Seguir
Seny Kamara
Seny Kamara
Dirección de correo verificada de brown.edu - Página principal
Título
Citado por
Citado por
Año
Searchable symmetric encryption: improved definitions and efficient constructions
R Curtmola, J Garay, S Kamara, R Ostrovsky
Proceedings of the 13th ACM conference on Computer and communications …, 2006
33292006
Cryptographic cloud storage
S Kamara, K Lauter
International Conference on Financial Cryptography and Data Security, 136-149, 2010
20322010
Dynamic searchable symmetric encryption
S Kamara, C Papamanthou, T Roeder
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
13022012
Parallel and dynamic searchable symmetric encryption
S Kamara, C Papamanthou
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
6632013
Inference attacks on property-preserving encrypted databases
M Naveed, S Kamara, CV Wright
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
6462015
Structured encryption and controlled disclosure
M Chase, S Kamara
Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010
5972010
Proofs of storage from homomorphic identification protocols
G Ateniese, S Kamara, J Katz
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
5002009
Achieving efficient conjunctive keyword searches over encrypted data
L Ballard, S Kamara, F Monrose
Information and Communications Security: 7th International Conference, ICICS …, 2005
4332005
Outsourcing multi-party computation
S Kamara, P Mohassel, M Raykova
Cryptology ePrint Archive, 2011
2412011
Boolean searchable symmetric encryption with worst-case sub-linear complexity
S Kamara, T Moataz
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
2342017
Analysis of vulnerabilities in internet firewalls
S Kamara, S Fahmy, E Schultz, F Kerschbaum, M Frantzen
Computers & Security 22 (3), 214-232, 2003
2012003
Scaling private set intersection to billion-element sets
S Kamara, P Mohassel, M Raykova, S Sadeghian
Financial Cryptography and Data Security: 18th International Conference, FC …, 2014
1782014
Grecs: Graph encryption for approximate shortest distance queries
X Meng, S Kamara, K Nissim, G Kollios
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1502015
The Practical Subtleties of Biometric Key Generation.
L Ballard, S Kamara, MK Reiter
USENIX Security Symposium, 61-74, 2008
1362008
SQL on structurally-encrypted databases
S Kamara, T Moataz
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
1322018
Salus: a system for server-aided secure function evaluation
S Kamara, P Mohassel, B Riva
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1252012
Revisiting leakage abuse attacks
L Blackstone, S Kamara, T Moataz
Cryptology ePrint Archive, 2019
1202019
Structured encryption and leakage suppression
S Kamara, T Moataz, O Ohrimenko
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
1202018
Computationally volume-hiding structured encryption
S Kamara, T Moataz
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
1142019
Co-location-resistant clouds
Y Azar, S Kamara, I Menache, M Raykova, B Shepard
Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing …, 2014
1062014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20