Obserwuj
Sonia Jahid
Sonia Jahid
Department of Computer Science, UIUC
Zweryfikowany adres z illinois.edu - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
EASiER: Encryption-based access control in social networks with efficient revocation
S Jahid, P Mittal, N Borisov
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
5932011
DECENT: A decentralized architecture for enforcing privacy in online social networks
S Jahid, S Nilizadeh, P Mittal, N Borisov, A Kapadia
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
1702012
Cachet: a decentralized architecture for privacy preserving social networking with caching
S Nilizadeh, S Jahid, P Mittal, N Borisov, A Kapadia
Proceedings of the 8th international conference on Emerging networking …, 2012
1652012
Piratte: Proxy-based immediate revocation of attribute-based encryption
S Jahid, N Borisov
arXiv preprint arXiv:1208.4877, 2012
412012
MyABDAC: compiling XACML policies for attribute-based database access control
S Jahid, CA Gunter, I Hoque, H Okhravi
Proceedings of the first ACM conference on Data and application security and …, 2011
332011
Secure key management protocol for distributed network encryption
S Jahid, G Chandrashekhar, B Qian, A Feroz
US Patent 10,798,073, 2020
222020
Enhancing database access control with xacml policy
S Jahid, I Hoque, H Okhravi, CA Gunter
Proceedings of the ACM Conference on Computer and Communications Security …, 2009
112009
Using rhythmic nonces for puzzle-based dos resistance
EM Chan, CA Gunter, S Jahid, E Peryshkin, D Rebolledo
Proceedings of the 2nd ACM workshop on Computer security architectures, 51-58, 2008
102008
Enhancing security and privacy in online social networks
S Jahid, N Borisov
Technical Report, 2012
42012
Assessing environmental flow for the Kobadak River and developing a framework for its maintenance
S Abu Jahid
Institute of Water and Flood Management (IWFM), 2016
32016
Enhancing Database Access Control with XACML Policy, poster at 16th ACM Conference on Computer and Communications Security
S Jahid, I Hoque, H Okhravi, CA Gunter
22009
Social networking: Security, privacy, and applications
S Jahid
University of Illinois at Urbana-Champaign, 2013
12013
Cachet
S Nilizadeh, S Jahid, P Mittal, N Borisov, A Kapadia
Proceedings of the 8th international conference on Emerging networking …, 2012
12012
Secure key management protocol for distributed network encryption
S Jahid, G Chandrashekhar, B Qian, A Feroz
US Patent 11,533,301, 2022
2022
System and method for managing secret information using virtualization
J Zhang, G Chandrashekhar, S Jahid, AV Patil, S Sundararaman
US Patent 10,516,528, 2019
2019
A Decentralized Architecture for Enforcing Privacy in Online Social Networks
S Jahid, S Nilizadeh, P Mittal, N Borisov, A Kapadia
CoRR, 2011
2011
A Web Service based Architecture for Ubiquitous Computing Applications
I Hoque, S Jahid, MM Akbar
BANGLADESH UNIVERSITY OF ENGINEERING AND TECHNOLOGY, 2005
2005
Auditable Anonymity
S Jahid, N Borisov
SECURITY ISSUES OF WEB SERVER
S Jahid, I Hoque, M Hafiz
Mail2Phone: Connecting E-mail to Telephone
I Hoque, S Jahid
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20