Mehmet Kuzu

According to our database1, Mehmet Kuzu authored at least 15 papers between 2010 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Distributed Search over Encrypted Big Data.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

A Dynamic Approach to Detect Anomalous Queries on Relational Databases.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
Composite Bloom Filters for Secure Record Linkage.
IEEE Trans. Knowl. Data Eng., 2014

A Distributed Framework for Scalable Search over Encrypted Documents.
CoRR, 2014

Efficient privacy-aware search over encrypted databases.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Inference attack against encrypted range queries on outsourced databases.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
Efficient Tree Pattern Queries On Encrypted XML Documents.
Trans. Data Priv., 2013

A practical approach to achieve private medical record linkage in light of public resources.
J. Am. Medical Informatics Assoc., 2013

Efficient privacy-aware record integration.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

2012
Dynamic planning approach to automated web service composition.
Appl. Intell., 2012

Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Efficient Similarity Search over Encrypted Data.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

2011
A Constraint Satisfaction Cryptanalysis of Bloom Filters in Private Record Linkage.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Poster: inference attacks against searchable encryption protocols.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Providing Scalability for an Automated Web Service Composition Framework.
Proceedings of the Computer and Information Sciences, 2010


  Loading...