Benjamin Fuller
Orcid: 0000-0001-6450-0088Affiliations:
- University of Connecticut, Storrs, CT, USA
- Boston University, MA, USA (PhD 2015)
- Massachusetts Institute of Technology, Lincoln Laboratory, Boston, MA, USA (2007 - 2016)
According to our database1,
Benjamin Fuller
authored at least 54 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2025
Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, 2025
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025
2024
Des. Codes Cryptogr., July, 2024
ProxCode: Efficient Biometric Proximity Searchable Encryption from Error Correcting Codes.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
The Decisive Power of Indecision: Low-Variance Risk-Limiting Audits and Election Contestation via Marginal Mark Recording.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the Applied Cryptography and Network Security, 2024
2023
Multi random projection inner product encryption, applications to proximity searchable encryption for the iris biometric.
Inf. Comput., August, 2023
FASHION: Functional and Attack Graph Secured HybrId Optimization of Virtualized Networks.
IEEE Trans. Dependable Secur. Comput., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
2022
Privacy Attacks Against Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models.
CoRR, 2022
Inverting Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models.
Proceedings of the IEEE International Joint Conference on Biometrics, 2022
Proceedings of the 28th International Conference on Principles and Practice of Constraint Programming, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021
2020
Proceedings of the 2020 IEEE International Joint Conference on Biometrics, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
FASHION: Functional and Attack graph Secured HybrId Optimization of virtualized Networks.
CoRR, 2019
Proceedings of the Information Security - 22nd International Conference, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the 10th IEEE International Conference on Biometrics Theory, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the Computer Vision - ACCV 2018 Workshops, 2018
2017
FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise.
Cryptogr., 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Progress in Cryptology - LATINCRYPT 2017, 2017
Proceedings of the Information Theoretic Security - 10th International Conference, 2017
2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
Iris Biometric Security Challenges and Possible Solutions: For your eyes only?Using the iris as a key.
IEEE Signal Process. Mag., 2015
Proceedings of the Information Theoretic Security - 8th International Conference, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014
2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
2010
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010
2007
Proceedings of the 4th International Workshop on Visualization for Computer Security, 2007