Searchable symmetric encryption: improved definitions and efficient constructions R Curtmola, J Garay, S Kamara, R Ostrovsky Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 3427 | 2006 |
Cryptographic cloud storage S Kamara, K Lauter International Conference on Financial Cryptography and Data Security, 136-149, 2010 | 2053 | 2010 |
Dynamic searchable symmetric encryption S Kamara, C Papamanthou, T Roeder Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 1364 | 2012 |
Parallel and dynamic searchable symmetric encryption S Kamara, C Papamanthou Financial Cryptography and Data Security: 17th International Conference, FC …, 2013 | 684 | 2013 |
Inference attacks on property-preserving encrypted databases M Naveed, S Kamara, CV Wright Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 676 | 2015 |
Structured encryption and controlled disclosure M Chase, S Kamara Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010 | 636 | 2010 |
Proofs of storage from homomorphic identification protocols G Ateniese, S Kamara, J Katz Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009 | 506 | 2009 |
Achieving efficient conjunctive keyword searches over encrypted data L Ballard, S Kamara, F Monrose Information and Communications Security: 7th International Conference, ICICS …, 2005 | 439 | 2005 |
Outsourcing multi-party computation S Kamara, P Mohassel, M Raykova Cryptology ePrint Archive, 2011 | 251 | 2011 |
Boolean searchable symmetric encryption with worst-case sub-linear complexity S Kamara, T Moataz Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017 | 248 | 2017 |
Analysis of vulnerabilities in internet firewalls S Kamara, S Fahmy, E Schultz, F Kerschbaum, M Frantzen Computers & Security 22 (3), 214-232, 2003 | 205 | 2003 |
Scaling private set intersection to billion-element sets S Kamara, P Mohassel, M Raykova, S Sadeghian Financial Cryptography and Data Security: 18th International Conference, FC …, 2014 | 191 | 2014 |
Grecs: Graph encryption for approximate shortest distance queries X Meng, S Kamara, K Nissim, G Kollios Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 161 | 2015 |
SQL on structurally-encrypted databases S Kamara, T Moataz Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018 | 142 | 2018 |
The Practical Subtleties of Biometric Key Generation. L Ballard, S Kamara, MK Reiter USENIX Security Symposium, 61-74, 2008 | 140 | 2008 |
Revisiting leakage abuse attacks L Blackstone, S Kamara, T Moataz Cryptology ePrint Archive, 2019 | 134 | 2019 |
Structured encryption and leakage suppression S Kamara, T Moataz, O Ohrimenko Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 133 | 2018 |
Computationally volume-hiding structured encryption S Kamara, T Moataz Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 129 | 2019 |
Salus: a system for server-aided secure function evaluation S Kamara, P Mohassel, B Riva Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 128 | 2012 |
Co-location-resistant clouds Y Azar, S Kamara, I Menache, M Raykova, B Shepard Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing …, 2014 | 110 | 2014 |