Follow
Seny Kamara
Seny Kamara
Verified email at brown.edu - Homepage
Title
Cited by
Cited by
Year
Searchable symmetric encryption: improved definitions and efficient constructions
R Curtmola, J Garay, S Kamara, R Ostrovsky
Proceedings of the 13th ACM conference on Computer and communications …, 2006
33042006
Cryptographic cloud storage
S Kamara, K Lauter
International Conference on Financial Cryptography and Data Security, 136-149, 2010
20322010
Dynamic searchable symmetric encryption
S Kamara, C Papamanthou, T Roeder
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
12902012
Parallel and dynamic searchable symmetric encryption
S Kamara, C Papamanthou
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
6562013
Inference attacks on property-preserving encrypted databases
M Naveed, S Kamara, CV Wright
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
6302015
Structured encryption and controlled disclosure
M Chase, S Kamara
Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010
5792010
Proofs of storage from homomorphic identification protocols
G Ateniese, S Kamara, J Katz
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
5002009
Achieving efficient conjunctive keyword searches over encrypted data
L Ballard, S Kamara, F Monrose
Information and Communications Security: 7th International Conference, ICICS …, 2005
4292005
Outsourcing multi-party computation
S Kamara, P Mohassel, M Raykova
Cryptology ePrint Archive, 2011
2362011
Boolean searchable symmetric encryption with worst-case sub-linear complexity
S Kamara, T Moataz
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
2272017
Analysis of vulnerabilities in internet firewalls
S Kamara, S Fahmy, E Schultz, F Kerschbaum, M Frantzen
Computers & Security 22 (3), 214-232, 2003
2022003
Scaling private set intersection to billion-element sets
S Kamara, P Mohassel, M Raykova, S Sadeghian
Financial Cryptography and Data Security: 18th International Conference, FC …, 2014
1722014
Grecs: Graph encryption for approximate shortest distance queries
X Meng, S Kamara, K Nissim, G Kollios
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1442015
The Practical Subtleties of Biometric Key Generation.
L Ballard, S Kamara, MK Reiter
USENIX Security Symposium, 61-74, 2008
1342008
SQL on structurally-encrypted databases
S Kamara, T Moataz
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
1242018
Salus: a system for server-aided secure function evaluation
S Kamara, P Mohassel, B Riva
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1222012
Structured encryption and leakage suppression
S Kamara, T Moataz, O Ohrimenko
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
1142018
Revisiting leakage abuse attacks
L Blackstone, S Kamara, T Moataz
Cryptology ePrint Archive, 2019
1052019
Co-location-resistant clouds
Y Azar, S Kamara, I Menache, M Raykova, B Shepard
Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing …, 2014
1052014
Computationally volume-hiding structured encryption
S Kamara, T Moataz
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
1042019
The system can't perform the operation now. Try again later.
Articles 1–20