Privacy-preserving digital identity management for cloud computing. E Bertino, F Paci, R Ferrini, N Shang IEEE Data Eng. Bull. 32 (1), 21-27, 2009 | 273 | 2009 |
Privacy preserving policy-based content sharing in public clouds M Nabeel, N Shang, E Bertino IEEE Transactions on Knowledge and Data Engineering 25 (11), 2602-2614, 2012 | 229 | 2012 |
Preserving Security by Synchronizing a Nonce or Counter Between Systems CS Wurster, N Shang, P Thomas, SA Sprigg, M Hohlfeld, IH Mclean US Patent App. 13/773,336, 2014 | 169 | 2014 |
A privacy-preserving approach to policy-based content dissemination N Shang, M Nabeel, F Paci, E Bertino 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010), 944-955, 2010 | 141 | 2010 |
An efficient time-bound hierarchical key management scheme for secure broadcasting E Bertino, N Shang, SS Wagstaff Jr IEEE transactions on dependable and secure computing 5 (2), 65-70, 2008 | 113 | 2008 |
Efficient privacy preserving content based publish subscribe systems M Nabeel, N Shang, E Bertino Proceedings of the 17th ACM symposium on Access Control Models and …, 2012 | 95 | 2012 |
A decentralized privacy preserving reputation protocol for the malicious adversarial model O Hasan, L Brunie, E Bertino, N Shang IEEE Transactions on Information Forensics and Security 8 (6), 949-962, 2013 | 94 | 2013 |
Proximity determination based on distance ratios N Shang, Y Yang US Patent 8,948,782, 2015 | 35 | 2015 |
Securing databases against piracy attacks A Bhatia, N Shang, Y Yang US Patent 9,584,528, 2017 | 33 | 2017 |
Digital identity protection-concepts and issues E Bertino, F Paci, N Shang 4th International Conference on Availability, Reliability and Security, 2009 | 28 | 2009 |
Wavecoder: Widespread and versatile enhanced instruction tuning with refined data generation Z Yu, X Zhang, N Shang, Y Huang, C Xu, Y Zhao, W Hu, Q Yin arXiv preprint arXiv:2312.14187, 2023 | 27 | 2023 |
Privacy-preserving matching of spatial datasets with protection against background knowledge G Ghinita, CR Vicente, N Shang, E Bertino Proceedings of the 18th SIGSPATIAL International Conference on Advances in …, 2010 | 24 | 2010 |
Explicit formulas for real hyperelliptic curves of genus 2 in affine representation S Erickson, MJ Jacobson, N Shang, S Shen, A Stein Arithmetic of Finite Fields: First International Workshop, WAIFI 2007 …, 2007 | 20 | 2007 |
Communicating RF fingerprint-based geofences X Li, N Shang, MA Ische US Patent 9,414,193, 2016 | 19 | 2016 |
Privacy-preserving filtering and covering in content-based publish subscribe systems M Nabeel, N Shang, E Bertino Rapport technique, Purdue University 6, 24, 2009 | 17 | 2009 |
Mask: a system for privacy-preserving policy-based access to published content M Nabeel, N Shang, J Zage, E Bertino Proceedings of the 2010 ACM SIGMOD International Conference on Management of …, 2010 | 15 | 2010 |
Controlling data disclosure in computational PIR protocols N Shang, G Ghinita, Y Zhou, E Bertino Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010 | 14 | 2010 |
Efficient and privacy-preserving enforcement of attribute-based access control N Shang, F Paci, E Bertino Proceedings of the 9th Symposium on Identity and Trust on the Internet, 63-68, 2010 | 11 | 2010 |
Broadcast group key management with access control vectors N Shang, M Nabeel, E Bertino, X Zou Department of Computer Science, Tech. Rep 4, 2010 | 9 | 2010 |
Product authentication based upon a hyperelliptic curve equation and a curve pairing function N Shang US Patent 8,769,301, 2014 | 8 | 2014 |