Filter
Conference contribution

Search results

  • 2023

    Bootstrapping Trust in Community Repository Projects

    Vaidya, S., Torres-Arias, S., Cappos, J. & Curtmola, R., 2023, Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Proceedings. Li, F., Liang, K., Lin, Z. & Katsikas, S. K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 450-469 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 462 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • PREFHE, PREFHE-AES and PREFHE-SGX: Secure Multiparty Computation Protocols from Fully Homomorphic Encryption and Proxy ReEncryption with AES and Intel SGX

    Yakupoglu, C. & Rohloff, K., 2023, Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Proceedings. Li, F., Liang, K., Lin, Z. & Katsikas, S. K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 819-837 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 462 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2022

    Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses

    Zaheri, M., Oren, Y. & Curtmola, R., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 1505-1523 19 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Towards Efficient FHE Based cPIR Schemes and Their Parameter Selection

    Yakupoglu, C. & Rohloff, K., Aug 23 2022, Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022. Association for Computing Machinery, 136. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2021

    Encrypted-Input Obfuscation of Image Classifiers

    Di Crescenzo, G., Bahler, L., Coan, B. A., Rohloff, K., Cousins, D. B. & Polyakov, Y., 2021, Data and Applications Security and Privacy XXXV - 35th Annual IFIP WG 11.3 Conference, DBSec 2021, Proceedings. Barker, K. & Ghazinour, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 136-156 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12840 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Leakuidator: Leaky Resource Attacks and Countermeasures

    Zaheri, M. & Curtmola, R., 2021, Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Proceedings. Garcia-Alfaro, J., Li, S., Poovendran, R., Debar, H. & Yung, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 143-163 21 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 399 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2020

    Accelerating lattice based proxy re-encryption schemes on GPUs

    Sahu, G. & Rohloff, K., 2020, Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings. Krenn, S., Shulman, H. & Vaudenay, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 613-632 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12579 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • 2019

    Auditable Compressed Storage

    Leontiadis, I. & Curtmola, R., 2019, Information Security - 22nd International Conference, ISC 2019, Proceedings. Lin, Z., Papamanthou, C. & Polychronakis, M. (eds.). Springer Verlag, p. 67-86 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11723 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Commit signatures for centralized version control systems

    Vaidya, S., Torres-Arias, S., Curtmola, R. & Cappos, J., 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Karlsson, F., Hedström, K. & Zúquete, A. (eds.). Springer New York LLC, p. 359-373 15 p. (IFIP Advances in Information and Communication Technology; vol. 562).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    7 Scopus citations
  • Homomorphic encryption for privacy-preserving genome sequences search

    Yamada, Y., Rohloff, K. & Oguchi, M., Jun 2019, Proceedings - 2019 IEEE International Conference on Smart Computing, SMARTCOMP 2019. Institute of Electrical and Electronics Engineers Inc., p. 7-12 6 p. 8784009. (Proceedings - 2019 IEEE International Conference on Smart Computing, SMARTCOMP 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • In-Toto: Providing farm-to-table guarantees for bits and bytes

    Torres-Arias, S., Afzali, H., Kuppusamy, T. K., Curtmola, R. & Cappos, J., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 1393-1410 18 p. (Proceedings of the 28th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Multi-destination vehicular route planning with parking and traffic constraints

    Hakeem, A., Gehani, N., Ding, X., Curtmola, R. & Borcea, C., Nov 12 2019, Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2019. Association for Computing Machinery, p. 298-307 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Ramparts: A programmer-friendly system for building homomorphic encryption applications

    Archer, D. W., Calderón Trilla, J. M., Dagit, J., Malozemoff, A. J., Polyakov, Y., Rohloff, K. & Ryan, G., Nov 11 2019, WAHC 2019 - Proceedings of the 7th ACM Workshop on Encrypted Computing and Applied Homomorphic Cryptography. Association for Computing Machinery, p. 57-68 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Scopus citations
  • WAHC'19: 7th workshop on encrypted computing & applied homomorphic cryptography

    Brenner, M., Lepoint, T. & Rohloff, K., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2703-2704 2 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2018

    Implementation and evaluation of improved Gaussian sampling for latice trapdoors

    Gür, K. D., Polyakov, Y., Rohloff, K., Ryan, G. W. & Savaş, E., Oct 15 2018, WAHC 2018 - Proceedings of the 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, co-located with CCS 2018. Association for Computing Machinery, p. 61-71 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    7 Scopus citations
  • Implementing Conjunction Obfuscation under Entropic Ring LWE

    Cousins, D. B., Di Crescenzo, G., Gur, K. D., King, K., Polyakov, Y., Rohloff, K., Ryan, G. W. & Savas, E., Jul 23 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy, SP 2018. Institute of Electrical and Electronics Engineers Inc., p. 354-371 18 p. 8418613. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2018-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    14 Scopus citations
  • LID-Fingerprint: A Local Intrinsic Dimensionality-Based Fingerprinting Method

    Houle, M. E., Oria, V., Rohloff, K. R. & Wali, A. M., 2018, Similarity Search and Applications - 11th International Conference, SISAP 2018, Proceedings. Marchand-Maillet, S., Silva, Y. N. & Chávez, E. (eds.). Springer Verlag, p. 134-147 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Secure Proxy-Reencryption-Based Inter-Network Key Exchange

    Greenwald, L., Rohloff, K. & Stott, D., Jul 2 2018, 2018 IEEE Military Communications Conference, MILCOM 2018. Institute of Electrical and Electronics Engineers Inc., p. 780-785 6 p. 8599794. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2019-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • WAHC’18: 6th workshop on encrypted computing and applied homomorphic cryptography

    Brenner, M. & Rohloff, K., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2183-2184 2 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2017

    FaceDate: A mobile cloud computing app for people matching invited paper

    Neog, P., Debnath, H., Shan, J., Paiker, N. R., Gehani, N., Curtmola, R., Ding, X. & Borcea, C., Apr 24 2017, BODYNETS 2016 - 11th International Conference on Body Area Networks. EAI

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Practical implementation of lattice-based program obfuscators for point functions

    Bahler, L., Crescenzo, G. D., Polyakov, Y., Rohloff, K. & Cousins, D. B., Sep 12 2017, Proceedings - 2017 International Conference on High Performance Computing and Simulation, HPCS 2017. Smari, W. W. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 761-768 8 p. 8035154. (Proceedings - 2017 International Conference on High Performance Computing and Simulation, HPCS 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Workshop on multimedia privacy and security

    Hallman, R., Rohloff, K. & Chang, V., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2645-2646 2 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2016

    An Overlay File System for cloud-assisted mobile applications

    Shan, J., Paiker, N. R., Ding, X., Gehani, N., Curtmola, R. & Borcea, C., Jul 2 2016, 2016 32nd Symposium on Mass Storage Systems and Technologies, MSST 2016. IEEE Computer Society, 7897093. (IEEE Symposium on Mass Storage Systems and Technologies; vol. 0).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • On omitting commits and committing omissions: Preventing Git metadata tampering that (re)introduces software vulnerabilities

    Torres-Arias, S., Ammula, A. K., Curtmola, R. & Cappos, J., Jan 1 2016, Proceedings of the 25th USENIX Security Symposium. USENIX Association, p. 379-395 17 p. (Proceedings of the 25th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Scopus citations
  • Practical implementations of program obfuscators for point functions

    Di Crescenzo, G., Bahler, L., Coan, B., Polyakov, Y., Rohloff, K. & Cousins, D. B., Sep 13 2016, 2016 International Conference on High Performance Computing and Simulation, HPCS 2016. Zeljkovic, V. & Smari, W. W. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 460-467 8 p. 7568371. (2016 International Conference on High Performance Computing and Simulation, HPCS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Privacy-Preserving Data Exfiltration Monitoring Using Homomorphic Encryption

    Rohloff, K., Jan 4 2016, Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015. Zhang, T., Das, S. K., Zhang, T. & Qiu, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 48-53 6 p. 7371458. (Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Secure access delegation of encrypted medical information

    Deb Gupta, A., Polyakov, Y. & Rohloff, K., Jun 23 2016, 2016 10th International Symposium on Medical Information and Communication Technology, ISMICT 2016. IEEE Computer Society, 7498900. (International Symposium on Medical Information and Communication Technology, ISMICT; vol. 2016-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Securely Sharing Encrypted Medical Information

    Gupta, A. D., Polyakov, Y., Rohloff, K. & Ryan, G., Aug 16 2016, Proceedings - 2016 IEEE 1st International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2016. Institute of Electrical and Electronics Engineers Inc., p. 330-331 2 p. 7545851. (Proceedings - 2016 IEEE 1st International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • WAHC 2016: 4th workshop on encrypted computing and applied homomorphic cryptography

    Brenner, M. & Rohloff, K., 2016, Financial Cryptography and Data Security - International Workshops, FC 2016, BITCOIN, VOTING, and WAHC, Revised Selected Papers. Rohloff, K., Clark, J., Meiklejohn, S., Wallach, D., Brenner, M. & Ryan, P. Y. A. (eds.). Springer Verlag, p. IX-X (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9604 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2015

    An end-to-end security architecture to collect, process and share wearable medical device data

    Rohloff, K. & Polyakov, Y., 2015, 2015 17th International Conference on E-Health Networking, Application and Services, HealthCom 2015. Institute of Electrical and Electronics Engineers Inc., p. 615-620 6 p. 7454578. (2015 17th International Conference on E-Health Networking, Application and Services, HealthCom 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • WAHC 2015: Third workshop on encrypted computing and applied homomorphic cryptography

    Brenner, M. & Rohloff, K., 2015, Financial Cryptography and Data Security - FC 2015 International Workshops BITCOIN, WAHC, and Wearable, Revised Selected Papers. Christin, N., Rohloff, K., Brenner, M., Christin, N., Brenner, M., Johnson, B., Johnson, B. & Rohloff, K. (eds.). Springer Verlag, p. VII (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8976).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2012

    Entropy attacks and countermeasures in wireless network coding

    Newell, A., Curtmola, R. & Nita-Rotaru, C., 2012, WiSec'12 - Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks. p. 185-196 12 p. (WiSec'12 - Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    11 Scopus citations
  • 2010

    Pollution attacks and defenses in wireless inter-flow network coding systems

    Dong, J., Curtmola, R., Nita-Rotaru, C. & Yau, D., 2010, 2010 3rd IEEE International Workshop on Wireless Network Coding, WiNC 2010. p. 1-6 6 p. 5507941. (2010 3rd IEEE International Workshop on Wireless Network Coding, WiNC 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations