Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Extension to CryptDB with Support for Arithmetic Expressions

    Growth of cloud infrastructure has made it attractive for enterprises to rethink how and where to position their resources. CryptDB ( Raluca Ada Popa, et al.: CryptDB: Protecting Confidentiality with Encrypted...

    Karthik Jagilinki, Ray Kresman in IT Convergence and Security (2021)

  2. No Access

    Chapter and Conference Paper

    On Privacy Preserving Encrypted Data Stores

    Bucketization techniques allow for effective organization of encrypted data at untrusted servers and for querying by clients. This paper presents a new metric for estimating the risk of data exposure over a se...

    Tracey Raybourn, Jong Kwan Lee, Ray Kresman in Multimedia and Ubiquitous Engineering (2013)

  3. No Access

    Chapter and Conference Paper

    A Heuristic Algorithm for Finding Edge Disjoint Cycles in Graphs

    The field of data mining provides techniques for new knowledge discovery. Distributed mining offers the miner a larger dataset with the possibility of finding stronger and, perhaps, novel association rules. Th...

    Renren Dong, Ray Kresman in Software and Data Technologies (2013)

  4. No Access

    Chapter

    Anonymous ID Assignment and Opt-Out

    The networked society places great demand on the dissemination and sharing of private data. As privacy concerns grow, anonymity of communications becomes important. This paper addresses the issue of anonymous ...

    Samuel S. Shepard, Renren Dong, Ray Kresman in Electronic Engineering and Computing Techn… (2010)