Access pattern disclosure on searchable encryption: Ramification, attack and mitigation MS Islam, M Kuzu, M Kantarcioglu Network and Distributed System Security Symposium (NDSS’12), 2012 | 943 | 2012 |
Efficient similarity search over encrypted data M Kuzu, MS Islam, M Kantarcioglu 2012 IEEE 28th International Conference on Data Engineering, 1156-1167, 2012 | 409 | 2012 |
Inference attack against encrypted range queries on outsourced databases MS Islam, M Kuzu, M Kantarcioglu Proceedings of the 4th ACM conference on Data and application security and …, 2014 | 73 | 2014 |
Distributed search over encrypted big data M Kuzu, MS Islam, M Kantarcioglu Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 20 | 2015 |
Efficient privacy-aware search over encrypted databases M Kuzu, MS Islam, M Kantarcioglu Proceedings of the 4th ACM Conference on Data and Application Security and …, 2014 | 19 | 2014 |
A dynamic approach to detect anomalous queries on relational databases MS Islam, M Kuzu, M Kantarcioglu Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 17 | 2015 |
CCTB: Context correlation for trust bootstrapping in pervasive environment SI Ahamed, M Monjur, MS Islam 2008 Sixth Annual Conference on Privacy, Security and Trust, 167-174, 2008 | 13 | 2008 |
Poster: Inference attacks against searchable encryption protocols MS Islam, M Kuzu, M Kantarcioglu Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 8 | 2011 |
A game theoretic approach for adversarial pipeline monitoring using Wireless Sensor Networks MS Islam, R Nix, M Kantarcioglu 2012 IEEE 13th International Conference on Information Reuse & Integration …, 2012 | 7 | 2012 |
A distributed framework for scalable search over encrypted documents M Kuzu, MS Islam, M Kantarcioglu arXiv preprint arXiv:1408.5539, 2014 | 1 | 2014 |
Security issues due to outsourcing sensitive data to the untrusted remote server MS Islam The University of Texas at Dallas, 2014 | | 2014 |