Obserwuj
Muhammad Naveed
Tytuł
Cytowane przez
Cytowane przez
Rok
Inference attacks on property-preserving encrypted databases
M Naveed, S Kamara, CV Wright
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
6762015
Dynamic searchable encryption via blind storage
M Naveed, M Prabhakaran, CA Gunter
2014 IEEE Symposium on Security and Privacy (SP), 639-654, 2014
4122014
Privacy in the Genomic Era
M Naveed, E Ayday, EW Clayton, J Fellay, CA Gunter, JP Hubaux, ...
ACM Computing Surveys (CSUR), 2015, 2015
3442015
Leakage-Abuse Attacks against Order-Revealing Encryption
P Grubbs, K Sekniqi, V Bindschaedler, M Naveed, T Ristenpart
2017 IEEE Symposium on Security and Privacy (SP), 2017
2612017
Identity, location, disease and more: Inferring your secrets from android public resources
X Zhou, S Demetriou, D He, M Naveed, X Pan, XF Wang, CA Gunter, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2552013
The peril of fragmentation: Security hazards in android device driver customizations
X Zhou, Y Lee, N Zhang, M Naveed, XF Wang
2014 IEEE Symposium on Security and Privacy (SP), 409-423, 2014
1772014
Security Concerns in Android mHealth Apps
D He, M Naveed, CA Gunter, K Nahrstedt
AMIA 2014 Annual Symposium, 2014
1692014
The Fallacy of Composition of Oblivious RAM and Searchable Encryption
M Naveed
1412015
Practicing oblivious access on cloud storage: the gap, the fallacy, and the new way forward
V Bindschaedler, M Naveed, X Pan, XF Wang, Y Huang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1382015
Breaking Web Applications Built On Top of Encrypted Data
P Grubbs, R McPherson, M Naveed, T Ristenpart, V Shmatikov
ACM SIGSAC Conference on Computer and Communications Security, 2016
1262016
Leave Me Alone: App-level Protection Against Runtime Information Gathering on Android
N Zhang, K Yuan, M Naveed, X Zhou, XF Wang
2015 IEEE Symposium on Security and Privacy (SP), 2015
1162015
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Bonding on Android
M Naveed, X Zhou, S Demetriou, XF Wang, CA Gunter
Proceedings of the 21st Annual Network and Distributed System Security …, 2014
1052014
Exacerbating Algorithmic Bias through Fairness Attacks
N Mehrabi, M Naveed, F Morstatter, A Galstyan
Proceedings of the AAAI Conference on Artificial Intelligence 35 (10), 8930-8938, 2020
842020
Controlled functional encryption
M Naveed, S Agrawal, M Prabhakaran, XF Wang, E Ayday, JP Hubaux, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
792014
Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM
C Fletcher, M Naveed, L Ren, E Shi, E Stefanov
752015
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services
T Li, X Zhou, L Xing, Y Lee, M Naveed, XF Wang, X Han
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
612014
Trinity: A byzantine fault-tolerant distributed publish-subscribe system with immutable blockchain-based persistence
GS Ramachandran, KL Wright, L Zheng, P Navaney, M Naveed, ...
2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC …, 2019
532019
Secure neuroimaging analysis using federated learning with homomorphic encryption
D Stripelis, H Saleem, T Ghai, N Dhinagar, U Gupta, C Anastasiou, ...
17th International Symposium on Medical Information Processing and Analysis …, 2021
512021
Sok: Anatomy of data breaches
H Saleem, M Naveed
Proceedings on Privacy Enhancing Technologies, 2020
512020
Network intrusion prevention by configuring acls on the routers, based on snort ids alerts
M Naveed, S un Nihar, MI Babar
2010 6th International Conference on Emerging Technologies (ICET), 234-239, 2010
252010
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20