The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.

This series contains publications published through The Cyber Center at Purdue University.

Follow

Submissions from 2014

Link

Homomorphic Encryption and Applications, Elisa Bertino, Xun Yi, and Russell Paulet

PDF

ID-Based Group Password-Authenticated Key Exchange, Xun Yi, Feng Hao, and Elisa Bertino

PDF

IdentiDroid: Android can finally Wear its Anonymous Suit, Bilal Shebaro, Oluwatosin Ogunwuyi, Daniele Midi, and Elisa Bertino

Link

IEEE TDSC Editorial, Elisa Bertino

Link

Lightweight and Secure Two-Party Range Queries over Outsourced Encrypted Databases, Bharath Samanthula, Wei Jiang, and Elisa Bertino

Link

MED18 interaction with distinct transcription factors regulates multiple plant functions., Z Lai, C Schluttenhofer, Ketaki Bhide, J Schreve, Jyothi Thimmapuram, S Y. Lee, D J. Yum, and T Mengiste

POSTER: A Pairing-free Certificateless Hybrid Sign- Cryption Scheme for Advanced Metering Infrastructures, Seung-Hyun Seo, Jongho Won, and Elisa Bertino

PDF

POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs, Asmaa Mohamed Sallama and Elisa Bertino

PDF

Practical k Nearest Neighbor Queries with Location Privacy, Xun Yi, Russell Paulet, Elisa Bertino, and Vijay Varadharajan

Preference Preserving Hashing for Efficient Recommendation, Zhiwei Zhang, Qifan Wang, Lingyun Ruan, and Luo Si

PDF

Privacy of Outsourced k-mean Clustering, Dongxi Liu, Elisa Bertino, and Xun Yi

PDF

Privacy-Preserving and Content-Protecting Location Based Queries, Russell Paulet, Mohammed Golam Kaosar, Xun Yi, and Elisa Bertino

PDF

Privacy-Preserving and Outsourced Multi-User k-Means Clustering, Bharath Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi, and Dangxi Liu

PDF

Privacy Preserving Biometrics-Based and User Centric Authentication Protocol, Hasini Gunsinghe and Elisa Bertino

PDF

Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data, Bharath Samanthula, Wei Jiang, and Elisa Bertino

PDF

Privacy Preserving Delegated Access Control in Public Clouds, Mohamed Yoosuf Mohamed Nabeel and Elisa Bertino

PDF

Private Searching on Streaming Data Based on Keyword Frequency, Elisa Bertino, Xun Yi, Jaideep Shrikant Vaidya, and Chaoping Xing

PDF

Provenance-aware security risk analysis for hosts and network flows, Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, and Sanjay Jha

PDF

Randomized and Efficient Authentication in Mobile Environments, Wei Jiang, Dan Lin, Feng Li, and Elisa Bertino

Link

Representation and querying of unfair evaluations in social rating systems, Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Seyed-Mehdi-Reza Beheshti, Norman Foo, and Elisa Bertino

PDF

Secure Data Provenance Compression Using Arithmetic Coding in Wireless Sensor Networks, Syed Rafiul Hussain, Changda Wang, Salmin Sultana, and Elisa Bertino

PDF

Secure kNN Query Processing in Untrusted Cloud Environments, Sunoh Choi

PDF

Secure mutual proximity zone enclosure evaluation, Sunoh Choi, Gabriel Ghinita, and Elisa Bertino

PDF

Security of Graph Data: Hashing Schemes and Definitions, Muhammad U. Arshad, Ashish Kundu, Elisa Bertino, Krishna Madhavan, and Arif Ghafoor

PDF

Security of new generation computing systems, Xu Li, Elisa Bertino, and Yi Mu