The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.

This series contains publications published through The Cyber Center at Purdue University.

Follow

Submissions from 2014

PDF

A Comprehensive Theoretical Framework for Privacy Preserving Distributed OLAP, Alfredo Cuzzocrea and Elisa Bertino

PDF

Active Hashing with Joint Data Example and Tag Selection, Qifan Wang and Luo Si

Link

A formal proximity model for RBAC systems, Aditi Gupta, Michael Kirkpatrick, and Elisa Bertino

PDF

An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds, Seung-Hyun Seo, Mohamed Yoosuf Mohamed Nabeel, Xiaoyu Ding, and Elisa Bertino

Link

A practical approach for provenance transmission in wireless sensor networks, S.M.I. Alam and Sonia Fahmy

PDF

A practical approach for provenance transmission in wireless sensor networks, S.M. Iftekharul Alam and Sonia Fahmy

PDF

A Roadmap for Privacy-Enhanced Secure Data Provenance, Elisa Bertino, Salmin Sultana, Murat Kantarcioglu, Bhavani Thuraisingham, Gabriel Ghinita, Ravi Sandhu, Jae Park, Shxu Xu, and D Nguyen

PDF

A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization, Mohamed R Fouad, Khaled Elbassioni, and Elisa Bertino

PDF

Cross-Domain and Cross-Category Emotion Tagging for Comments of Online News, Ying Zhang, Ning Zhang, Luo Si, Yanshan Lu, Qifan Wang, and Xiaojie Yuan

Demo Overview: Privacy-Enhancing Features of IdentiDroid, Daniele Midi, Oyindamola Oluwatimi, Bilal Shebaro, and Elisa Bertino

Link

Detecting mobile malware threats to homeland security through static analysis, Seung-Hyun Seo, Aditi Gupta, Asmaa Mohamed Sallama, and Kangbin Yimb

PDF

Draft Genome Sequence of Acetobacter aceti Strain 1023, a Vinegar Factory Isolate, John Hung, Christopher Mill, Sandra Clifton, Vincent Magrini, Ketaki Bhide, Julie Francois, Aaron Ransome, Lucinda Fulton, Jyothi Thimmapuram, Richard Wilson, and T. Joseph Kappock

PDF

Dynamic Privacy Policy Management in Services-Based Interactions, Nariman Ammar, Zaki Malik, Elisa Bertino, and Abdelmounaam Rezgui

PDF

Elite Size and Resilience Impact on Global System Structuration in Social Media, Sorin Matei, wutao Tan, Michael Zhu, Chuanhai Liu, Elisa Bertino, and Jeremy Foote

PDF

ERUPT: Energy-efficient tRUstworthy Provenance Trees for Wireless Sensor Networks, S.M. Iftekharul Alam, David K.Y. Yau, and Sonia Fahmy

Link

Flow-based partitioning of network testbed experiments, Wei-Min Yao and Sonia Fahmy

Link

Homomorphic Encryption and Applications, Elisa Bertino, Xun Yi, and Russell Paulet

PDF

ID-Based Group Password-Authenticated Key Exchange, Xun Yi, Feng Hao, and Elisa Bertino

PDF

IdentiDroid: Android can finally Wear its Anonymous Suit, Bilal Shebaro, Oluwatosin Ogunwuyi, Daniele Midi, and Elisa Bertino

Link

IEEE TDSC Editorial, Elisa Bertino

Link

Lightweight and Secure Two-Party Range Queries over Outsourced Encrypted Databases, Bharath Samanthula, Wei Jiang, and Elisa Bertino

Link

MED18 interaction with distinct transcription factors regulates multiple plant functions., Z Lai, C Schluttenhofer, Ketaki Bhide, J Schreve, Jyothi Thimmapuram, S Y. Lee, D J. Yum, and T Mengiste

POSTER: A Pairing-free Certificateless Hybrid Sign- Cryption Scheme for Advanced Metering Infrastructures, Seung-Hyun Seo, Jongho Won, and Elisa Bertino

PDF

POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs, Asmaa Mohamed Sallama and Elisa Bertino

PDF

Practical k Nearest Neighbor Queries with Location Privacy, Xun Yi, Russell Paulet, Elisa Bertino, and Vijay Varadharajan