Searchable symmetric encryption: improved definitions and efficient constructions R Curtmola, J Garay, S Kamara, R Ostrovsky Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 3472 | 2006 |
Cryptographic cloud storage S Kamara, K Lauter International Conference on Financial Cryptography and Data Security, 136-149, 2010 | 2063 | 2010 |
Dynamic searchable symmetric encryption S Kamara, C Papamanthou, T Roeder Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 1397 | 2012 |
Parallel and dynamic searchable symmetric encryption S Kamara, C Papamanthou Financial Cryptography and Data Security: 17th International Conference, FC …, 2013 | 695 | 2013 |
Inference attacks on property-preserving encrypted databases M Naveed, S Kamara, CV Wright Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 682 | 2015 |
Structured encryption and controlled disclosure M Chase, S Kamara Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010 | 655 | 2010 |
Proofs of storage from homomorphic identification protocols G Ateniese, S Kamara, J Katz Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009 | 511 | 2009 |
Achieving efficient conjunctive keyword searches over encrypted data L Ballard, S Kamara, F Monrose Information and Communications Security: 7th International Conference, ICICS …, 2005 | 441 | 2005 |
Outsourcing multi-party computation S Kamara, P Mohassel, M Raykova Cryptology ePrint Archive, 2011 | 256 | 2011 |
Boolean searchable symmetric encryption with worst-case sub-linear complexity S Kamara, T Moataz Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017 | 255 | 2017 |
Analysis of vulnerabilities in internet firewalls S Kamara, S Fahmy, E Schultz, F Kerschbaum, M Frantzen Computers & Security 22 (3), 214-232, 2003 | 206 | 2003 |
Scaling private set intersection to billion-element sets S Kamara, P Mohassel, M Raykova, S Sadeghian Financial Cryptography and Data Security: 18th International Conference, FC …, 2014 | 192 | 2014 |
Grecs: Graph encryption for approximate shortest distance queries X Meng, S Kamara, K Nissim, G Kollios Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 165 | 2015 |
Revisiting leakage abuse attacks L Blackstone, S Kamara, T Moataz Cryptology ePrint Archive, 2019 | 145 | 2019 |
SQL on structurally-encrypted databases S Kamara, T Moataz Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018 | 145 | 2018 |
The Practical Subtleties of Biometric Key Generation. L Ballard, S Kamara, MK Reiter USENIX Security Symposium, 61-74, 2008 | 140 | 2008 |
Structured encryption and leakage suppression S Kamara, T Moataz, O Ohrimenko Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 136 | 2018 |
Computationally volume-hiding structured encryption S Kamara, T Moataz Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 135 | 2019 |
Salus: a system for server-aided secure function evaluation S Kamara, P Mohassel, B Riva Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 132 | 2012 |
Co-location-resistant clouds Y Azar, S Kamara, I Menache, M Raykova, B Shepard Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing …, 2014 | 111 | 2014 |