Browse by Author or creator
2019
Abadi, Aydin and Terzis, Sotirios and Metere, Roberto and Dong, Changyu (2019) Efficient delegated private set intersection on outsourced private datasets. IEEE Transactions on Dependable and Secure Computing, 16 (4). pp. 608-624. ISSN 1545-5971
2016
Abadi, Aydin and Terzis, Sotirios and Dong, Changyu; Grossklags, Jens and Preneel, Bart, eds. (2016) VD-PSI : verifiable delegated private set intersection on outsourced private datasets. In: Financial Cryptography and Data Security. Lecture Notes in Computer Science, 9603 . Springer-Verlag Berlin, BRB, pp. 149-168. ISBN 978-3-662-54969-8
2015
Dong, Changyu; Christianson, Bruce and Švenda, Petr and Matyáš, Vashek and Malcolm, James and Stajano, Frank and Anderson, Jonathan, eds. (2015) Efficient data intensive secure computation : fictional or real. In: Security Protocols XXIII. Security and Cryptology, 9379 (1). Springer International Publishing AG, pp. 1-11. ISBN 978-3-319-26095-2
Dong, Changyu and Kiefer, Franziskus; Reiter, Michael and Naccache, David, eds. (2015) Secure set-based policy checking and its application to password registration. In: Cryptology and Network Security. Security and Cryptology . Springer-Verlag Berlin, pp. 59-74. ISBN 978-3-319-26823-1
Abadi, Aydin and Terzis, Sortirios and Dong, Changyu (2015) O-PSI : delegated private set intersection on outsourced datasets. In: International Conference on ICT Systems Security and Privacy Protection, 2015-05-26 - 2015-05-28.
2014
Wen, Zikai and Dong, Changyu; (2014) Efficient protocols for private record linkage. In: Proceedings of 29th ACM Symposium on Applied Computing. ACM, New York, pp. 1688-1694. ISBN 9781450324694
Dong, Changyu and Chen, Liqun; Tseng, Vincent S. and Ho, Tu Bao and Zhou, Zhi-Hua and Chen, Arbee L. P. and Kao, Hung-Yu, eds. (2014) A fast secure dot product protocol with application to privacy preserving association rule mining. In: Advances in Knowledge Discovery and Data Mining. Lecture Notes in Computer Science . Springer, pp. 606-617. ISBN 9783319066073
Dong, Changyu and Chen, Liqun; Kutyłowski, Mirosław and Vaidya, Jaideep, eds. (2014) A fast single server private information retrieval protocol with low communication cost. In: Computer Security - ESORICS 2014. Lecture Notes in Computer Science . Springer, pp. 380-399. ISBN 9783319112022
2013
Dong, Changyu and Chen, Liqun and Wen, Zikai; (2013) When private set intersection meets big data : an efficient and scalable protocol. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM, DEU, pp. 789-800. ISBN 9781450324779 (In Press)
Dong, Changyu and Chen, Liqun and Camenisch, Jan and Russello, Giovanni; Wang, Lingyu and Shafiq, Basit, eds. (2013) Fair private set intersection with a semi-trusted arbiter. In: Data and Applications Security and Privacy XXVII. Lecture Notes in Computer Science, 7964 . Springer, pp. 128-144.
2011
Dong, Changyu and Dulay, Naranker; Wakeman, Ian and Gudes, Ehud and Damsgaard Jensen, Christian and Crampton, Jason, eds. (2011) Longitude : a privacy-preserving location sharing protocol for mobile applications. In: Trust Management V. Springer-Verlag Berlin, JPN, pp. 133-148. ISBN 978-3-642-22200-9
Dong, Changyu and Dulay, Naranker (2011) Argumentation-based fault diagnosis for home networks. In: 2nd ACM SIGCOMM workshop on Home networks, 2011-08-15.
Dong, Changyu and Russello, Giovanni and Dulay, Naranker (2011) Shared and searchable encrypted data for untrusted servers. Journal of Computer Security, 19 (3). pp. 367-397. ISSN 0926-227X
2010
Dong, Changyu and Dulay, Naranker; Nishigaki, Masakatsu and Jøsang, Audun and Murayama, Yuko and Marsh, Stephen, eds. (2010) Shinren : Non-monotonic trust management for distributed systems. In: Trust Management IV. Springer, JPN, pp. 125-140. ISBN 9783642134463
Russello, Giovanni and Dong, Changyu and Dulay, Naranker and Chaudron, Michel and van Steen, Maarten (2010) Providing data confidentiality against malicious hosts in shared data spaces. Science of Computer Programming, 75 (6). pp. 426-439. ISSN 0167-6423
Mostarda, Leonardo and Dong, Changyu and Dulay, Naranker (2010) Context-based authentication and transport of cultural assets. Personal and Ubiquitous Computing, 14 (4). pp. 321-334. ISSN 1617-4909
2009
Russello, Giovanni and Dong, Changyu and Dulay, Naranker; Olla, Phillip and Tan, Joseph, eds. (2009) A Framework for Capturing Patient Consent in Pervasive Healthcare Applications. In: Mobile Health Solutions for Biomedical Applications. IGI Global, pp. 245-259. ISBN 9781605663326
Pediaditakis, Dimosthenis and Mostarda, Leonardo and Dong, Changyu and Dulay, Naranker (2009) Policies for Self Tuning Home Networks. In: 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, 2009-07-20.
2008
Dong, Changyu and Russello, Giovanni and Dulay, Naranker (2008) Flexible Resolution of Authorisation Conflicts in Distributed Systems. In: 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, 2008-09-22.
Dong, Changyu and Russello, Giovanni and Dulay, Naranker (2008) Shared and Searchable Encrypted Data for Untrusted Servers. In: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, 2008-07-13.
Russello, Giovanni and Dong, Changyu and Dulay, Naranker (2008) A Workflow-based Access Control Framework for Healthcare Applications. In: The Fourth International Symposium on Frontiers in Networking with Applications, 2008-03-25.
Russello, Giovanni and Dong, Changyu and Dulay, Naranker (2008) Personalizing Situated Workflows for Pervasive Healthcare Applications. In: 2nd International Conference on Pervasive Computing Technologies for Healthcare, 2008-01-30.
Russello, Giovanni and Dong, Changyu and Dulay, Naranker (2008) A Consent-based Workflow System for Healthcare Systems. In: 9th IEEE International Workshop on Policies for Distributed Systems and Networks, 2008-06-02.
Russello, Giovanni and Dong, Changyu and Dulay, Naranker and Chaudron, Michel and van Steen, Maarten (2008) Encrypted Shared Data Spaces. In: 10th international conference on Coordination models and languages, 2008-06-04.
Mostarda, Leonardo and Dong, Changyu and Dulay, Naranker (2008) Place and Time Authentication of Cultural Assets. In: 4th IFIP WG International Conference, 2010-06-16 - 2010-06-18.