Katarzyna Kapusta

Orcid: 0000-0003-0963-4782

According to our database1, Katarzyna Kapusta authored at least 29 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
When Federated Learning Meets Watermarking: A Comprehensive Overview of Techniques for Intellectual Property Protection.
Mach. Learn. Knowl. Extr., December, 2023

2022
Constant Size Secret Sharing: with General Thresholds, Towards Standard Assumptions, and Applications.
IACR Cryptol. ePrint Arch., 2022

A Secure Federated Learning: Analysis of Different Cryptographic Tools.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

PE-AONT: Partial Encryption All or Nothing Transform.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Federated machine learning through edge ready architectures with privacy preservation as a service.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

2021
A Protocol for Secure Verification of Watermarks Embedded into Machine Learning Models.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

2020
Multi-hop Data Fragmentation in Energy Harvesting Wireless Sensor Networks.
Proceedings of the 2020 Global Internet of Things Summit, 2020

Revisiting Shared Data Protection Against Key Exposure.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives.
Inf. Sci., 2019

Circular All-Or-Nothing: Revisiting Data Protection Against Key Exposure.
CoRR, 2019

Multi-hop Data Fragmentation in Unattended Wireless Sensor Networks.
CoRR, 2019

Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks.
Ann. des Télécommunications, 2019

Secure Data Sharing with Fast Access Revocation through Untrusted Clouds.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Poster Abstract: Secure Data Sharing by Means of Fragmentation, Encryption, and Dispersion.
Proceedings of the IEEE INFOCOM 2019, 2019

Reinforcing Protection Against Chosen-Plaintext Attack Using Ciphertext Fragmentation in Multi-cloud Environments.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

2018
Protecting data confidentiality combining data fragmentation, encryption, and dispersal over a distributed environment. (Protection de la confidentialité des données par un ensemble de méthodes de fragmentation, chiffrement, et dispersion dans un environnement distribué).
PhD thesis, 2018

PE-AONT: Partial Encryption combined with an All-or-Nothing Transform.
CoRR, 2018

A Fast Fragmentation Algorithm For Data Protection In a Multi-Cloud Environment.
CoRR, 2018

Enhancing Data Protection in a Distributed Storage Environment Using Structure-Wise Fragmentation and Dispersal of Encrypted Data.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Fast and Scalable Fragmentation Algorithm for Data Protection Using Multi-storage over Independent Locations.
Proceedings of the Security and Trust Management - 14th International Workshop, 2018

Selective All-Or-Nothing Transform: Protecting Outsourced Data Against Key Exposure.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

Circular AON: A Very Fast Scheme to Protect Encrypted Data Against Key Exposure.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
An Efficient Keyless Fragmentation Algorithm for Data Protection.
CoRR, 2017

Data protection by means of fragmentation in various different distributed storage systems - a survey.
CoRR, 2017

Secure and resilient scheme for data protection in unattended wireless sensor networks.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

2016
POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Data Protection: Combining Fragmentation, Encryption, and Dispersion, an Intermediary report.
CoRR, 2015

Data protection: Combining fragmentation, encryption, and dispersion.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

Data protection by means of fragmentation in distributed storage systems.
Proceedings of the International Conference on Protocol Engineering, 2015


  Loading...