Picture of an eye scanning technical data.

Open Access research that improves the lives of children and families...

Strathprints makes available scholarly Open Access content by scholars in the School of Social Work & Social Policy, based within the Faculty of Humanities & Social Sciences (HaSS) .

Research at Social Work & Social Policy seeks to understand the social experiences of children, young people and families, in order to support evidence-informed policy. Issues of public health, health inequalities and health history within the context of social work are also important research themes. Research centres, such as CELCIS (Centre for Excellence for Children's Care & Protection) and the CYCJ (Centre for Youth & Criminal Justice) operate in furtherance of these research areas, supporting evidence-based solutions to improve child wellbeing and improvements in youth justice, and the lives of families and communities.

Explore the Open Access research of Social Work & Social Policy. Or explore all of Strathclyde's Open Access research...

Browse by Author or creator

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Publication Date | Item type | No Grouping
Jump to: 2017 | 2016 | 2015 | 2014 | 2013 | 2011 | 2010 | 2009 | 2008
Number of items: 25.

2017

Abadi, Aydin and Terzis, Sotirios and Metere, Roberto and Dong, Changyu (2017) Efficient delegated private set intersection on outsourced private datasets. IEEE Transactions on Dependable and Secure Computing. pp. 1-15. ISSN 1545-5971

2016

Abadi, Aydin and Terzis, Sotirios and Dong, Changyu (2016) VD-PSI : verifiable delegated private set intersection on outsourced private datasets. In: Financial Cryptography and Data Security. Lecture Notes in Computer Science, 9603 . Springer-Verlag Berlin, Berlin Heidelberg, pp. 149-168. ISBN 978-3-662-54969-8

2015

Dong, Changyu (2015) Efficient data intensive secure computation : fictional or real. In: Security Protocols XXIII. Security and Cryptology, 9379 (1). Springer International Publishing AG, pp. 1-11. ISBN 978-3-319-26095-2

Dong, Changyu and Kiefer, Franziskus (2015) Secure set-based policy checking and its application to password registration. In: Cryptology and Network Security. Security and Cryptology . Springer-Verlag Berlin. ISBN 978-3-319-26822-4 (In Press)

Abadi, Aydin and Terzis, Sortirios and Dong, Changyu (2015) O-PSI : delegated private set intersection on outsourced datasets. In: International Conference on ICT Systems Security and Privacy Protection, 2015-05-26 - 2015-05-28.

2014

Wen, Zikai and Dong, Changyu (2014) Efficient protocols for private record linkage. In: Proceedings of 29th ACM Symposium on Applied Computing. ACM, New York, pp. 1688-1694. ISBN 9781450324694

Dong, Changyu and Chen, Liqun (2014) A fast secure dot product protocol with application to privacy preserving association rule mining. In: Advances in Knowledge Discovery and Data Mining. Lecture Notes in Computer Science . Springer, pp. 606-617. ISBN 9783319066073

Dong, Changyu and Chen, Liqun (2014) A fast single server private information retrieval protocol with low communication cost. In: Computer Security - ESORICS 2014. Lecture Notes in Computer Science . Springer, pp. 380-399. ISBN 9783319112022

2013

Dong, Changyu and Chen, Liqun and Wen, Zikai (2013) When private set intersection meets big data : an efficient and scalable protocol. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM, New York, pp. 789-800. ISBN 9781450324779 (In Press)

Dong, Changyu and Chen, Liqun and Camenisch, Jan and Russello, Giovanni (2013) Fair private set intersection with a semi-trusted arbiter. In: Data and Applications Security and Privacy XXVII. Lecture Notes in Computer Science, 7964 . Springer, pp. 128-144.

2011

Dong, Changyu and Dulay, Naranker (2011) Longitude : a privacy-preserving location sharing protocol for mobile applications. In: Trust Management V. Springer-Verlag Berlin, pp. 133-148. ISBN 978-3-642-22200-9

Dong, Changyu and Dulay, Naranker (2011) Argumentation-based fault diagnosis for home networks. In: 2nd ACM SIGCOMM workshop on Home networks, 2011-08-15.

Dong, Changyu and Russello, Giovanni and Dulay, Naranker (2011) Shared and searchable encrypted data for untrusted servers. Journal of Computer Security, 19 (3). pp. 367-397. ISSN 0926-227X

2010

Russello, Giovanni and Dong, Changyu and Dulay, Naranker and Chaudron, Michel and van Steen, Maarten (2010) Providing data confidentiality against malicious hosts in shared data spaces. Science of Computer Programming, 75 (6). pp. 426-439. ISSN 0167-6423

Mostarda, Leonardo and Dong, Changyu and Dulay, Naranker (2010) Context-based authentication and transport of cultural assets. Personal and Ubiquitous Computing, 14 (4). pp. 321-334. ISSN 1617-4909

Dong, Changyu and Dulay, Naranker (2010) Shinren : Non-monotonic trust management for distributed systems. In: Trust Management IV. Springer, pp. 125-140. ISBN 978-3-642-13445-6

2009

Russello, Giovanni and Dong, Changyu and Dulay, Naranker (2009) A Framework for Capturing Patient Consent in Pervasive Healthcare Applications. In: Mobile Health Solutions for Biomedical Applications. IGI Global, pp. 245-259. ISBN 9781605663326

Pediaditakis, Dimosthenis and Mostarda, Leonardo and Dong, Changyu and Dulay, Naranker (2009) Policies for Self Tuning Home Networks. In: 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, 2009-07-20.

2008

Dong, Changyu and Russello, Giovanni and Dulay, Naranker (2008) Flexible Resolution of Authorisation Conflicts in Distributed Systems. In: 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, 2008-09-22.

Dong, Changyu and Russello, Giovanni and Dulay, Naranker (2008) Shared and Searchable Encrypted Data for Untrusted Servers. In: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, 2008-07-13.

Russello, Giovanni and Dong, Changyu and Dulay, Naranker (2008) A Workflow-based Access Control Framework for Healthcare Applications. In: The Fourth International Symposium on Frontiers in Networking with Applications, 2008-03-25.

Russello, Giovanni and Dong, Changyu and Dulay, Naranker (2008) Personalizing Situated Workflows for Pervasive Healthcare Applications. In: 2nd International Conference on Pervasive Computing Technologies for Healthcare, 2008-01-30.

Russello, Giovanni and Dong, Changyu and Dulay, Naranker (2008) A Consent-based Workflow System for Healthcare Systems. In: 9th IEEE International Workshop on Policies for Distributed Systems and Networks, 2008-06-02.

Russello, Giovanni and Dong, Changyu and Dulay, Naranker and Chaudron, Michel and van Steen, Maarten (2008) Encrypted Shared Data Spaces. In: 10th international conference on Coordination models and languages, 2008-06-04.

Mostarda, Leonardo and Dong, Changyu and Dulay, Naranker (2008) Place and Time Authentication of Cultural Assets. In: IFIP WG11.11 International Conference on Trust Management, 2011-03-31.

This list was generated on Fri Nov 22 06:07:21 2019 GMT.