default search action
Seny Kamara
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Seny Kamara, Abdelkarim Kati, Tarik Moataz, Jamie DeMaria, Andrew Park, Amos Treiber:
MAPLE: MArkov Process Leakage attacks on Encrypted Search. Proc. Priv. Enhancing Technol. 2024(1): 430-446 (2024) - [c49]Zachary Espiritu, Marilyn George, Seny Kamara, Lucy Qin:
Synq: Public Policy Analytics Over Encrypted Data. SP 2024: 146-165 - [i30]Archita Agarwal, David Cash, Marilyn George, Seny Kamara, Tarik Moataz, Jaspal Singh:
Updatable Private Set Intersection from Structured Encryption. IACR Cryptol. ePrint Arch. 2024: 1183 (2024) - [i29]Amine Bahi, Seny Kamara, Tarik Moataz, Guevara Noubir:
Subliminal Encrypted Multi-Maps and Black-Box Leakage Absorption. IACR Cryptol. ePrint Arch. 2024: 1708 (2024) - 2023
- [c48]Ghous Amjad, Seny Kamara, Tarik Moataz:
Injection-Secure Structured and Searchable Symmetric Encryption. ASIACRYPT (6) 2023: 232-262 - [i28]Ghous Amjad, Seny Kamara, Tarik Moataz:
Injection-Secure Structured and Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2023: 533 (2023) - [i27]Seny Kamara, Abdelkarim Kati, Tarik Moataz, Jamie DeMaria, Andrew Park, Amos Treiber:
MAPLE: MArkov Process Leakage attacks on Encrypted Search. IACR Cryptol. ePrint Arch. 2023: 810 (2023) - [i26]Seny Kamara, Tarik Moataz:
Bayesian Leakage Analysis: A Framework for Analyzing Leakage in Encrypted Search. IACR Cryptol. ePrint Arch. 2023: 813 (2023) - 2022
- [c47]Marilyn George, Seny Kamara:
Adversarial Level Agreements for Two-Party Protocols. AsiaCCS 2022: 816-830 - [c46]Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli:
SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data. EuroS&P 2022: 90-108 - [c45]Seny Kamara:
Encrypted Distributed Systems. PODC 2022: 163 - [i25]Seny Kamara, Mallory Knodel, Emma Llansó, Greg Nojeim, Lucy Qin, Dhanaraj Thakur, Caitlin Vogus:
Outside Looking In: Approaches to Content Moderation in End-to-End Encrypted Systems. CoRR abs/2202.04617 (2022) - 2021
- [c44]Esha Ghosh, Seny Kamara, Roberto Tamassia:
Efficient Graph Encryption Scheme for Shortest Path Queries. AsiaCCS 2021: 516-525 - [c43]Zheguang Zhao, Seny Kamara, Tarik Moataz, Stan Zdonik:
Encrypted Databases: From Theory to Systems. CIDR 2021 - [c42]Marilyn George, Seny Kamara, Tarik Moataz:
Structured Encryption and Dynamic Leakage Suppression. EUROCRYPT (3) 2021: 370-396 - [c41]Seny Kamara:
Algorithms for the People. FMCAD 2021: 11 - [c40]Seny Kamara, Tarik Moataz, Andrew Park, Lucy Qin:
A Decentralized and Encrypted National Gun Registry. SP 2021: 1520-1537 - [i24]Seny Kamara, Tarik Moataz, Andrew Park, Lucy Qin:
A Decentralized and Encrypted National Gun Registry. IACR Cryptol. ePrint Arch. 2021: 107 (2021) - [i23]Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli:
Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data. IACR Cryptol. ePrint Arch. 2021: 1035 (2021) - 2020
- [c39]Daniel Adkins, Archita Agarwal, Seny Kamara, Tarik Moataz:
Encrypted Blockchain Databases. AFT 2020: 241-254 - [c38]Eleanor Tursman, Marilyn George, Seny Kamara, James Tompkin:
Towards Untrusted Social Video Verification to Combat Deepfakes via Face Geometry Consistency. CVPR Workshops 2020: 2784-2793 - [c37]Archita Agarwal, Seny Kamara:
Encrypted Key-Value Stores. INDOCRYPT 2020: 62-85 - [c36]Laura Blackstone, Seny Kamara, Tarik Moataz:
Revisiting Leakage Abuse Attacks. NDSS 2020 - [i22]Seny Kamara, Tarik Moataz, Stan Zdonik, Zheguang Zhao:
An Optimal Relational Database Encryption Scheme. IACR Cryptol. ePrint Arch. 2020: 274 (2020) - [i21]Daniel Adkins, Archita Agarwal, Seny Kamara, Tarik Moataz:
Encrypted Blockchain Databases. IACR Cryptol. ePrint Arch. 2020: 827 (2020) - [i20]Marilyn George, Seny Kamara:
Adversarial Level Agreements for Two-Party Protocols. IACR Cryptol. ePrint Arch. 2020: 1249 (2020)
2010 – 2019
- 2019
- [j6]Ghous Amjad, Seny Kamara, Tarik Moataz:
Breach-Resistant Structured Encryption. Proc. Priv. Enhancing Technol. 2019(1): 245-265 (2019) - [j5]Archita Agarwal, Maurice Herlihy, Seny Kamara, Tarik Moataz:
Encrypted Databases for Differential Privacy. Proc. Priv. Enhancing Technol. 2019(3): 170-190 (2019) - [c35]Seny Kamara, Tarik Moataz:
Computationally Volume-Hiding Structured Encryption. EUROCRYPT (2) 2019: 183-213 - [c34]Ghous Amjad, Seny Kamara, Tarik Moataz:
Forward and Backward Private Searchable Encryption with SGX. EuroSec@EuroSys 2019: 4:1-4:6 - [i19]Archita Agarwal, Seny Kamara:
Encrypted Distributed Hash Tables. IACR Cryptol. ePrint Arch. 2019: 1126 (2019) - [i18]Laura Blackstone, Seny Kamara, Tarik Moataz:
Revisiting Leakage Abuse Attacks. IACR Cryptol. ePrint Arch. 2019: 1175 (2019) - 2018
- [c33]Seny Kamara, Alptekin Küpçü:
DogFish: Decentralized Optimistic Game-theoretic FIle SHaring. ACNS 2018: 696-714 - [c32]Seny Kamara, Tarik Moataz:
SQL on Structurally-Encrypted Databases. ASIACRYPT (1) 2018: 149-180 - [c31]Seny Kamara, Tarik Moataz, Olga Ohrimenko:
Structured Encryption and Leakage Suppression. CRYPTO (1) 2018: 339-370 - [i17]Ghous Amjad, Seny Kamara, Tarik Moataz:
Breach-Resistant Structured Encryption. IACR Cryptol. ePrint Arch. 2018: 195 (2018) - [i16]Seny Kamara, Tarik Moataz, Olga Ohrimenko:
Structured Encryption and Leakage Suppression. IACR Cryptol. ePrint Arch. 2018: 551 (2018) - [i15]Archita Agarwal, Maurice Herlihy, Seny Kamara, Tarik Moataz:
Encrypted Databases for Differential Privacy. IACR Cryptol. ePrint Arch. 2018: 860 (2018) - [i14]Seny Kamara, Tarik Moataz:
Encrypted Multi-Maps with Computationally-Secure Leakage. IACR Cryptol. ePrint Arch. 2018: 978 (2018) - 2017
- [c30]Seny Kamara, Tarik Moataz:
Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity. EUROCRYPT (3) 2017: 94-124 - [i13]Seny Kamara, Tarik Moataz:
Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity. IACR Cryptol. ePrint Arch. 2017: 126 (2017) - 2016
- [i12]Seny Kamara, Tarik Moataz:
SQL on Structurally-Encrypted Databases. IACR Cryptol. ePrint Arch. 2016: 453 (2016) - 2015
- [j4]Seny Kamara:
Encrypted Search. XRDS 21(3): 30-34 (2015) - [c29]Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios:
GRECS: Graph Encryption for Approximate Shortest Distance Queries. CCS 2015: 504-517 - [c28]Muhammad Naveed, Seny Kamara, Charles V. Wright:
Inference Attacks on Property-Preserving Encrypted Databases. CCS 2015: 644-655 - [c27]Giuseppe Ateniese, Antonio Faonio, Seny Kamara:
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage. IMACC 2015: 311-328 - [i11]Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios:
GRECS: Graph Encryption for Approximate Shortest Distance Queries. IACR Cryptol. ePrint Arch. 2015: 266 (2015) - [i10]Giuseppe Ateniese, Antonio Faonio, Seny Kamara:
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage. IACR Cryptol. ePrint Arch. 2015: 920 (2015) - 2014
- [c26]Yossi Azar, Seny Kamara, Ishai Menache, Mariana Raykova, F. Bruce Shepherd:
Co-Location-Resistant Clouds. CCSW 2014: 9-20 - [c25]Seny Kamara, Payman Mohassel, Mariana Raykova, Seyed Saeed Sadeghian:
Scaling Private Set Intersection to Billion-Element Sets. Financial Cryptography 2014: 195-215 - [c24]Seny Kamara:
Restructuring the NSA Metadata Program. Financial Cryptography Workshops 2014: 235-247 - [i9]Yossi Azar, Seny Kamara, Ishai Menache, Mariana Raykova, F. Bruce Shepherd:
Co-Location-Resistant Clouds. IACR Cryptol. ePrint Arch. 2014: 713 (2014) - 2013
- [j3]Jonathan Kaveh Valamehr, Melissa Chase, Seny Kamara, Andrew Putnam, Daniel Shumow, Vinod Vaikuntanathan, Timothy Sherwood:
Inspection-Resistant Memory Architectures. IEEE Micro 33(3): 48-56 (2013) - [c23]Seny Kamara:
Proofs of Storage: Theory, Constructions and Applications. CAI 2013: 7-8 - [c22]Seny Kamara, Lei Wei:
Garbled Circuits via Structured Encryption. Financial Cryptography Workshops 2013: 177-188 - [c21]Seny Kamara, Mariana Raykova:
Parallel Homomorphic Encryption. Financial Cryptography Workshops 2013: 213-225 - [c20]Seny Kamara, Charalampos Papamanthou:
Parallel and Dynamic Searchable Symmetric Encryption. Financial Cryptography 2013: 258-274 - [c19]Yossi Azar, Ilan Reuven Cohen, Seny Kamara, F. Bruce Shepherd:
Tight bounds for online vector bin packing. STOC 2013: 961-970 - [i8]Seny Kamara, Charalampos Papamanthou:
Parallel and Dynamic Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2013: 335 (2013) - 2012
- [c18]Seny Kamara, Payman Mohassel, Ben Riva:
Salus: a system for server-aided secure function evaluation. CCS 2012: 797-808 - [c17]Seny Kamara, Charalampos Papamanthou, Tom Roeder:
Dynamic searchable symmetric encryption. CCS 2012: 965-976 - [c16]Srdjan Capkun, Seny Kamara:
4th cloud computing security workshop (CCSW 2012). CCS 2012: 1060-1061 - [c15]Jonathan Valamehr, Melissa Chase, Seny Kamara, Andrew Putnam, Daniel Shumow, Vinod Vaikuntanathan, Timothy Sherwood:
Inspection resistant memory: Architectural support for security from physical examination. ISCA 2012: 130-141 - [e1]Ting Yu, Srdjan Capkun, Seny Kamara:
Proceedings of the 2012 ACM Workshop on Cloud computing security, CCSW 2012, Raleigh, NC, USA, October 19, 2012. ACM 2012, ISBN 978-1-4503-1665-1 [contents] - [i7]Seny Kamara, Charalampos Papamanthou, Tom Roeder:
Dynamic Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2012: 530 (2012) - [i6]Seny Kamara, Payman Mohassel, Ben Riva:
Salus: A System for Server-Aided Secure Function Evaluation. IACR Cryptol. ePrint Arch. 2012: 542 (2012) - 2011
- [j2]Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
Searchable symmetric encryption: Improved definitions and efficient constructions. J. Comput. Secur. 19(5): 895-934 (2011) - [i5]Melissa Chase, Seny Kamara:
Structured Encryption and Controlled Disclosure. IACR Cryptol. ePrint Arch. 2011: 10 (2011) - [i4]Seny Kamara, Payman Mohassel, Mariana Raykova:
Outsourcing Multi-Party Computation. IACR Cryptol. ePrint Arch. 2011: 272 (2011) - [i3]Seny Kamara, Mariana Raykova:
Parallel Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2011: 596 (2011) - 2010
- [c14]Melissa Chase, Seny Kamara:
Structured Encryption and Controlled Disclosure. ASIACRYPT 2010: 577-594 - [c13]Seny Kamara, Kristin E. Lauter:
Cryptographic Cloud Storage. Financial Cryptography Workshops 2010: 136-149
2000 – 2009
- 2009
- [c12]Giuseppe Ateniese, Seny Kamara, Jonathan Katz:
Proofs of Storage from Homomorphic Identification Protocols. ASIACRYPT 2009: 319-333 - 2008
- [c11]Lucas Ballard, Seny Kamara, Fabian Monrose, Michael K. Reiter:
Towards practical biometric key generation with randomized biometric templates. CCS 2008: 235-244 - [c10]Seny Kamara, Jonathan Katz:
How to Encrypt with a Malicious Random Number Generator. FSE 2008: 303-315 - [c9]Lucas Ballard, Seny Kamara, Michael K. Reiter:
The Practical Subtleties of Biometric Key Generation. USENIX Security Symposium 2008: 61-74 - 2006
- [c8]Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
Searchable symmetric encryption: improved definitions and efficient constructions. CCS 2006: 79-88 - [c7]Kevin Fu, Seny Kamara, Yoshi Kohno:
Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage. NDSS 2006 - [c6]Reza Curtmola, Seny Kamara:
A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks. WCAN@ICALP 2006: 57-69 - [i2]Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. IACR Cryptol. ePrint Arch. 2006: 210 (2006) - 2005
- [c5]Seny Kamara, Darren Davis, Lucas Ballard, Ryan Caudy, Fabian Monrose:
An Extensible Platform for Evaluating Security Protocols. Annual Simulation Symposium 2005: 204-213 - [c4]Seny Kamara, Breno de Medeiros, Susanne Wetzel:
Secret Locking: Exploring New Approaches to Biometric Key Encapsulation. ICETE (Selected Papers) 2005: 101-112 - [c3]Seny Kamara, Breno de Medeiros, Susanne Wetzel:
Secret locking: Exploring new approaches to biometric key encapsulation. ICETE 2005: 254-261 - [c2]Lucas Ballard, Seny Kamara, Fabian Monrose:
Achieving Efficient Conjunctive Keyword Searches over Encrypted Data. ICICS 2005: 414-426 - [i1]Kevin Fu, Seny Kamara, Tadayoshi Kohno:
Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage. IACR Cryptol. ePrint Arch. 2005: 303 (2005) - 2003
- [j1]Seny Kamara, Sonia Fahmy, E. Eugene Schultz, Florian Kerschbaum, Michael Frantzen:
Analysis of vulnerabilities in Internet firewalls. Comput. Secur. 22(3): 214-232 (2003) - 2002
- [c1]Pascal Meunier, Sofie Nystrom, Seny Kamara, Scott Yost, Kyle Alexander, Dan Noland, Jared Crane:
ActiveSync, TCP/IP and 802.11b Wireless Vulnerabilities of WinCE-Based PDAs. WETICE 2002: 145-152
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint