Strathprints Home | Open Access | Browse | Search | User area | Copyright | Help | Library Home | SUPrimo

Browse by Author or Creator

Up a level
Export as [feed] RSS 2.0 [feed] RSS 1.0 [feed] Atom
Group by: Item type | No Grouping
Number of items: 20.

Article

Dong, Changyu and Russello, Giovanni and Dulay, Naranker (2011) Shared and searchable encrypted data for untrusted servers. Journal of Computer Security, 19 (3). pp. 367-397. ISSN 0926-227X

Russello, Giovanni and Dong, Changyu and Dulay, Naranker and Chaudron, Michel and van Steen, Maarten (2010) Providing data confidentiality against malicious hosts in shared data spaces. Science of Computer Programming, 75 (6). pp. 426-439. ISSN 0167-6423

Mostarda, Leonardo and Dong, Changyu and Dulay, Naranker (2010) Context-based authentication and transport of cultural assets. Personal and Ubiquitous Computing, 14 (4). pp. 321-334. ISSN 1617-4909

Book Section

Wen, Zikai and Dong, Changyu (2014) Efficient protocols for private record linkage. In: Proceedings of 29th ACM Symposium On Applied Computing. ACM, pp. 1688-1694. ISBN 978-1-4503-2469-4

Dong, Changyu and Chen, Liqun (2014) A fast secure dot product protocol with application to privacy preserving association rule mining. In: Advances in Knowledge Discovery and Data Mining. Lecture Notes in Computer Science . Springer, pp. 606-617. ISBN 978-3-319-06607-3

Dong, Changyu and Chen, Liqun (2014) A fast single server private information retrieval protocol with low communication cost. In: Computer Security - ESORICS 2014. Lecture Notes in Computer Science . Springer, pp. 380-399. ISBN 978-3-319-11202-2

Dong, Changyu and Chen, Liqun and Wen, Zikai (2013) When private set intersection meets big data : an efficient and scalable protocol. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM, New York, pp. 789-800. ISBN 9781450324779 (In Press)

Dong, Changyu and Chen, Liqun and Camenisch, Jan and Russello, Giovanni (2013) Fair private set intersection with a semi-trusted arbiter. In: Data and Applications Security and Privacy XXVII. Lecture Notes in Computer Science, Springer, pp. 128-144.

Dong, Changyu and Dulay, Naranker (2011) Longitude : a privacy-preserving location sharing protocol for mobile applications. In: Trust Management V. Springer-Verlag Berlin, pp. 133-148. ISBN 978-3-642-22200-9

Dong, Changyu and Dulay, Naranker (2010) Shinren : Non-monotonic trust management for distributed systems. In: Trust Management IV. Springer, pp. 125-140. ISBN 978-3-642-13445-6

Russello, Giovanni and Dong, Changyu and Dulay, Naranker (2009) A Framework for Capturing Patient Consent in Pervasive Healthcare Applications. In: Mobile Health Solutions for Biomedical Applications. IGI Global, pp. 245-259. ISBN 9781605663326

Conference or Workshop Item

Dong, Changyu and Dulay, Naranker (2011) Argumentation-based fault diagnosis for home networks. In: 2nd ACM SIGCOMM workshop on Home networks, 2011-08-15.

Pediaditakis, Dimosthenis and Mostarda, Leonardo and Dong, Changyu and Dulay, Naranker (2009) Policies for Self Tuning Home Networks. In: 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, 2009-07-20.

Dong, Changyu and Russello, Giovanni and Dulay, Naranker (2008) Flexible Resolution of Authorisation Conflicts in Distributed Systems. In: 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, 2008-09-22.

Dong, Changyu and Russello, Giovanni and Dulay, Naranker (2008) Shared and Searchable Encrypted Data for Untrusted Servers. In: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, 2008-07-13.

Russello, Giovanni and Dong, Changyu and Dulay, Naranker (2008) A Workflow-based Access Control Framework for Healthcare Applications. In: The Fourth International Symposium on Frontiers in Networking with Applications, 2008-03-25.

Russello, Giovanni and Dong, Changyu and Dulay, Naranker (2008) Personalizing Situated Workflows for Pervasive Healthcare Applications. In: 2nd International Conference on Pervasive Computing Technologies for Healthcare, 2008-01-30.

Russello, Giovanni and Dong, Changyu and Dulay, Naranker (2008) A Consent-based Workflow System for Healthcare Systems. In: 9th IEEE International Workshop on Policies for Distributed Systems and Networks, 2008-06-02.

Russello, Giovanni and Dong, Changyu and Dulay, Naranker and Chaudron, Michel and van Steen, Maarten (2008) Encrypted Shared Data Spaces. In: 10th international conference on Coordination models and languages, 2008-06-04.

Mostarda, Leonardo and Dong, Changyu and Dulay, Naranker (2008) Place and Time Authentication of Cultural Assets. In: IFIP WG11.11 International Conference on Trust Management, 2011-03-31.

This list was generated on Wed Oct 29 16:04:25 2014 GMT.