Privacy-preserving query processing by multi-party computation M Sepehri, S Cimato, E Damiani The Computer Journal 58 (10), 2195-2212, 2015 | 30 | 2015 |
Data sharing on the cloud: A scalable proxy-based protocol for privacy-preserving queries M Sepehri, S Cimato, E Damiani, CY Yeun 2015 IEEE Trustcom/BigDataSE/ISPA 1, 1357-1362, 2015 | 24 | 2015 |
Differentially private two-party set operations B Kacsmar, B Khurram, N Lukas, A Norton, M Shafieinejad, Z Shang, ... 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 390-404, 2020 | 21 | 2020 |
Secure Data Sharing in Cloud Usingan Efficient Inner-Product ProxyRe-Encryption Scheme. M Sepehri, A Trombetta, M Sepehri J. Cyber Secur. Mobil. 6 (3), 339-378, 2017 | 10 | 2017 |
Efficient implementation of a proxy-based protocol for data sharing on the cloud M Sepehri, S Cimato, E Damiani Proceedings of the Fifth ACM International Workshop on Security in Cloud …, 2017 | 10 | 2017 |
Low-cost hiding of the query pattern M Sepehri, F Kerschbaum Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 4 | 2021 |
A scalable multi-party protocol for privacy-preserving equality test M Sepehri, S Cimato, E Damiani Advanced Information Systems Engineering Workshops: CAiSE 2013 International …, 2013 | 4 | 2013 |
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem S Cimato, G Gianini, M Sepehri, R Asal, E Damiani Journal of Information Security and Applications 51, 102462, 2020 | 3 | 2020 |
A multi-party protocol for privacy-preserving range queries M Sepehri, S Cimato, E Damiani Secure Data Management: 10th VLDB Workshop, SDM 2013, Trento, Italy, August …, 2014 | 3 | 2014 |
Privacy-preserving query processing by multi-party computation and encrypted data outsourcing M Sepehri Ph. D. thesis, 2012 | 3 | 2012 |
An efficient cryptography-based access control using inner-product proxy re-encryption scheme M Sepehri, A Trombetta, M Sepehri, E Damiani Proceedings of the 13th International Conference on Availability …, 2018 | 2 | 2018 |
Committee-Based Active Learning to Select Negative Examples for Predicting Protein Functions M Frasca, M Sepehri, A Petrini, G Grossi, G Valentini Computational Intelligence Methods for Bioinformatics and Biostatistics …, 2020 | 1 | 2020 |
System and method for data privacy policy generation and implementation M Sepehri, P Chan, A Santos, R Jagannathan US Patent App. 18/169,843, 2023 | | 2023 |
Analysis of Novel Annotations in the Gene Ontology for Boosting the Selection of Negative Examples M Sepehri, M Frasca Proceedings of the 2019 9th International Conference on Biomedical …, 2019 | | 2019 |
COMPARING PRIVACY-PRESERVING QUERY PROCESSING OVER OUTSOURCED ENCRYPTED DATA AND MULTI-PARTY COMPUTATION. M Sepehri Università degli Studi di Milano, 2014 | | 2014 |
Tan, Te Juin Lester 175 Tang, Haixu 521 Towa, Patrick 405 Treharne, Helen 425 J Koschel, E Koutsoupias, B Kreuter, R Küsters, X Lan, A Lehmann, ... | | |
Technical Program Committees R Nagarajan, M Anisetti, F Frati, A Provetti, G Gianini, M Leida, A Paul, ... | | |
IEEE SCC 2019 Program Committee H Al Hammadi, Y Alhammadi, H Alkhzaimi, ADM Alshemaili, ... | | |
IEEE ICIOT 2019 Reviewers H Al Hammadi, Y Alhammadi, H Alkhzaimi, S Almulla, M Alshemaili, ... | | |
IEEE ICIOT 2019 Program Committee H Al Hammadi, Y Alhammadi, H Alkhzaimi, ADS Almulla, M Alshemaili, ... | | |