Privacy-preserving digital identity management for cloud computing. E Bertino, F Paci, R Ferrini, N Shang IEEE Data Eng. Bull. 32 (1), 21-27, 2009 | 271 | 2009 |
Privacy preserving policy-based content sharing in public clouds M Nabeel, N Shang, E Bertino IEEE Transactions on Knowledge and Data Engineering 25 (11), 2602-2614, 2012 | 227 | 2012 |
Preserving security by synchronizing a nonce or counter between systems CS Wurster, N Shang, P THOMAS, SA Sprigg, M Hohlfeld, IH Mclean | 166 | 2013 |
A privacy-preserving approach to policy-based content dissemination N Shang, M Nabeel, F Paci, E Bertino 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010), 944-955, 2010 | 140 | 2010 |
An efficient time-bound hierarchical key management scheme for secure broadcasting E Bertino, N Shang, SS Wagstaff Jr IEEE transactions on dependable and secure computing 5 (2), 65-70, 2008 | 106 | 2008 |
Efficient privacy preserving content based publish subscribe systems M Nabeel, N Shang, E Bertino Proceedings of the 17th ACM symposium on Access Control Models and …, 2012 | 95 | 2012 |
A decentralized privacy preserving reputation protocol for the malicious adversarial model O Hasan, L Brunie, E Bertino, N Shang IEEE Transactions on Information Forensics and Security 8 (6), 949-962, 2013 | 91 | 2013 |
Proximity determination based on distance ratios N Shang, Y Yang US Patent 8,948,782, 2015 | 35 | 2015 |
Securing databases against piracy attacks A Bhatia, N Shang, Y Yang US Patent 9,584,528, 2017 | 33 | 2017 |
Digital identity protection-concepts and issues E Bertino, F Paci, N Shang 4th International Conference on Availability, Reliability and Security, 2009 | 29 | 2009 |
Privacy-preserving matching of spatial datasets with protection against background knowledge G Ghinita, CR Vicente, N Shang, E Bertino Proceedings of the 18th SIGSPATIAL International Conference on Advances in …, 2010 | 23 | 2010 |
Wavecoder: Widespread and versatile enhanced instruction tuning with refined data generation Z Yu, X Zhang, N Shang, Y Huang, C Xu, Y Zhao, W Hu, Q Yin arXiv preprint arXiv:2312.14187, 2023 | 22 | 2023 |
Explicit formulas for real hyperelliptic curves of genus 2 in affine representation S Erickson, MJ Jacobson, N Shang, S Shen, A Stein Arithmetic of Finite Fields: First International Workshop, WAIFI 2007 …, 2007 | 21 | 2007 |
Communicating RF fingerprint-based geofences X Li, N Shang, MA Ische US Patent 9,414,193, 2016 | 19 | 2016 |
Privacy-preserving filtering and covering in content-based publish subscribe systems M Nabeel, N Shang, E Bertino Purdue Univ., West Lafayette, Indiana, USA, Tech. Rep 15, 2009 | 17 | 2009 |
Mask: a system for privacy-preserving policy-based access to published content M Nabeel, N Shang, J Zage, E Bertino Proceedings of the 2010 ACM SIGMOD International Conference on Management of …, 2010 | 15 | 2010 |
Controlling data disclosure in computational PIR protocols N Shang, G Ghinita, Y Zhou, E Bertino Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010 | 14 | 2010 |
Efficient and privacy-preserving enforcement of attribute-based access control N Shang, F Paci, E Bertino Proceedings of the 9th Symposium on Identity and Trust on the Internet, 63-68, 2010 | 11 | 2010 |
Broadcast group key management with access control vectors N Shang, M Nabeel, E Bertino, X Zou Department of Computer Science, Tech. Rep 4, 2010 | 9 | 2010 |
Generating pairing-friendly parameters for the CM construction of genus 2 curves over prime fields K Lauter, N Shang Designs, codes and cryptography 67 (3), 341-355, 2013 | 7 | 2013 |