|
Search the dblp DataBase
Seny Kamara:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Seny Kamara, Darren Davis, Lucas Ballard, Ryan Caudy, Fabian Monrose
An Extensible Platform for Evaluating Security Protocols. [Citation Graph (0, 0)][DBLP] Annual Simulation Symposium, 2005, pp:204-213 [Conf]
- Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky
Searchable symmetric encryption: improved definitions and efficient constructions. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:79-88 [Conf]
- Seny Kamara, Breno de Medeiros, Susanne Wetzel
Secret locking: Exploring new approaches to biometric key encapsulation. [Citation Graph (0, 0)][DBLP] ICETE, 2005, pp:254-261 [Conf]
- Lucas Ballard, Seny Kamara, Fabian Monrose
Achieving Efficient Conjunctive Keyword Searches over Encrypted Data. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:414-426 [Conf]
- Kevin Fu, Seny Kamara, Yoshi Kohno
Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- Pascal Meunier, Sofie Nystrom, Seny Kamara, Scott Yost, Kyle Alexander, Dan Noland, Jared Crane
ActiveSync, TCP/IP and 802.11b Wireless Vulnerabilities of WinCE-Based PDAs. [Citation Graph (0, 0)][DBLP] WETICE, 2002, pp:145-152 [Conf]
- Seny Kamara, Sonia Fahmy, E. Eugene Schultz, Florian Kerschbaum, Michael Frantzen
Analysis of vulnerabilities in Internet firewalls. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:3, pp:214-232 [Journal]
- Reza Curtmola, Seny Kamara
A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:171, n:1, pp:57-69 [Journal]
Proofs of Storage from Homomorphic Identification Protocols. [Citation Graph (, )][DBLP]
Towards practical biometric key generation with randomized biometric templates. [Citation Graph (, )][DBLP]
Cryptographic Cloud Storage. [Citation Graph (, )][DBLP]
How to Encrypt with a Malicious Random Number Generator. [Citation Graph (, )][DBLP]
The Practical Subtleties of Biometric Key Generation. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|