Keith B. Frikken
According to our database1,
Keith B. Frikken
authored at least 50 papers
between 2002 and 2014.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2014
A Scheme for Collaboratively Processing Nearest Neighbor Queries in Oblivious Storage.
EAI Endorsed Trans. Collab. Comput., 2014
2013
ACM Trans. Inf. Syst. Secur., 2013
2012
Cryptographic Enforcement of Access Control while Mitigating Key Sharing.
Proceedings of the SECRYPT 2012, 2012
Private Outsourcing of Matrix Multiplication over Closed Semi-rings.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the 27th International Conference on Data Engineering, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Confidentiality and Integrity for SUM Aggregation in Sensor Networks.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2010
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010
Proceedings of the Computer Security, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
2009
ACM Trans. Inf. Syst. Secur., 2009
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation.
Proceedings of the Data and Applications Security XXIII, 2009
2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
IEEE Trans. Computers, 2006
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Proceedings of the Network and Distributed System Security Symposium, 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Proceedings of the Financial Cryptography and Data Security, 2006
2005
Proceedings of the Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), 2005
Proceedings of the Database Theory, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
Proceedings of the ACSW Frontiers 2005, 2005 ACSW Workshops, 2005
2004
Proceedings of the Practical Handbook of Internet Computing., 2004
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004
Proceedings of the IEEE/ACS International Conference on Pervasive Services (ICPS'04), 2004
2003
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003
Proceedings of the Algorithms and Data Structures, 8th International Workshop, 2003
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003
2002
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002