Follow
Seny Kamara
Seny Kamara
Verified email at brown.edu - Homepage
Title
Cited by
Cited by
Year
Searchable symmetric encryption: improved definitions and efficient constructions
R Curtmola, J Garay, S Kamara, R Ostrovsky
Proceedings of the 13th ACM conference on Computer and communications …, 2006
33142006
Cryptographic cloud storage
S Kamara, K Lauter
International Conference on Financial Cryptography and Data Security, 136-149, 2010
20252010
Dynamic searchable symmetric encryption
S Kamara, C Papamanthou, T Roeder
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
12962012
Parallel and dynamic searchable symmetric encryption
S Kamara, C Papamanthou
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
6602013
Inference attacks on property-preserving encrypted databases
M Naveed, S Kamara, CV Wright
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
6372015
Structured encryption and controlled disclosure
M Chase, S Kamara
Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010
5912010
Proofs of storage from homomorphic identification protocols
G Ateniese, S Kamara, J Katz
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
4992009
Achieving efficient conjunctive keyword searches over encrypted data
L Ballard, S Kamara, F Monrose
Information and Communications Security: 7th International Conference, ICICS …, 2005
4322005
Outsourcing multi-party computation
S Kamara, P Mohassel, M Raykova
Cryptology ePrint Archive, 2011
2382011
Boolean searchable symmetric encryption with worst-case sub-linear complexity
S Kamara, T Moataz
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
2332017
Analysis of vulnerabilities in internet firewalls
S Kamara, S Fahmy, E Schultz, F Kerschbaum, M Frantzen
Computers & Security 22 (3), 214-232, 2003
2012003
Scaling private set intersection to billion-element sets
S Kamara, P Mohassel, M Raykova, S Sadeghian
Financial Cryptography and Data Security: 18th International Conference, FC …, 2014
1742014
Grecs: Graph encryption for approximate shortest distance queries
X Meng, S Kamara, K Nissim, G Kollios
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1472015
The Practical Subtleties of Biometric Key Generation.
L Ballard, S Kamara, MK Reiter
USENIX Security Symposium, 61-74, 2008
1362008
SQL on structurally-encrypted databases
S Kamara, T Moataz
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
1312018
Salus: a system for server-aided secure function evaluation
S Kamara, P Mohassel, B Riva
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1232012
Structured encryption and leakage suppression
S Kamara, T Moataz, O Ohrimenko
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
1192018
Revisiting leakage abuse attacks
L Blackstone, S Kamara, T Moataz
Cryptology ePrint Archive, 2019
1152019
Computationally volume-hiding structured encryption
S Kamara, T Moataz
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
1122019
Co-location-resistant clouds
Y Azar, S Kamara, I Menache, M Raykova, B Shepard
Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing …, 2014
1062014
The system can't perform the operation now. Try again later.
Articles 1–20