Obserwuj
Muhammad Naveed
Tytuł
Cytowane przez
Cytowane przez
Rok
Inference Attacks on Property-Preserving Encrypted Databases
M Naveed, S Kamara, CV Wright
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
5602015
What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources
S Demetriou, X Zhou, M Naveed, Y Lee, K Yuan, X Wang, CA Gunter
Proceedings of the 22nd Annual Network and Distributed System Security …, 2015
3872015
Dynamic searchable encryption via blind storage
M Naveed, M Prabhakaran, CA Gunter
2014 IEEE Symposium on Security and Privacy (SP), 639-654, 2014
3682014
Privacy in the Genomic Era
M Naveed, E Ayday, EW Clayton, J Fellay, CA Gunter, JP Hubaux, ...
ACM Computing Surveys (CSUR), 2015, 2015
2832015
Identity, location, disease and more: Inferring your secrets from android public resources
X Zhou, S Demetriou, D He, M Naveed, X Pan, XF Wang, CA Gunter, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2262013
Leakage-Abuse Attacks against Order-Revealing Encryption
P Grubbs, K Sekniqi, V Bindschaedler, M Naveed, T Ristenpart
2017 IEEE Symposium on Security and Privacy (SP), 2017
2012017
The peril of fragmentation: Security hazards in android device driver customizations
X Zhou, Y Lee, N Zhang, M Naveed, XF Wang
2014 IEEE Symposium on Security and Privacy (SP), 409-423, 2014
1592014
Security Concerns in Android mHealth Apps
D He, M Naveed, CA Gunter, K Nahrstedt
AMIA 2014 Annual Symposium, 2014
1382014
The Fallacy of Composition of Oblivious RAM and Searchable Encryption
M Naveed
1162015
Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward
V Bindschaedler, M Naveed, X Pan, XF Wang, Y Huang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1132015
Leave Me Alone: App-level Protection Against Runtime Information Gathering on Android
N Zhang, K Yuan, M Naveed, X Zhou, XF Wang
2015 IEEE Symposium on Security and Privacy (SP), 2015
992015
Breaking Web Applications Built On Top of Encrypted Data
P Grubbs, R McPherson, M Naveed, T Ristenpart, V Shmatikov
ACM SIGSAC Conference on Computer and Communications Security, 2016
952016
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Bonding on Android
M Naveed, X Zhou, S Demetriou, XF Wang, CA Gunter
Proceedings of the 21st Annual Network and Distributed System Security …, 2014
932014
Controlled Functional Encryption
M Naveed, S Agrawal, M Prabhakaran, X Wang, E Ayday, JP Hubaux, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
702014
Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM
C Fletcher, M Naveed, L Ren, E Shi, E Stefanov
602015
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services
T Li, X Zhou, L Xing, Y Lee, M Naveed, XF Wang, X Han
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
512014
Trinity: A byzantine fault-tolerant distributed publish-subscribe system with immutable blockchain-based persistence
GS Ramachandran, KL Wright, L Zheng, P Navaney, M Naveed, ...
2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC …, 2019
332019
Exacerbating Algorithmic Bias through Fairness Attacks
N Mehrabi, M Naveed, F Morstatter, A Galstyan
Proceedings of the AAAI Conference on Artificial Intelligence 35 (10), 8930-8938, 2020
312020
Privacy and security in the genomic era
M Naveed, E Ayday, EW Clayton, J Fellay, CA Gunter, JP Hubaux, ...
202014
SoK: Anatomy of Data Breaches
H Saleem, M Naveed
Proceedings on Privacy Enhancing Technologies 4, 153-174, 2020
192020
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20