James Alderman
James Alderman
Thales Cyber and Consulting (UK)
Verified email at live.rhul.ac.uk
Title
Cited by
Cited by
Year
Multi-level access in searchable symmetric encryption
J Alderman, KM Martin, SL Renwick
International conference on financial cryptography and data security, 35-52, 2017
192017
Access control in publicly verifiable outsourced computation
J Alderman, C Janson, C Cid, J Crampton
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
182015
Revocation in publicly verifiable outsourced computation
J Alderman, C Janson, C Cid, J Crampton
International Conference on Information Security and Cryptology, 51-71, 2014
142014
Hybrid publicly verifiable computation
J Alderman, C Janson, C Cid, J Crampton
Cryptographers’ Track at the RSA Conference, 147-163, 2016
132016
Tree-based cryptographic access control
J Alderman, N Farley, J Crampton
European Symposium on Research in Computer Security, 47-64, 2017
122017
Extended functionality in verifiable searchable encryption
J Alderman, C Janson, KM Martin, SL Renwick
International Conference on Cryptography and Information Security in the …, 2015
72015
A framework for the cryptographic enforcement of information flow policies
J Alderman, J Crampton, N Farley
Proceedings of the 22nd ACM on Symposium on Access Control Models and …, 2017
52017
On the use of key assignment schemes in authentication protocols
J Alderman, J Crampton
International Conference on Network and System Security, 607-613, 2013
42013
Private outsourced kriging interpolation
J Alderman, BR Curtis, O Farrŕs, KM Martin, J Ribes-González
International Conference on Financial Cryptography and Data Security, 75-90, 2017
22017
Cryptographic tools for cloud environments
J Alderman, J Crampton, KM Martin
Guide to security assurance for cloud computing, 15-30, 2015
22015
On the use of Attribute-based Encryption in Publicly Verifiable Outsourced Computation
J Alderman
Royal Holloway, University of London, 2016
12016
The CLARUS modules V1
F Brouillé, T Chevallier, M Azraoui, K Elkhiyaoui, M Önen, W Mallouli, ...
Multi-level Searchable Symmetric Encryption
SL Renwick, J Alderman, KM Martin
A framework for user centred privacy and security in the cloud
F Brouillé, T Chevallier, M Azraoui, K Elkhiyaoui, M Önen, W Mallouli, ...
Characterization of enabling technologies
J Alderman
The system can't perform the operation now. Try again later.
Articles 1–15