Benjamin Fuller
Orcid: 0000-0001-6450-0088Affiliations:
- University of Connecticut, Storrs, CT, USA
- Boston University, MA, USA (PhD 2015)
- Massachusetts Institute of Technology, Lincoln Laboratory, Boston, MA, USA (2007 - 2016)
According to our database1,
Benjamin Fuller
authored at least 52 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
Des. Codes Cryptogr., July, 2024
ProxCode: Efficient Biometric Proximity Searchable Encryption from Error Correcting Codes.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
The Decisive Power of Indecision: Low-Variance Risk-Limiting Audits and Election Contestation via Marginal Mark Recording.
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
Multi random projection inner product encryption, applications to proximity searchable encryption for the iris biometric.
Inf. Comput., August, 2023
FASHION: Functional and Attack Graph Secured HybrId Optimization of Virtualized Networks.
IEEE Trans. Dependable Secur. Comput., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Privacy Attacks Against Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models.
CoRR, 2022
Inverting Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models.
Proceedings of the IEEE International Joint Conference on Biometrics, 2022
Proceedings of the 28th International Conference on Principles and Practice of Constraint Programming, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021
2020
Proceedings of the 2020 IEEE International Joint Conference on Biometrics, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
FASHION: Functional and Attack graph Secured HybrId Optimization of virtualized Networks.
CoRR, 2019
Proceedings of the Information Security - 22nd International Conference, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the 10th IEEE International Conference on Biometrics Theory, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the Computer Vision - ACCV 2018 Workshops, 2018
2017
FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise.
Cryptogr., 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
2016
IACR Cryptol. ePrint Arch., 2016
2015
Iris Biometric Security Challenges and Possible Solutions: For your eyes only?Using the iris as a key.
IEEE Signal Process. Mag., 2015
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy.
J. Cryptol., 2015
IACR Cryptol. ePrint Arch., 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014
2013
2012
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
2010
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010
2007
Proceedings of the 4th International Workshop on Visualization for Computer Security, 2007