Juan Camilo Corena

According to our database1, Juan Camilo Corena authored at least 18 papers between 2010 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Hypercubes and Private Information Retrieval.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2015
Lightweight Practical Private One-Way Anonymous Messaging.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Practical Private One-way Anonymous Message Routing.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Pollution-Free Regenerating Codes With Fast Reconstruction Verification for Verifiable Cloud Storage.
J. Networks, 2014

A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques.
Proceedings of the SECRYPT 2014, 2014

PrefRank: fair aggregation of subjective user preferences.
Proceedings of the Symposium on Applied Computing, 2014

Privacy preserving trusted social feedback.
Proceedings of the Symposium on Applied Computing, 2014

A Privacy Risk Model for Trajectory Data.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

Beyond proofs of data possession: Finding defective blocks in outsourced storage.
Proceedings of the IEEE Global Communications Conference, 2014

Data Storage on the Cloud under User Control.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

CF-inspired Privacy-Preserving Prediction of Next Location in the Cloud.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

XOR network coding pollution prevention without homomorphic functions.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
Load balancing regenerating codes for multimedia content streaming.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

Proofs of data possession and pollution checking for Regenerating Codes.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Secure and Fast Aggregation of Financial Data in Cloud-Based Expense Tracking Applications.
J. Netw. Syst. Manag., 2012

A Multiple-MAC-Based Protocol to Identify Misbehaving Nodes in Network Coding.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

Thwarting Diversity Attacks in wireless network coding using threshold signatures and a sender-centered approach.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2010
Anycast Anónimo Basado en Firmas de Grupo.
Rev. Colomb. de Computación, 2010


  Loading...