Multi-level access in searchable symmetric encryption J Alderman, KM Martin, SL Renwick Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017 | 28 | 2017 |
Access control in publicly verifiable outsourced computation J Alderman, C Janson, C Cid, J Crampton Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 18 | 2015 |
Tree-based cryptographic access control J Alderman, N Farley, J Crampton Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 15 | 2017 |
Revocation in publicly verifiable outsourced computation J Alderman, C Janson, C Cid, J Crampton International Conference on Information Security and Cryptology, 51-71, 2014 | 15 | 2014 |
Hybrid publicly verifiable computation J Alderman, C Janson, C Cid, J Crampton Topics in Cryptology-CT-RSA 2016: The Cryptographers' Track at the RSA …, 2016 | 14 | 2016 |
Extended functionality in verifiable searchable encryption J Alderman, C Janson, KM Martin, SL Renwick International Conference on Cryptography and Information Security in the …, 2015 | 10 | 2015 |
A framework for the cryptographic enforcement of information flow policies J Alderman, J Crampton, N Farley Proceedings of the 22nd ACM on Symposium on Access Control Models and …, 2017 | 5 | 2017 |
On the use of key assignment schemes in authentication protocols J Alderman, J Crampton Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013 | 5 | 2013 |
Private outsourced kriging interpolation J Alderman, BR Curtis, O Farràs, KM Martin, J Ribes-González Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017 | 2 | 2017 |
Cryptographic tools for cloud environments J Alderman, J Crampton, KM Martin Guide to security assurance for cloud computing, 15-30, 2015 | 2 | 2015 |
On the use of attribute-based encryption in publicly verifiable outsourced computation. J Alderman Royal Holloway, University of London, 2016 | 1 | 2016 |
The CLARUS modules V1 F Brouillé, T Chevallier, M Azraoui, K Elkhiyaoui, M Önen, W Mallouli, ... | | |
Multi-level Searchable Symmetric Encryption SL Renwick, J Alderman, KM Martin | | |
A framework for user centred privacy and security in the cloud F Brouillé, T Chevallier, M Azraoui, K Elkhiyaoui, M Önen, W Mallouli, ... | | |
Characterization of enabling technologies J Alderman | | |