Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity
Seny Kamara, Tarik Moataz.
Eurocrypt '17
(pdf)
SQL on Structurally-Encrypted Databases
Seny Kamara, Tarik Moataz.
IACR ePrint 2016/453
(pdf)
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
Giuseppe Ateniese, Antonio Faonio, Seny Kamara
IMACC '15
(pdf)
Inference Attacks Against Property-Preserving Encrypted Databases
Muhammad Naveed, Seny Kamara, Charles Wright
Conference on Computer and Communications Security (CCS '15)
GRECS: Graph Encryption for Approximate Shortest Distance Queries
Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios
Conference on Computer and Communications Security (CCS '15)
(full version pdf)
Attacking Data Center Networks from the Inside
Anurag Khandelwal, Navendu Jain, Seny Kamara.
MSR Tech Report MSR-TR-2015-52
(tech report pdf)
Encrypted Search
Seny Kamara
ACM XRDS
(tech report pdf)
Co-Location-Resistant Clouds
Yossi Azar, Seny Kamara, Ishai Menache, Mariana Raykova and Bruce Shepherd
ACM Cloud Computing Security Workshop (CCSW '14)
(proceedings pdf)
Restructuring the NSA Metadata Program
Seny Kamara
Workshop on Applied Homomorphic Cryptography (WAHC '14)
(proceedings pdf)
Scaling Private Set Intersection to Billion Element Sets
Seny Kamara, Payman Mohassel, Mariana Raykova and Saeed Sadeghian
Financial Cryptography and Data Security (FC'14)
(tech report pdf)
Tight Bounds for Online Vector Bin Packing
Yossi Azar, Ilan Cohen, Seny Kamara and Bruce Shepherd
ACM Symposium on the Theory of Computing (STOC '13)
Garbled Circuits via Structured Encryption
Seny Kamara and Lei Wei
Workshop on Applied Homomorphic Cryptography (WAHC '13)
(proceedings pdf)
Parallel Homomorphic Encryption (or
MapReduce/Hadoop on Encrypted Data)
Seny Kamara and Mariana Raykova
Workshop on Applied Homomorphic Cryptography (WAHC '13)
(proceedings pdf; full pdf)
Parallel and Dynamic Searchable Symmetric Encryption
Seny Kamara and Charalampos Papamanthou
Financial Cryptography and Data Security (FC '13)
(full pdf)
Salus: A System for Server-Aided Secure Function Evaluation
Seny Kamara, Payman Mohassel and Ben Riva
Conference on Computer and Communications Security (CCS '12)
(full pdf; notes txt)
Dynamic Searchable Symmetric Encryption
Seny Kamara, Charalampos Papamanthou and Tom Roeder
Conference on Computer and Communications Security (CCS '12)
(full pdf)
An Inspection-Resistant On-Chip Memory Architecture
Jonathan Valamehr, Melissa Chase, Seny Kamara, Andrew Putnam,
Tim Sherwood, Dan Shumow and Vinod Vaikuntanathan
International Symposium on Computer Architecture (ISCA '12)
(full pdf)
Outsourcing Multi-Party Computation
Seny Kamara, Payman Mohassel and Mariana Raykova
IACR ePrint report 2011/272
(draft pdf;
slides pdf)
Secure Outsourced Computation in a Multi-Tenant Cloud.
Seny Kamara and Mariana Raykova.
Workshop on Cryptography and Security in Clouds, 2011.
Trustworthy from Silicon Up
Melissa Chase, Seny Kamara, Andrew Putnam, Tim Sherwood, Dan Shumow and Vinod Vaikuntanathan.
Position Paper in New Directions in Computer Architecture, 2011.
Cryptographic Cloud Storage
Seny Kamara and Kristin Lauter
Workshop on Real-Life Cryptographic Protocols and Standardization, 2010.
(proceedings pdf)
Structured Encryption and Controlled Disclosure
Melissa Chase and Seny Kamara
Advances in Cryptology - ASIACRYPT '10
(full pdf;
slides pdf)
Proofs of Storage from Homomorphic Identification Protocols
Giuseppe Ateniese, Seny Kamara, and Jonathan Katz
Advances in Cryptology - ASIACRYPT '09
(full pdf;
slides: pdf)
How to Encrypt with a Malicious Random Number Generator
Seny Kamara and Jonathan Katz
Fast Software Encryption (FSE '08)
(proceedings pdf)
Towards Practical Biometric Key Generation with Randomized Biometric Templates.
Lucas Ballard, Seny Kamara, Fabian Monrose, and Michael K. Reiter.
Conference on Computer and Communications Security (CCS '08).
(full pdf)
The Practical Subtleties of Biometric Key Generation.
Lucas Ballard, Seny Kamara and Michael K. Reiter.
Usenix Security Symposium 2008.
(full pdf)
Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions.
Reza Curtmola, Juan Garay, Seny Kamara and Rafail Ostrovsky.
Conference on Computer and Communications Security (CCS '06), 2006
Journal of Computer Security
(proceedings pdf;
full pdf)
A Mechanism for Communication-Efficient Broadcast Encryption Over Wireless Ad Hoc Networks.
Reza Curtmola and Seny Kamara.
Workshop on Cryptography in Ad Hoc Networks (WCAN '06).
(proceedings pdf;
slides ppt)
Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage.
Kevin Fu, Seny Kamara and Tadayoshi Kohno.
Network and Distributed System Security Symposium (NDSS '06)
(full pdf)
An Extensible Platform for Evaluating Security Protocols.
Seny Kamara, Darren Davis, Lucas Ballard, Ryan Caudy and Fabian Monrose.
IEEE Annual Simulation Symposium (ANSS '05)
(slides pdf)
Analysis of Vulnerabilities in Internet Firewalls.
Seny Kamara, Sonia Fahmy, Eugene Schultz, Florian Kerschbaum and Mike Frantzen.
Journal of Computers and Security, 22(3): 214-232, 2003.
Activesync, TCP/IP and 802.11 Wireless Vulnerabilities of WinCE-based PDAs.
Pascal Meunier, Sofie Nystrom, Seny Kamara, Scott Yost, Kyle Alexander and Dan Noland.
IEEE Workshop on Enabling Technologies (WETICE '02).