- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources4
- Resource Type
-
0002000002000000
- More
- Availability
-
40
- Author / Contributor
- Filter by Author / Creator
-
-
Han, Shanshan (4)
-
Mehrotra, Sharad (4)
-
Sharma, Shantanu (4)
-
Gupta, Peeyush (3)
-
Venkatasubramanian, Nalini (3)
-
Wang, Guoxi (3)
-
Panwar, Nisha (2)
-
August, Michael (1)
-
Chakraborty, Vishal (1)
-
Davison, Christopher (1)
-
Diallo, Mamadou (1)
-
Ghosh, Dhrubajyoti (1)
-
Goodrich, Michael T (1)
-
Graves, Christopher (1)
-
Holstrom, Michael (1)
-
Khargonekar, Pramod (1)
-
Kline, Megan (1)
-
Yus, Roberto (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
This paper addresses volume leakage (i.e., leakage of the number of records in the answer set) when processing keyword queries in encrypted key-value (KV) datasets. Volume leakage, coupled with prior knowledge about data distribution and/or previously executed queries, can reveal both ciphertexts and current user queries. We develop a solution to prevent volume leakage, entitled Veil, that partitions the dataset by randomly mapping keys to a set of equi-sized buckets. Veil provides a tunable mechanism for data owners to explore a trade-off between storage and communication overheads. To make buckets indistinguishable to the adversary, Veil uses a novel padding strategy that allow buckets to overlap, reducing the need to add fake records. Both theoretical and experimental results show Veil to significantly outperform existing state-of-the-art.more » « less
-
Sharma, Shantanu; Mehrotra, Sharad; Panwar, Nisha; Venkatasubramanian, Nalini; Gupta, Peeyush; Han, Shanshan; Wang, Guoxi (, IEEE World Congress on Services (SERVICES), 2022.)
-
Sharma, Shantanu; Mehrotra, Sharad; Panwar, Nisha; Venkatasubramanian, Nalini; Gupta, Peeyush; Han, Shanshan; Wang, Guoxi (, IEEE Transactions on Services Computing)
-
August, Michael; Davison, Christopher; Diallo, Mamadou; Ghosh, Dhrubajyoti; Gupta, Peeyush; Graves, Christopher; Han, Shanshan; Holstrom, Michael; Khargonekar, Pramod; Kline, Megan; et al (, SenSys '20: Proceedings of the 18th Conference on Embedded Networked Sensor Systems)
An official website of the United States government
