Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts N Fazio, IM Perera Public Key Cryptography–PKC 2012 7293, 225-242, 2012 | 118 | 2012 |
A general purpose transpiler for fully homomorphic encryption S Gorantala, R Springer, S Purser-Haskell, W Lam, R Wilson, A Ali, ... arXiv preprint arXiv:2106.07893, 2021 | 58 | 2021 |
Broadcast Steganography N Fazio, A Nicolosi, IM Perera Topics in Cryptology–CT-RSA 2014 8366, 64-84, 2014 | 23 | 2014 |
Broadcast Steganography N Fazio, A Nicolosi, IM Perera Cryptology ePrint Archive 2013, 2013 | 23 | 2013 |
KHyperLogLog: Estimating reidentifiability and joinability of large data at scale PH Chia, D Desfontaines, IM Perera, D Simmons-Marengo, C Li, WY Day, ... 2019 IEEE Symposium on Security and Privacy (SP), 350-364, 2019 | 21 | 2019 |
Google COVID-19 search trends symptoms dataset: Anonymization process description (version 1.0) S Bavadekar, A Dai, J Davis, D Desfontaines, I Eckstein, K Everett, ... arXiv preprint arXiv:2009.01265, 2020 | 20 | 2020 |
Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields N Fazio, R Gennaro, IM Perera, WE Skeith III Advances in Cryptology–CRYPTO 2013 8043, 148-165, 2013 | 19 | 2013 |
Google COVID-19 vaccination search insights: Anonymization process description S Bavadekar, A Boulanger, J Davis, D Desfontaines, E Gabrilovich, ... arXiv preprint arXiv:2107.01179, 2021 | 7 | 2021 |
Trusted Platform Module–A Survey K Ezirim, W Khoo, G Koumantaris, R Law, IM Perera City University of New York, 2012 | 6 | 2012 |
Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption J Soryal, IM Perera, I Darwish, N Fazio, R Gennaro, T Saadawi IEEE 28th International Conference on Advanced Information Networking and …, 2014 | 2 | 2014 |
Google COVID-19 search trends symptoms dataset: anonymization process description (version 1.0) arXiv. doi: 10.48550 S Bavadekar, A Dai, J Davis, D Desfontaines, I Eckstein, K Everett, ... arXiv, 2009 | 2 | 2009 |
Oblivious Group Storage N Fazio, AR Nicolosi, IM Perera The Annual Conference of International Technology Alliance – ACITA, 2015 | 1 | 2015 |
Google COVID-19 Search Trends Symptoms Dataset: Anonymization Process Description A Kumok, A Fabrikant, AM Dai, C Kamath, C Stanton, D Desfontaines, ... Technical Report. N/A. URL: https://arxiv. org/abs, 2009 | 1 | 2009 |
Theory and Applications of Outsider Anonymity in Broadcast Encryption IDM Perera City University of New York, 2015 | | 2015 |
Anonymity in Public-Key Encryption IM Perera City University of New York, 2013 | | 2013 |
Decentralized Information Flow Control for Operating Systems–A Survey K Ezirim, W Khoo, G Koumantaris, R Law, IM Perera City University of New York, 2012 | | 2012 |
Protecting Receivers Identities in Secure Data Distribution N Fazio, IM Perera The Annual Conference of International Technology Alliance – ACITA, 2012 | | 2012 |
Defenses Against Network Coding Pollution Attacks in Wireless Mesh Networks IM Perera City University of New York, 2011 | | 2011 |
A Secure Communication System for Sensor Networks T Abayomi, SL Billy, E Guzman, IM Perera City University of New York, 2010 | | 2010 |
KHyperLogLog PH Chia, D Desfontaines, IM Perera, D Simmons-Marengo, C Li, WY Day, ... | | |