The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.
This series contains publications published through The Cyber Center at Purdue University.
Submissions from 2014
Flow-based partitioning of network testbed experiments, Wei-Min Yao and Sonia Fahmy
Genetic Determinants for Enzymatic Digestion of Lignocellulosic Biomass Are Independent of Those for Lignin Abundance in a Maize Recombinant Inbred Population, Bryan W. Penning, Robert W. Sykes, Nicholas C. Babcock, Christopher K Dugard, Michael A. Held, John F. Klimek, Jacob T Shreve, Matthew Fowler, Angela Ziebell, Mark F. Davis, Stephen R. Decker, Geoffrey B. Turner, Nathan S. Mosier, Nathan M. Springer, Jyothi Thimmapuram, Clifford F. Weil, Maureen C. McCann, and Nicholas C. Carpita
Homomorphic Encryption and Applications, Elisa Bertino, Xun Yi, and Russell Paulet
ID-Based Group Password-Authenticated Key Exchange, Xun Yi, Feng Hao, and Elisa Bertino
IdentiDroid: Android can finally Wear its Anonymous Suit, Bilal Shebaro, Oyindamola Oluwatimi, Daniele Midi, and Elisa Bertino
IEEE TDSC Editorial, Elisa Bertino
Lightweight and Secure Two-Party Range Queries over Outsourced Encrypted Databases, Bharath Samanthula, Wei Jiang, and Elisa Bertino
MED18 interaction with distinct transcription factors regulates multiple plant functions., Z Lai, C Schluttenhofer, Ketaki Bhide, J Schreve, Jyothi Thimmapuram, S Y. Lee, D J. Yum, and T Mengiste
POSTER: A Pairing-free Certificateless Hybrid Sign- Cryption Scheme for Advanced Metering Infrastructures, Seung-Hyun Seo, Jongho Won, and Elisa Bertino
POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs, Asmaa Mohamed Sallama and Elisa Bertino
Practical k Nearest Neighbor Queries with Location Privacy, Xun Yi, Russell Paulet, Elisa Bertino, and Vijay Varadharajan
Preference Preserving Hashing for Efficient Recommendation, Zhiwei Zhang, Qifan Wang, Lingyun Ruan, and Luo Si
Privacy of Outsourced k-mean Clustering, Dongxi Liu, Elisa Bertino, and Xun Yi
Privacy-Preserving and Content-Protecting Location Based Queries, Russell Paulet, Mohammed Golam Kaosar, Xun Yi, and Elisa Bertino
Privacy-Preserving and Outsourced Multi-User k-Means Clustering, Bharath Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi, and Dangxi Liu
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol, Hasini Gunsinghe and Elisa Bertino
Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data, Bharath Samanthula, Wei Jiang, and Elisa Bertino
Privacy Preserving Delegated Access Control in Public Clouds, Mohamed Yoosuf Mohamed Nabeel and Elisa Bertino
Private Searching on Streaming Data Based on Keyword Frequency, Elisa Bertino, Xun Yi, Jaideep Shrikant Vaidya, and Chaoping Xing
Provenance-aware security risk analysis for hosts and network flows, Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, and Sanjay Jha
Randomized and Efficient Authentication in Mobile Environments, Wei Jiang, Dan Lin, Feng Li, and Elisa Bertino
Representation and querying of unfair evaluations in social rating systems, Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Seyed-Mehdi-Reza Beheshti, Norman Foo, and Elisa Bertino
Secure Data Provenance Compression Using Arithmetic Coding in Wireless Sensor Networks, Syed Rafiul Hussain, Changda Wang, Salmin Sultana, and Elisa Bertino
Secure kNN Query Processing in Untrusted Cloud Environments, Sunoh Choi
Secure mutual proximity zone enclosure evaluation, Sunoh Choi, Gabriel Ghinita, and Elisa Bertino