Keith B. Frikken

According to our database1, Keith B. Frikken authored at least 51 papers between 2002 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2014
A Scheme for Collaboratively Processing Nearest Neighbor Queries in Oblivious Storage.
EAI Endorsed Trans. Collaborative Computing, 2014

2013
Secure and verifiable outsourcing of large-scale biometric computations.
ACM Trans. Inf. Syst. Secur., 2013

2012
Cryptographic Enforcement of Access Control while Mitigating Key Sharing.
Proceedings of the SECRYPT 2012, 2012

Private Outsourcing of Matrix Multiplication over Closed Semi-rings.
Proceedings of the SECRYPT 2012, 2012

Secure and Efficient Outsourcing of Sequence Comparisons.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Secure Multiparty Computation (SMC).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secure and Verifiable Outsourcing of Large-Scale Biometric Computations.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

General secure sensor aggregation in the presence of malicious nodes.
Proceedings of the 27th International Conference on Data Engineering, 2011

An Index Structure for Private Data Outsourcing.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Private Database Search with Sublinear Query Time.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Secure Authenticated Comparisons.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Confidentiality and Integrity for SUM Aggregation in Sensor Networks.
Proceedings of the SECRYPT 2010, 2010

Privacy-Preserving Network Aggregation.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2010

Sum Aggregation in Sensor Networks While Preserving Confidentiality and Integrity.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

Efficient Multi-dimensional Key Management in Broadcast Services.
Proceedings of the Computer Security, 2010

Securely outsourcing linear algebra computations.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Dynamic and Efficient Key Management for Access Hierarchies.
ACM Trans. Inf. Syst. Secur., 2009

Key allocation schemes for private social networks.
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009

Robust Authentication Using Physically Unclonable Functions.
Proceedings of the Information Security, 12th International Conference, 2009

Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation.
Proceedings of the Data and Applications Security XXIII, 2009

2008
Private Information: To Reveal or not to Reveal.
ACM Trans. Inf. Syst. Secur., 2008

Yet another privacy metric for publishing micro-data.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

An efficient integrity-preserving scheme for hierarchical sensor aggregation.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

PBS: Private Bartering Systems.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Private combinatorial group testing.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Incorporating Temporal Capabilities in Existing Key Management Schemes.
IACR Cryptology ePrint Archive, 2007

Incorporating Temporal Capabilities in Existing Key Management Schemes.
Proceedings of the Computer Security, 2007

Efficient techniques for realizing geo-spatial access control.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

Privacy-Preserving Set Union.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Attribute-Based Access Control with Hidden Policies and Hidden Credentials.
IEEE Trans. Computers, 2006

Private social network analysis: how to assemble pieces of a graph privately.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006

Key management for non-tree access hierarchies.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles.
Proceedings of the Network and Distributed System Security Symposium, 2006

Point-Based Trust: Define How Much Privacy Is Worth.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Efficient Correlated Action Selection.
Proceedings of the Financial Cryptography and Data Security, 2006

2005
Privacy-preserving credit checking.
Proceedings of the Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), 2005

Optimal Distributed Declustering Using Replication.
Proceedings of the Database Theory, 2005

Achieving Fairness in Private Contract Negotiation.
Proceedings of the Financial Cryptography and Data Security, 2005

Secure Biometric Authentication for Weak Computational Devices.
Proceedings of the Financial Cryptography and Data Security, 2005

Dynamic and efficient key management for access hierarchies.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Remote Revocation of Smart Cards in a Private DRM System.
Proceedings of the ACSW Frontiers 2005, 2005 ACSW Workshops, 2005

2004
Digital Rights Management.
Proceedings of the Practical Handbook of Internet Computing., 2004

Digital Rights Protection.
IEEE Data Eng. Bull., 2004

Hidden access control policies with hidden credentials.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

Privacy preserving route planning.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

Private collaborative forecasting and benchmarking.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

Privacy-Preserving Location-Dependent Query Processing.
Proceedings of the IEEE/ACS International Conference on Pervasive Services (ICPS'04), 2004

2003
Privacy preserving electronic surveillance.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003

Cropping-Resilient Segmented Multiple Watermarking.
Proceedings of the Algorithms and Data Structures, 8th International Workshop, 2003

Replicated Parallel I/O without Additional Scheduling Costs.
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003

2002
Optimal Parallel I/O for Range Queries through Replication.
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002


  Loading...