The SCEAS System
Navigation Menu

Search the dblp DataBase


Seny Kamara: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Seny Kamara, Darren Davis, Lucas Ballard, Ryan Caudy, Fabian Monrose
    An Extensible Platform for Evaluating Security Protocols. [Citation Graph (0, 0)][DBLP]
    Annual Simulation Symposium, 2005, pp:204-213 [Conf]
  2. Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky
    Searchable symmetric encryption: improved definitions and efficient constructions. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:79-88 [Conf]
  3. Seny Kamara, Breno de Medeiros, Susanne Wetzel
    Secret locking: Exploring new approaches to biometric key encapsulation. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:254-261 [Conf]
  4. Lucas Ballard, Seny Kamara, Fabian Monrose
    Achieving Efficient Conjunctive Keyword Searches over Encrypted Data. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:414-426 [Conf]
  5. Kevin Fu, Seny Kamara, Yoshi Kohno
    Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  6. Pascal Meunier, Sofie Nystrom, Seny Kamara, Scott Yost, Kyle Alexander, Dan Noland, Jared Crane
    ActiveSync, TCP/IP and 802.11b Wireless Vulnerabilities of WinCE-Based PDAs. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:145-152 [Conf]
  7. Seny Kamara, Sonia Fahmy, E. Eugene Schultz, Florian Kerschbaum, Michael Frantzen
    Analysis of vulnerabilities in Internet firewalls. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:3, pp:214-232 [Journal]
  8. Reza Curtmola, Seny Kamara
    A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:171, n:1, pp:57-69 [Journal]

  9. Proofs of Storage from Homomorphic Identification Protocols. [Citation Graph (, )][DBLP]

  10. Towards practical biometric key generation with randomized biometric templates. [Citation Graph (, )][DBLP]

  11. Cryptographic Cloud Storage. [Citation Graph (, )][DBLP]

  12. How to Encrypt with a Malicious Random Number Generator. [Citation Graph (, )][DBLP]

  13. The Practical Subtleties of Biometric Key Generation. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002