The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.

This series contains publications published through The Cyber Center at Purdue University.

Follow

Submissions from 2014

Link

Flow-based partitioning of network testbed experiments, Wei-Min Yao and Sonia Fahmy

Link

Genetic Determinants for Enzymatic Digestion of Lignocellulosic Biomass Are Independent of Those for Lignin Abundance in a Maize Recombinant Inbred Population, Bryan W. Penning, Robert W. Sykes, Nicholas C. Babcock, Christopher K Dugard, Michael A. Held, John F. Klimek, Jacob T Shreve, Matthew Fowler, Angela Ziebell, Mark F. Davis, Stephen R. Decker, Geoffrey B. Turner, Nathan S. Mosier, Nathan M. Springer, Jyothi Thimmapuram, Clifford F. Weil, Maureen C. McCann, and Nicholas C. Carpita

Link

Homomorphic Encryption and Applications, Elisa Bertino, Xun Yi, and Russell Paulet

Link

ID-Based Group Password-Authenticated Key Exchange, Xun Yi, Feng Hao, and Elisa Bertino

PDF

IdentiDroid: Android can finally Wear its Anonymous Suit, Bilal Shebaro, Oyindamola Oluwatimi, Daniele Midi, and Elisa Bertino

Link

IEEE TDSC Editorial, Elisa Bertino

Link

Lightweight and Secure Two-Party Range Queries over Outsourced Encrypted Databases, Bharath Samanthula, Wei Jiang, and Elisa Bertino

Link

MED18 interaction with distinct transcription factors regulates multiple plant functions., Z Lai, C Schluttenhofer, Ketaki Bhide, J Schreve, Jyothi Thimmapuram, S Y. Lee, D J. Yum, and T Mengiste

Link

POSTER: A Pairing-free Certificateless Hybrid Sign- Cryption Scheme for Advanced Metering Infrastructures, Seung-Hyun Seo, Jongho Won, and Elisa Bertino

PDF

POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs, Asmaa Mohamed Sallama and Elisa Bertino

Link

Practical k Nearest Neighbor Queries with Location Privacy, Xun Yi, Russell Paulet, Elisa Bertino, and Vijay Varadharajan

Link

Preference Preserving Hashing for Efficient Recommendation, Zhiwei Zhang, Qifan Wang, Lingyun Ruan, and Luo Si

Link

Privacy of Outsourced k-mean Clustering, Dongxi Liu, Elisa Bertino, and Xun Yi

Link

Privacy-Preserving and Content-Protecting Location Based Queries, Russell Paulet, Mohammed Golam Kaosar, Xun Yi, and Elisa Bertino

PDF

Privacy-Preserving and Outsourced Multi-User k-Means Clustering, Bharath Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi, and Dangxi Liu

Link

Privacy Preserving Biometrics-Based and User Centric Authentication Protocol, Hasini Gunsinghe and Elisa Bertino

Link

Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data, Bharath Samanthula, Wei Jiang, and Elisa Bertino

Link

Privacy Preserving Delegated Access Control in Public Clouds, Mohamed Yoosuf Mohamed Nabeel and Elisa Bertino

Link

Private Searching on Streaming Data Based on Keyword Frequency, Elisa Bertino, Xun Yi, Jaideep Shrikant Vaidya, and Chaoping Xing

Link

Provenance-aware security risk analysis for hosts and network flows, Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, and Sanjay Jha

PDF

Randomized and Efficient Authentication in Mobile Environments, Wei Jiang, Dan Lin, Feng Li, and Elisa Bertino

Link

Representation and querying of unfair evaluations in social rating systems, Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Seyed-Mehdi-Reza Beheshti, Norman Foo, and Elisa Bertino

Link

Secure Data Provenance Compression Using Arithmetic Coding in Wireless Sensor Networks, Syed Rafiul Hussain, Changda Wang, Salmin Sultana, and Elisa Bertino

Link

Secure kNN Query Processing in Untrusted Cloud Environments, Sunoh Choi

Link

Secure mutual proximity zone enclosure evaluation, Sunoh Choi, Gabriel Ghinita, and Elisa Bertino