Introduction to Network Security: Theory and Practice J Wang, ZA Kissel Wiley Press, 2015 | 42 | 2015 |
Verifiable phrase search over encrypted data secure against a semi-honest-but-curious adversary ZA Kissel, J Wang 2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013 | 27 | 2013 |
Intrusion Detections J Wang, ZA Kissel Wiley Data and Cybersecurity, 2015 | 16 | 2015 |
Obfuscation of the standard XOR Encryption algorithm ZA Kissel XRDS: Crossroads, The ACM Magazine for Students 11 (3), 6-6, 2005 | 14 | 2005 |
Experiential learning in the technology disciplines P Sendall, CS Stuetzle, ZA Kissel, T Hameed Proceedings of the EDSIG Conference ISSN 2473, 4901, 2019 | 8 | 2019 |
Verifiable symmetric searchable encryption for multiple groups of users ZA Kissel, J Wang Proceedings of the International Conference on Security and Management (SAM), 1, 2013 | 7 | 2013 |
Data encryption algorithms J Wang, ZA Kissel Wiley Data and Cybersecurity, 2015 | 5 | 2015 |
Experiential Learning Framework for Smaller Computer Science Programs Z Kissel, C Stuetzle Journal of Computing Sciences in Colleges 35 (8), 66-75, 2020 | 4 | 2020 |
Associative memory and the board game Quarto ZA Kissel XRDS: Crossroads, The ACM Magazine for Students 10 (2), 4-4, 2003 | 4 | 2003 |
Access control for untrusted content distribution clouds using unidirectional re-encryption ZA Kissel, J Wang 2013 International Conference on High Performance Computing & Simulation …, 2013 | 3 | 2013 |
Key regression from constrained pseudorandom functions ZA Kissel Information Processing Letters 147, 10-13, 2019 | 2 | 2019 |
Generic adaptively secure searchable phrase encryption ZA Kissel, J Wang Proceedings on Privacy Enhancing Technologies, 2017 | 2 | 2017 |
Base64 Encoding J Wang, ZA Kissel Wiley Data and Cybersecurity, 2015 | 2 | 2015 |
Constrained pseudorandom functions from pseudorandom synthesizers ZA Kissel Cryptology ePrint Archive, 2022 | 1 | 2022 |
The Art of Anti‐Malicious Software J Wang, ZA Kissel Wiley Data and Cybersecurity, 2015 | 1 | 2015 |
Public‐Key Cryptography and Key Management J Wang, ZA Kissel Wiley Data and Cybersecurity, 2015 | 1 | 2015 |
Wireless Network Security J Wang, ZA Kissel Wiley Data and Cybersecurity, 2015 | 1 | 2015 |
A Note on Verifiable Privacy-Preserving Tries ZA Kissel, J Wang 2014 IEEE 7th International Conference on Cloud Computing, 942-943, 2014 | 1 | 2014 |
Policy-Based Redactable Signatures ZA Kissel Cryptology ePrint Archive, 2022 | | 2022 |
Experiential Learning in the Technology Disciplines February 2020 P Sendall, CS Stuetzle, ZA Kissel, T Hameed | | 2020 |