Hossein Shafagh

According to our database1, Hossein Shafagh authored at least 28 papers between 2013 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Zeph: Cryptographic Enforcement of End-to-End Data Privacy.
Proceedings of the 15th USENIX Symposium on Operating Systems Design and Implementation, 2021

2020
Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams.
Proceedings of the 29th USENIX Security Symposium, 2020

TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control.
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020

2018
Retaining Data Ownership in the Internet of Things.
PhD thesis, 2018

SEDA: Secure Over-the-Air Code Dissemination Protocol for the Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2018

TimeCrypt: A Scalable Private Time Series Data Store.
CoRR, 2018

Droplet: Decentralized Authorization for IoT Data Streams.
CoRR, 2018

Marble: Making Fully Homomorphic Encryption Accessible to All.
Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2018

2017
Towards Blockchain-based Auditable Storage and Sharing of IoT Data.
CoRR, 2017

Privacy-preserving Quantified Self: Secure Sharing and Processing of Encrypted Small Data.
Proceedings of the Workshop on Mobility in the Evolving Internet Architecture, 2017

Secure Sharing of Partially Homomorphic Encrypted IoT Data.
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017

Towards Blockchain-based Auditable Storage and Sharing of IoT Data.
Proceedings of the 9th Cloud Computing Security Workshop, 2017

2016
Talos a Platform for Processing Encrypted IoT Data: Demo Abstract.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

CrossZig: Combating Cross-Technology Interference in Low-Power Wireless Networks.
Proceedings of the 15th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2016

2015
Toward computing over encrypted data in IoT systems.
XRDS, 2015

Talos: Encrypted Query Processing for the Internet of Things.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

Poster: Toward Efficient and Secure Code Dissemination Protocol for the Internet of Things.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

Poster: Cross-Layer Optimization for Low-power Wireless Coexistence.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

Poster: Towards Encrypted Query Processing for the Internet of Things.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Controlled Interference Generation for Wireless Coexistence Research.
Proceedings of the 2015 Workshop on Software Radio Implementation Forum, 2015

TIIM: technology-independent interference mitigation for low-power wireless networks.
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015

POSTER: Computations on Encrypted Data in the Internet of Things Applications.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Delegation-based authentication and authorization for the IP-based Internet of Things.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

Poster: come closer: proximity-based authentication for the internet of things.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Understanding the impact of cross technology interference on IEEE 802.15.4.
Proceedings of the 9th ACM international workshop on Wireless network testbeds, 2014

Poster Abstract: Security Comes First, a Public-key Cryptography Framework for the Internet of Things.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2014

Poster Abstract: Low-Power Wireless Channel Quality Estimation in the Presence of RF Smog.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2014

2013
6LoWPAN fragmentation attacks and mitigation mechanisms.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013


  Loading...