The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.

This series contains publications published through The Cyber Center at Purdue University.

Follow

Submissions from 2014

Preference Preserving Hashing for Efficient Recommendation, Zhiwei Zhang, Qifan Wang, Lingyun Ruan, and Luo Si

PDF

Privacy of Outsourced k-mean Clustering, Dongxi Liu, Elisa Bertino, and Xun Yi

PDF

Privacy Preserving Biometrics-Based and User Centric Authentication Protocol, Hasini Gunsinghe and Elisa Bertino

PDF

Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data, Bharath Samanthula, Wei Jiang, and Elisa Bertino

PDF

Privacy Preserving Delegated Access Control in Public Clouds, Mohamed Yoosuf Mohamed Nabeel and Elisa Bertino

PDF

Private Searching on Streaming Data Based on Keyword Frequency, Elisa Bertino, Xun Yi, Jaideep Shrikant Vaidya, and Chaoping Xing

PDF

Provenance-aware security risk analysis for hosts and network flows, Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, and Sanjay Jha

PDF

Randomized and Efficient Authentication in Mobile Environments, Wei Jiang, Dan Lin, Feng Li, and Elisa Bertino

Link

Representation and querying of unfair evaluations in social rating systems, Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Seyed-Mehdi-Reza Beheshti, Norman Foo, and Elisa Bertino

PDF

Secure kNN Query Processing in Untrusted Cloud Environments, Sunoh Choi

PDF

Security of Graph Data: Hashing Schemes and Definitions, Muhammad U. Arshad, Ashish Kundu, Elisa Bertino, Krishna Madhavan, and Arif Ghafoor

PDF

Security with Privacy - Opportunities and Challenges, Elisa Bertino

PDF

Theory-Inspired Optimizations for Privacy Preserving Distributed OLAP Algorithms, Alfredo Cuzzocrea and Elisa Bertino

Submissions from 2013

Link

Active Learning with Optimal Instance Subset Selection, Yifan Fu, Xingquan Zhu, and Ahmed Elmagarmid

Link

Adaptive data protection in distributed systems, Anna Squicciarini, Giuseppe Petracca, and Elisa Bertino

Link

A distributed cloud architecture for mobile multimedia services, Muhamed Felemban, Saleh Basalamah, and Arif Ghafoor

Link

A fast parallel maximum clique algorithm for large sparse graphs and temporal strong components, Ryan Rossi, David Gleich, and Assefaw Gebramedhin

Link

A file provenance system, Salmin Sultana and Elisa Bertino

Link

An efficient certificateless cryptography scheme without pairing, Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, and Elisa Bertino

Link

An Experimental Framework for BGP Securuty Evaluation, Debbie Perouli, Olaf Maennel, Iain Phillips, Sonia Fahmy, Randy Bush, and Rob Austein

Link

Author disambiguation by hierarchical agglomerative clustering with adaptive stopping criterion, Lei Cen, Eduard Dragut, Luo Si, and Mourad Ouzzani

Link

Collaboration in Multicloud computing environments: Framework and security issues, S Chandrasekhar, M Singhl, GE Tingjian, R Krishnan, Gail Joon Ahn, and Elisa Bertino

Collaboration in multicloud computing environments: Framework and security issues, M Singhal, S Chandrasekhar, Ge Tingjian, R. Sandhu, R Krishnan, Ahn Gail-Joon, and Elisa Bertino

Link

Collusion Detection in Online Rating Systems, Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Seyed-Mehdi-Reza Beheshti, Elisa Bertino, and Norman Foo

Link

Compiler Infrastructure, Rudolf Eigenmann and Samuel Midkiff