Folgen
Seny Kamara
Seny Kamara
Bestätigte E-Mail-Adresse bei brown.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Searchable symmetric encryption: improved definitions and efficient constructions
R Curtmola, J Garay, S Kamara, R Ostrovsky
Proceedings of the 13th ACM conference on Computer and communications …, 2006
33142006
Cryptographic cloud storage
S Kamara, K Lauter
International Conference on Financial Cryptography and Data Security, 136-149, 2010
20252010
Dynamic searchable symmetric encryption
S Kamara, C Papamanthou, T Roeder
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
12962012
Parallel and dynamic searchable symmetric encryption
S Kamara, C Papamanthou
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
6602013
Inference attacks on property-preserving encrypted databases
M Naveed, S Kamara, CV Wright
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
6372015
Structured encryption and controlled disclosure
M Chase, S Kamara
Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010
5912010
Proofs of storage from homomorphic identification protocols
G Ateniese, S Kamara, J Katz
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
4992009
Achieving efficient conjunctive keyword searches over encrypted data
L Ballard, S Kamara, F Monrose
Information and Communications Security: 7th International Conference, ICICS …, 2005
4322005
Outsourcing multi-party computation
S Kamara, P Mohassel, M Raykova
Cryptology ePrint Archive, 2011
2382011
Boolean searchable symmetric encryption with worst-case sub-linear complexity
S Kamara, T Moataz
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
2332017
Analysis of vulnerabilities in internet firewalls
S Kamara, S Fahmy, E Schultz, F Kerschbaum, M Frantzen
Computers & Security 22 (3), 214-232, 2003
2012003
Scaling private set intersection to billion-element sets
S Kamara, P Mohassel, M Raykova, S Sadeghian
Financial Cryptography and Data Security: 18th International Conference, FC …, 2014
1742014
Grecs: Graph encryption for approximate shortest distance queries
X Meng, S Kamara, K Nissim, G Kollios
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1472015
The Practical Subtleties of Biometric Key Generation.
L Ballard, S Kamara, MK Reiter
USENIX Security Symposium, 61-74, 2008
1362008
SQL on structurally-encrypted databases
S Kamara, T Moataz
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
1312018
Salus: a system for server-aided secure function evaluation
S Kamara, P Mohassel, B Riva
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1232012
Structured encryption and leakage suppression
S Kamara, T Moataz, O Ohrimenko
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
1192018
Revisiting leakage abuse attacks
L Blackstone, S Kamara, T Moataz
Cryptology ePrint Archive, 2019
1152019
Computationally volume-hiding structured encryption
S Kamara, T Moataz
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
1122019
Co-location-resistant clouds
Y Azar, S Kamara, I Menache, M Raykova, B Shepard
Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing …, 2014
1062014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20