Picture of head and brain anatomy

Psychology: investigating cognition with Open Access research...

Strathprints makes available scholarly Open Access content by researchers within the School of Psychological Sciences & Health, including those based in Psychology.

Research at Psychology includes those working within cognition, exploring neuropsychology, attention, perception, affect and language using techniques such as neuroimaging, electroencephalography (EEG) and motion capture.

Explore the Open Access research by Psychology, or explore all of Strathclyde's Open Access research...

Browse by Author or creator

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Publication Date | Item type | No Grouping
Jump to: 2017 | 2016 | 2015 | 2014 | 2013 | 2011 | 2010 | 2009 | 2008
Number of items: 25.

2017

Abadi, Aydin and Terzis, Sotirios and Metere, Roberto and Dong, Changyu (2017) Efficient delegated private set intersection on outsourced private datasets. IEEE Transactions on Dependable and Secure Computing. pp. 1-15. ISSN 1545-5971

2016

Abadi, Aydin and Terzis, Sotirios and Dong, Changyu; Grossklags, Jens and Preneel, Bart, eds. (2016) VD-PSI : verifiable delegated private set intersection on outsourced private datasets. In: Financial Cryptography and Data Security. Lecture Notes in Computer Science, 9603 . Springer-Verlag Berlin, BRB, pp. 149-168. ISBN 978-3-662-54969-8

2015

Dong, Changyu; Christianson, Bruce and Švenda, Petr and Matyáš, Vashek and Malcolm, James and Stajano, Frank and Anderson, Jonathan, eds. (2015) Efficient data intensive secure computation : fictional or real. In: Security Protocols XXIII. Security and Cryptology, 9379 (1). Springer International Publishing AG, pp. 1-11. ISBN 978-3-319-26095-2

Dong, Changyu and Kiefer, Franziskus; Reiter, Michael and Naccache, David, eds. (2015) Secure set-based policy checking and its application to password registration. In: Cryptology and Network Security. Security and Cryptology . Springer-Verlag Berlin. ISBN 978-3-319-26822-4 (In Press)

Abadi, Aydin and Terzis, Sortirios and Dong, Changyu (2015) O-PSI : delegated private set intersection on outsourced datasets. In: International Conference on ICT Systems Security and Privacy Protection, 2015-05-26 - 2015-05-28.

2014

Wen, Zikai and Dong, Changyu; (2014) Efficient protocols for private record linkage. In: Proceedings of 29th ACM Symposium on Applied Computing. ACM, New York, pp. 1688-1694. ISBN 9781450324694

Dong, Changyu and Chen, Liqun; Tseng, Vincent S. and Ho, Tu Bao and Zhou, Zhi-Hua and Chen, Arbee L. P. and Kao, Hung-Yu, eds. (2014) A fast secure dot product protocol with application to privacy preserving association rule mining. In: Advances in Knowledge Discovery and Data Mining. Lecture Notes in Computer Science . Springer, pp. 606-617. ISBN 9783319066073

Dong, Changyu and Chen, Liqun; Kutyłowski, Mirosław and Vaidya, Jaideep, eds. (2014) A fast single server private information retrieval protocol with low communication cost. In: Computer Security - ESORICS 2014. Lecture Notes in Computer Science . Springer, pp. 380-399. ISBN 9783319112022

2013

Dong, Changyu and Chen, Liqun and Wen, Zikai; (2013) When private set intersection meets big data : an efficient and scalable protocol. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM, DEU, pp. 789-800. ISBN 9781450324779 (In Press)

Dong, Changyu and Chen, Liqun and Camenisch, Jan and Russello, Giovanni; Wang, Lingyu and Shafiq, Basit, eds. (2013) Fair private set intersection with a semi-trusted arbiter. In: Data and Applications Security and Privacy XXVII. Lecture Notes in Computer Science, 7964 . Springer, pp. 128-144.

2011

Dong, Changyu and Dulay, Naranker; Wakeman, Ian and Gudes, Ehud and Damsgaard Jensen, Christian and Crampton, Jason, eds. (2011) Longitude : a privacy-preserving location sharing protocol for mobile applications. In: Trust Management V. Springer-Verlag Berlin, pp. 133-148. ISBN 978-3-642-22200-9

Dong, Changyu and Dulay, Naranker (2011) Argumentation-based fault diagnosis for home networks. In: 2nd ACM SIGCOMM workshop on Home networks, 2011-08-15.

Dong, Changyu and Russello, Giovanni and Dulay, Naranker (2011) Shared and searchable encrypted data for untrusted servers. Journal of Computer Security, 19 (3). pp. 367-397. ISSN 0926-227X

2010

Russello, Giovanni and Dong, Changyu and Dulay, Naranker and Chaudron, Michel and van Steen, Maarten (2010) Providing data confidentiality against malicious hosts in shared data spaces. Science of Computer Programming, 75 (6). pp. 426-439. ISSN 0167-6423

Mostarda, Leonardo and Dong, Changyu and Dulay, Naranker (2010) Context-based authentication and transport of cultural assets. Personal and Ubiquitous Computing, 14 (4). pp. 321-334. ISSN 1617-4909

Dong, Changyu and Dulay, Naranker; Nishigaki, Masakatsu and Jøsang, Audun and Murayama, Yuko and Marsh, Stephen, eds. (2010) Shinren : Non-monotonic trust management for distributed systems. In: Trust Management IV. Springer, pp. 125-140. ISBN 978-3-642-13445-6

2009

Russello, Giovanni and Dong, Changyu and Dulay, Naranker; Olla, Phillip and Tan, Joseph, eds. (2009) A Framework for Capturing Patient Consent in Pervasive Healthcare Applications. In: Mobile Health Solutions for Biomedical Applications. IGI Global, pp. 245-259. ISBN 9781605663326

Pediaditakis, Dimosthenis and Mostarda, Leonardo and Dong, Changyu and Dulay, Naranker (2009) Policies for Self Tuning Home Networks. In: 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, 2009-07-20.

2008

Dong, Changyu and Russello, Giovanni and Dulay, Naranker (2008) Flexible Resolution of Authorisation Conflicts in Distributed Systems. In: 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, 2008-09-22.

Dong, Changyu and Russello, Giovanni and Dulay, Naranker (2008) Shared and Searchable Encrypted Data for Untrusted Servers. In: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, 2008-07-13.

Russello, Giovanni and Dong, Changyu and Dulay, Naranker (2008) A Workflow-based Access Control Framework for Healthcare Applications. In: The Fourth International Symposium on Frontiers in Networking with Applications, 2008-03-25.

Russello, Giovanni and Dong, Changyu and Dulay, Naranker (2008) Personalizing Situated Workflows for Pervasive Healthcare Applications. In: 2nd International Conference on Pervasive Computing Technologies for Healthcare, 2008-01-30.

Russello, Giovanni and Dong, Changyu and Dulay, Naranker (2008) A Consent-based Workflow System for Healthcare Systems. In: 9th IEEE International Workshop on Policies for Distributed Systems and Networks, 2008-06-02.

Russello, Giovanni and Dong, Changyu and Dulay, Naranker and Chaudron, Michel and van Steen, Maarten (2008) Encrypted Shared Data Spaces. In: 10th international conference on Coordination models and languages, 2008-06-04.

Mostarda, Leonardo and Dong, Changyu and Dulay, Naranker (2008) Place and Time Authentication of Cultural Assets. In: IFIP WG11.11 International Conference on Trust Management, 2011-03-31.

This list was generated on Thu Nov 26 13:09:10 2020 GMT.