• 431 Citations
  • 11 h-Index
20112018
If you made any changes in Pure, your changes will be visible here soon.

Research Output 2011 2018

  • 431 Citations
  • 11 h-Index
  • 15 Conference contribution
  • 6 Article
  • 2 Conference article
Filter
Conference contribution
2018

A privacy-aware and user-centric approach for query processing in cloud

Samanthula, B. K., Liporace, J. & Issiov, M., 26 Oct 2018, Proceedings - 3rd IEEE International Conference on Smart Cloud, SmartCloud 2018. Institute of Electrical and Electronics Engineers Inc., p. 54-59 6 p. 8513715

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Query processing
Network protocols
Outsourcing
Cloud computing
Scalability
1 Citation (Scopus)

Integrating interactive computer simulations into K-12 earth and environmental science

Zhu, M., Panorkou, N., Lal, P., Etikyala, S., Germia, E., Iranah, P., Samanthula, B. K. & Basu, D., 17 Apr 2018, ISEC 2018 - Proceedings of the 8th IEEE Integrated STEM Education Conference. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 220-223 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Earth Sciences
Ecology
computer simulation
Computer Simulation
Water Cycle

Optimized secure data aggregation in wireless sensor networks

Thompson, S. A. & Samanthula, B. K., 28 Sep 2018, Proceedings - 2017 15th Annual Conference on Privacy, Security and Trust, PST 2017. Institute of Electrical and Electronics Engineers Inc., p. 394-396 3 p. 8476961

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless sensor networks
Agglomeration
Sensor nodes
Patient monitoring
Sensors

Secure Similar Document Detection: Optimized Computation Using the Jaccard Coefficient

Forman, S. & Samanthula, B. K., 28 Nov 2018, Proceedings - 4th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2018, 4th IEEE International Conference on High Performance and Smart Computing, HPSC 2018 and 3rd IEEE International Conference on Intelligent Data and Security, IDS 2018. Institute of Electrical and Electronics Engineers Inc., p. 1-4 4 p. 8552273. (Proceedings - 4th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2018, 4th IEEE International Conference on High Performance and Smart Computing, HPSC 2018 and 3rd IEEE International Conference on Intelligent Data and Security, IDS 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hash functions
Filter
Coefficients
Hash function
Military
2017
2 Citations (Scopus)

Privacy-preserving outsourced collaborative frequent itemset mining in the cloud

Samanthula, B. K., 1 Jul 2017, Proceedings - 2017 IEEE International Conference on Big Data, Big Data 2017. Nie, J-Y., Obradovic, Z., Suzumura, T., Ghosh, R., Nambiar, R., Wang, C., Zang, H., Baeza-Yates, R., Baeza-Yates, R., Hu, X., Kepner, J., Cuzzocrea, A., Tang, J. & Toyoda, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 4827-4829 3 p. (Proceedings - 2017 IEEE International Conference on Big Data, Big Data 2017; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Frequent Itemsets
Privacy Preserving
Mining
Cloud computing
Information management
2016
17 Citations (Scopus)

Privacy-Preserving and Outsourced Multi-user K-Means Clustering

Rao, F. Y., Samanthula, B. K., Bertino, E., Yi, X. & Liu, D., 1 Mar 2016, Proceedings - 2015 IEEE Conference on Collaboration and Internet Computing, CIC 2015. Institute of Electrical and Electronics Engineers Inc., p. 80-89 10 p. 7423068. (Proceedings - 2015 IEEE Conference on Collaboration and Internet Computing, CIC 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data mining
Cluster computing
Clustering algorithms
Communication
Costs
2015
6 Citations (Scopus)

Privacy-Preserving Protocols for Shortest Path Discovery over Outsourced Encrypted Graph Data

Samanthula, B. K., Rao, F. Y., Bertino, E. & Yi, X., 19 Oct 2015, Proceedings - 2015 IEEE 16th International Conference on Information Reuse and Integration, IRI 2015. Institute of Electrical and Electronics Engineers Inc., p. 427-434 8 p. 7301008. (Proceedings - 2015 IEEE 16th International Conference on Information Reuse and Integration, IRI 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network protocols
Outsourcing
Geographic information systems
Internet
Privacy preserving
1 Citation (Scopus)

Security with privacy-A research agenda

Bertino, E. & Samanthula, B. K., 19 Jan 2015, CollaborateCom 2014 - Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing. Institute of Electrical and Electronics Engineers Inc., p. 144-153 10 p. 7014559. (CollaborateCom 2014 - Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Competitive intelligence
Information management
Momentum
Big data
2014
14 Citations (Scopus)

Privacy-preserving complex query evaluation over semantically secure encrypted data

Samanthula, B. K., Jiang, W. & Bertino, E., 1 Jan 2014, Computer Security, ESORICS 2014 - 19th European Symposium on Research in Compter Security, Proceedings. PART 1 ed. Springer Verlag, p. 400-418 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8712 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Query Evaluation
Query processing
Privacy Preserving
Query
Query Processing
150 Citations (Scopus)

Secure k-nearest neighbor query over encrypted data in outsourced environments

Elmehdwi, Y., Samanthula, B. K. & Jiang, W., 1 Jan 2014, 2014 IEEE 30th International Conference on Data Engineering, ICDE 2014. IEEE Computer Society, p. 664-675 12 p. 6816690. (Proceedings - International Conference on Data Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Query processing
Outsourcing
Cloud computing
Mobile devices
Information management
2013
30 Citations (Scopus)

An efficient and probabilistic secure bit-decomposition

Samanthula, B. K. K., Chun, H. & Jiang, W., 27 May 2013, ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. p. 541-546 6 p. (ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decomposition
Cryptography
2012
16 Citations (Scopus)

An efficient and secure data sharing framework using homomorphic encryption in the cloud

Samanthula, B. K., Howser, G., Elmehdwi, Y. & Madria, S., 4 Oct 2012, Proceedings of the 1st International Workshop on Cloud Intelligence, Cloud-I 2012. 2347681

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Outsourcing
Data as a service (DaaS)
Information management
Costs
5 Citations (Scopus)

Structural and message based private friend recommendation

Samanthula, B. K. & Jiang, W., 1 Dec 2012, Proceedings of the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2012. p. 684-690 7 p. 6425690

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
2011
3 Citations (Scopus)

A secure and distributed framework to identify and share needed information

Jiang, W. & Samanthula, B. K., 1 Dec 2011, Proceedings - 2011 IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on Social Computing, PASSAT/SocialCom 2011. p. 1224-1230 7 p. 6113286. (Proceedings - 2011 IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on Social Computing, PASSAT/SocialCom 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information analysis
National security
Communication
Decision making
12 Citations (Scopus)

N-gram based secure similar document detection

Jiang, W. & Samanthula, B. K., 18 Jul 2011, Data and Applications Security and Privacy XXV - 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Proceedings. p. 239-246 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6818 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

N-gram
Vector spaces
Communication
Query
Vector Space Model