions and efficient constructions Journal of Computer Security. 19: 895-934. DOI: 10.3233/Jcs-2011-0426 |
0.55 |
|
2010 |
Chase M, Kamara S. Structured encryption and controlled disclosure Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6477: 577-594. DOI: 10.1007/978-3-642-17373-8_33 |
0.336 |
|
2009 |
Ateniese G, Kamara S, Katz J. Proofs of storage from homomorphic identification protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5912: 319-333. DOI: 10.1007/978-3-642-10366-7_19 |
0.411 |
|
2008 |
Ballard L, Kamara S, Reiter MK, Monrose F. Towards practical biometric key generation with randomized biometric templates Proceedings of the Acm Conference On Computer and Communications Security. 235-244. DOI: 10.1145/1455770.1455801 |
0.523 |
|
2008 |
Kamara S, Katz J. How to encrypt with a malicious random number generator Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5086: 303-315. DOI: 10.1007/978-3-540-71039-4_19 |
0.43 |
|
2007 |
Curtmola R, Kamara S. A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks Electronic Notes in Theoretical Computer Science. 171: 57-69. DOI: 10.1016/J.Entcs.2006.11.009 |
0.402 |
|
2007 |
Kamara S, de Medeiros B, Wetzel S. Secret Locking: Exploring New Approaches to Biometric Key Encapsulation Communications in Computer and Information Science. 3: 101-112. DOI: 10.1007/978-3-540-75993-5_9 |
0.461 |
|
2005 |
Kamara S, Davis D, Ballard L, Caudy R, Monrose F. An extensible platform for evaluating security protocols Proceedings - Simulation Symposium. 204-213. DOI: 10.1109/ANSS.2005.11 |
0.557 |
|
2005 |
Ballard L, Kamara S, Monrose F. Achieving efficient conjunctive keyword searches over encrypted data Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3783: 414-426. DOI: 10.1007/11602897_35 |
0.559 |
|
2003 |
Kamara S, Fahmy S, Schultz E, Kerschbaum F, Frantzen M. Analysis of vulnerabilities in internet firewalls Computers and Security. 22: 214-232. DOI: 10.1016/S0167-4048(03)00310-9 |
0.414 |
|
2002 |
Meunier P, Nystrom S, Kamara S, Yost S, Alexander K, Noland D, Crane J. ActiveSync, TCP/IP and 802.11b wireless vulnerabilities of WinCE-based PDAs Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2002: 145-150. DOI: 10.1109/ENABL.2002.1030001 |
0.347 |
|
Show low-probability matches. |