Rafael Dowsley
Title
Cited by
Cited by
Year
Do You Know Where Your Cloud Files Are?
K Benson, R Dowsley, H Shacham
CCSW 2011, 73-82, 2011
952011
Standard Security Does Not Imply Security against Selective-Opening
M Bellare, R Dowsley, B Waters, S Yilek
EUROCRYPT 2012, 645-662, 2012
582012
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation
M De Cock, R Dowsley, C Horst, R Katti, ACA Nascimento, SC Newman, ...
IEEE Transactions on Dependable and Secure Computing 16 (2), 217-230, 2019
562019
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
R Dowsley, J Müller-Quade, ACA Nascimento
CT-RSA 2009, 240-251, 2009
552009
Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data
M Cock, R Dowsley, ACA Nascimento, SC Newman
AISec 2015, 3-14, 2015
532015
A CCA2 Secure Variant of the McEliece Cryptosystem
N Döttling, R Dowsley, J Müller-Quade, ACA Nascimento
IEEE Transactions on Information Theory 58 (10), 6672-6680, 2012
432012
Oblivious Transfer Based on the McEliece Assumptions
R Dowsley, J van de Graaf, J Müller-Quade, ACA Nascimento
ICITS 2008, 107-117, 2008
372008
Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model
R Tonicelli, ACA Nascimento, R Dowsley, J Müller-Quade, H Imai, ...
International Journal of Information Security 14 (1), 73-84, 2015
272015
Universally Composable Oblivious Transfer Based on a Variant of LPN
B David, R Dowsley, ACA Nascimento
CANS 2014, 143-158, 2014
272014
Towards Trusted eHealth Services in the Cloud
A Michalas, R Dowsley
IEEE/ACM International Conference on Utility and Cloud Computing (UCC) 2015 …, 2015
262015
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model
ACB Pinto, R Dowsley, K Morozov, ACA Nascimento
IEEE Transactions on Information Theory 57 (8), 5566-5571, 2011
202011
Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols
B David, R Dowsley, R Katti, ACA Nascimento
ProvSec 2015, 354-367, 2015
192015
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
R Dowsley, J Van De Graaf, D Marques, ACA Nascimento
WISA 2010, 337-350, 2010
192010
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM
PSLM Barreto, B David, R Dowsley, K Morozov, ACA Nascimento
arXiv preprint arXiv:1710.08256, 2017
172017
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
R Dowsley, J Müller-Quade, A Otsuka, G Hanaoka, ACA Nascimento
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2011
172011
A Survey on Design and Implementation of Protected Searchable Data in the Cloud
R Dowsley, A Michalas, M Nagel, N Paladi
Computer Science Review 26, 17-30, 2017
162017
Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra
B David, R Dowsley, J van de Graaf, D Marques, ACA Nascimento, ...
IEEE Transactions on Information Forensics and Security 11 (1), 59-73, 2015
162015
A Report on Design and Implementation of Protected Searchable Data in IaaS
R Dowsley, A Michalas, M Nagel
Technical Report, 2016
152016
On the Composability of Statistically Secure Bit Commitments
R Dowsley, J van de Graaf, J Müller-Quade, ACA Nascimento
Journal of Internet Technology 14 (3), 509-516, 2013
15*2013
Weakening the Isolation Assumption of Tamper-proof Hardware Tokens
R Dowsley, J Müller-Quade, T Nilges
ICITS 2015, 197-213, 2015
142015
The system can't perform the operation now. Try again later.
Articles 1–20