Your selections:
When Differential Privacy Implies Syntactic Privacy
- Ekenstedt, Emelie, Ong, Lawrence, Liu, Yucheng, Johnson, Sarah, Yeoh, Phee Lep, Kliewer, Joerg
A policy-based security architecture for software defined networks
- Varadharajan, Vijay, Karmakar, Kallol, Tupakula, Uday, Hitchens, Michael
Enabling cloud storage auditing with key-exposure resistance
- Yu, Jia, Ren, Kui, Wang, Cong, Varadharajan, Vijay
Trust enhanced cryptographic role-based access control for secure cloud data storage
- Zhou, Lan, Varadharajan, Vijay, Hitchens, Michael
CP-ABE with constant-size keys for lightweight devices
- Guo, Fuchun, Mu, Yi, Susilo, Willy, Wong, Duncan S., Varadharajan, Vijay
The silence of the LANs: efficient leakage resilience for IPsec VPNs
- Schulz, Steffen, Varadharajan, Vijay, Sadeghi, Ahmad-Reza
Achieving secure role-based access control on encrypted data in cloud storage
- Zhou, Lan, Varadharajan, Vijay, Hitchens, Michael
Stochastic modeling of hello flooding in slotted CSMA/CA wireless sensor networks
- Haghighi, Mohammad Sayad, Mohamedpour, Kamal, Varadharajan, Vijay, Quinn, Barry G.
Are you sure you would like to clear your session, including search history and login status?