Searchable symmetric encryption: improved definitions and efficient constructions R Curtmola, J Garay, S Kamara, R Ostrovsky Journal of Computer Security 19 (5), 895-934, 2011 | 2918 | 2011 |
Cryptographic cloud storage S Kamara, K Lauter International Conference on Financial Cryptography and Data Security, 136-149, 2010 | 1908 | 2010 |
Dynamic searchable symmetric encryption S Kamara, C Papamanthou, T Roeder Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 1098 | 2012 |
Parallel and dynamic searchable symmetric encryption S Kamara, C Papamanthou International conference on financial cryptography and data security, 258-274, 2013 | 563 | 2013 |
Inference attacks on property-preserving encrypted databases M Naveed, S Kamara, CV Wright Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 531 | 2015 |
Proofs of storage from homomorphic identification protocols G Ateniese, S Kamara, J Katz International conference on the theory and application of cryptology and …, 2009 | 475 | 2009 |
Structured encryption and controlled disclosure M Chase, S Kamara International conference on the theory and application of cryptology and …, 2010 | 462 | 2010 |
Achieving efficient conjunctive keyword searches over encrypted data L Ballard, S Kamara, F Monrose International conference on information and communications security, 414-426, 2005 | 404 | 2005 |
Outsourcing multi-party computation S Kamara, P Mohassel, M Raykova Cryptology ePrint Archive, 2011 | 200 | 2011 |
Analysis of vulnerabilities in internet firewalls S Kamara, S Fahmy, E Schultz, F Kerschbaum, M Frantzen Computers & Security 22 (3), 214-232, 2003 | 185 | 2003 |
Boolean searchable symmetric encryption with worst-case sub-linear complexity S Kamara, T Moataz Annual International Conference on the Theory and Applications of …, 2017 | 169 | 2017 |
Scaling private set intersection to billion-element sets S Kamara, P Mohassel, M Raykova, S Sadeghian International Conference on Financial Cryptography and Data Security, 195-215, 2014 | 131 | 2014 |
The Practical Subtleties of Biometric Key Generation. L Ballard, S Kamara, MK Reiter USENIX Security Symposium, 61-74, 2008 | 124 | 2008 |
Salus: a system for server-aided secure function evaluation S Kamara, P Mohassel, B Riva Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 112 | 2012 |
Grecs: Graph encryption for approximate shortest distance queries X Meng, S Kamara, K Nissim, G Kollios Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 106 | 2015 |
SQL on structurally-encrypted databases S Kamara, T Moataz International Conference on the Theory and Application of Cryptology and …, 2018 | 94 | 2018 |
Co-location-resistant clouds Y Azar, S Kamara, I Menache, M Raykova, B Shepard Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing …, 2014 | 90 | 2014 |
Dynamic symmetric searchable encryption SF Kamara, C Papamanthou US Patent 8,930,691, 2015 | 85 | 2015 |
Cs2: A searchable cryptographic cloud storage system S Kamara, C Papamanthou, T Roeder Microsoft Research, TechReport MSR-TR-2011-58, 2011 | 83 | 2011 |
Key regression: Enabling efficient key distribution for secure distributed storage K Fu, S Kamara, T Kohno Computer Science Department Faculty Publication Series, 149, 2006 | 83 | 2006 |