High-Speed Parallel Software Implementation of the ? T Pairing, Topics in Cryptology -CT-RSA 2010, pp.89-105, 2010. ,
DOI : 10.1007/978-3-642-11925-5_7
Formal analysis of SAML 2.0 web browser single sign-on, Proceedings of the 6th ACM workshop on Formal methods in security engineering, FMSE '08, pp.1-10, 2008. ,
DOI : 10.1145/1456396.1456397
Emergency management information system: Case study, GM, Unicom for Communication Technologies ,
A systematic approach to improve communication for emergency response, Proceedings of the 42nd Hawaii International Conference on System Sciences, IEEE HICSS '09, pp.1-8, 2009. ,
Supporting anonymous location queries in mobile environments with privacygrid, Proceeding of the 17th international conference on World Wide Web , WWW '08, pp.237-246, 2008. ,
DOI : 10.1145/1367497.1367531
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.4944
Ciphertext-policy attribute-based encryption . Security and Privacy, IEEE Symposium on, vol.0, pp.321-334, 2007. ,
DOI : 10.1109/sp.2007.11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.3744
Towards a geospatial knowledge discovery framework for disaster management, Proc. of ESA-EUSC 2008, 2008. ,
Twin clouds: An architecture for secure cloud computing, Proc. of Workshop on Cryptography and Security in Clouds, ECRYPT-II, 20011. ,
DOI : 10.1007/978-3-642-24712-5_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.671.7146
Controlling data in the cloud, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, pp.85-90, 2009. ,
DOI : 10.1145/1655008.1655020
Adopting redundancy techniques for multicast stream authentication, The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems, 2003. FTDCS 2003. Proceedings., p.3, 2003. ,
DOI : 10.1109/FTDCS.2003.1204331
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.8214
Development of a virtual dashboard for event coordination between multipul groups, Proc. of 7th International Conference on Information Systems for Crisis Response and Management, 2010. ,
Applications of geospatial technology in international disasters and during hurricane katrina. In available at the Project Site of " Capturing Hurricane Katrina Data For Analysis and Lessons-Learned Research, 2007. ,
Efficient sender authentication and signing of multicast streams over lossy channels, ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2010, pp.1-7, 2010. ,
DOI : 10.1109/AICCSA.2010.5586962
A mobile disaster management system using the android technology, In INternational Journal of Communications, vol.3, pp.77-86, 2009. ,
Towards secure cloud computing architecture -a solution based on software protection mechanism, Journal of Internet Services and Information Security (JISIS), vol.1, issue.5, pp.4-17 ,
A customizable k-anonymity model for protecting location privacy, Proc. of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), pp.620-629, 2005. ,
Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009. ,
DOI : 10.1145/1536414.1536440
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.7592
PRIVÉPRIV´PRIVÉ: Anonymous location-based queries in distributed mobile systems, Proc. of 16th International World Wide Web Conference, pp.371-380, 2007. ,
Authenticating streamed data in the presence of random packet loss (extended abstract), ISOC Network and Distributed System Security Symposium, pp.13-22, 2001. ,
A delegation framework for federated identity management, Proceedings of the 2005 workshop on Digital identity management , DIM '05, pp.94-103, 2005. ,
DOI : 10.1145/1102486.1102502
Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006. ,
DOI : 10.1145/1180405.1180418
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, Proceedings of the 1st international conference on Mobile systems, applications and services, MobiSys '03, pp.163-168, 2003. ,
DOI : 10.1145/1066116.1189037
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.1445
An architecture for privacy-sensitive ubiquitous computing, Proceedings of the 2nd international conference on Mobile systems, applications, and services , MobiSYS '04, pp.177-189, 2004. ,
DOI : 10.1145/990064.990087
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.135.3857
Cloud Hooks: Security and Privacy Issues in Cloud Computing, 2011 44th Hawaii International Conference on System Sciences, pp.1-10, 2011. ,
DOI : 10.1109/HICSS.2011.103
Security issues for cloud computing, International Journal of Information Security and Privacy, vol.4, issue.2, pp.39-51, 2010. ,
Monitoring Insiders Activities in Cloud Computing Using Rule Based Learning, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp.757-764, 2011. ,
DOI : 10.1109/TrustCom.2011.99
An anonymous communication technique using dummies for location-based services, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005., pp.88-97, 2005. ,
DOI : 10.1109/PERSER.2005.1506394
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.2045
On designing privacyaware data upload mechanism -towards information-gathering system for disasters, Proc. of The 11th IEEE International Conference on Ubiquitous Computing and Communications, 2012. ,
DOI : 10.1109/trustcom.2012.214
A manet based emergency communication and information system for catastrophic natural disasters, Distributed Computing Systems Workshops, 2009. ICDCS Workshops '09. 29th IEEE International Conference on, pp.412-417, 2009. ,
Privacy-preserving cloud database querying, Journal of Internet Services and Information Security (JISIS), vol.1, issue.11, pp.5-25 ,
A Comparison of Spatial Generalization Algorithms for LBS Privacy Preservation, 2007 International Conference on Mobile Data Management, pp.258-262, 2007. ,
DOI : 10.1109/MDM.2007.54
Design challenges for an integrated disaster management communication and information system, Proc. of DIREN 2002, 2002. ,
Graph-based authentication of digital streams, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp.232-246, 2001. ,
DOI : 10.1109/SECPRI.2001.924301
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.7672
Towards Privacy-Aware Location-Based Database Servers, 22nd International Conference on Data Engineering Workshops (ICDEW'06), pp.93-102, 2006. ,
DOI : 10.1109/ICDEW.2006.152
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.99.1400
The new casper: Query processing for location services without compromising privacy, Proc. of the 32nd International Conference on Very Large Data Bases, pp.763-774, 2006. ,
Disaster information-gathering system using cellular phone with a global positioning system, Proc. of The International Symposium on Management System for Disaster Prevention, 2006. ,
Efficient multicast stream authentication using erasure codes, ACM Transactions on Information and System Security, vol.6, issue.2, pp.258-285, 2003. ,
DOI : 10.1145/762476.762480
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.604.6014
Efficient multicast packet authentication using signature amortization, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.227-240, 2002. ,
DOI : 10.1109/SECPRI.2002.1004374
Efficient authentication and signing of multicast streams over lossy channels, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp.56-73, 2000. ,
DOI : 10.1109/SECPRI.2000.848446
URL : http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.66.4077&rep=rep1&type=pdf
Incident management systems in disaster management, Journal of Disaster Prevention and Management, pp.405-412, 2003. ,
DOI : 10.1111/j.1467-6486.1988.tb00043.x
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.551.1115
Cloud computing security issues and challenges, MIPRO, 2010 Proceedings of the 33rd International Convention, pp.344-349, 2010. ,
Fuzzy Identity-Based Encryption, Proc. of EURO- CRYPT 2005, pp.457-473, 2005. ,
DOI : 10.1007/11426639_27
Limited delegation for client-side ssl, Proc. of the 6th Annual PKI R & D Workshop, pp.76-90, 2007. ,
Towards a new privacy-aware location sharing platform, Journal of Internet Services and Information Security (JISIS), vol.1, issue.11, pp.47-59 ,
On the Efficient Implementation of Pairing-Based Protocols, Cryptology ePrint Archive Report, vol.56, issue.1, 2011. ,
DOI : 10.1007/978-3-642-19379-8_4
Cloud Computing Security--Trends and Research Directions, 2011 IEEE World Congress on Services, pp.524-531, 2011. ,
DOI : 10.1109/SERVICES.2011.20
Finding community through information and communication technology in disaster response, Proceedings of the ACM 2008 conference on Computer supported cooperative work, CSCW '08, pp.127-136, 2008. ,
DOI : 10.1145/1460563.1460584
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.580.3780
Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services, 2012 IEEE Symposium on Security and Privacy, 2012. ,
DOI : 10.1109/SP.2012.30
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization, Public Key Cryptography -PKC 2011, pp.53-70, 2011. ,
DOI : 10.1007/978-3-642-19379-8_4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.141.1719
The virtual collaboration environment: New media for crisis response, Proc. of 8th International Conference on Information Systems for Crisis Response and Management, 2011. ,
Digital signatures for flows and multicasts, IEEE/ACM Transactions on Networking, vol.7, issue.4, pp.502-513, 1999. ,
Jacobus van der Merwe, and Arun Venkataramani. Disaster recovery as a cloud service: economic benefits & deployment challenges, Proceedings of the 2nd USENIX conference on Hot topics in cloud computing, 2010. ,
Protocols for secure computations, 23rd Annual Symposium on Foundations of Computer Science, pp.160-164, 1982. ,
How to generate and exchange secrets, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986), pp.162-167, 1986. ,
DOI : 10.1109/SFCS.1986.25
A field trial of a collaborative online scenario creation system for emergency management, Proc. of 7th International Conference on Information Systems for Crisis Response and Management, 2010. ,
An efficient communication system for disaster detection and coordinated emergency evacuation, 2008 Wireless Telecomunications Symposium, pp.329-333, 2008. ,
DOI : 10.1109/WTS.2008.4547584