Muhammad Naveed
TitleCited byYear
Inference Attacks on Property-Preserving Encrypted Databases
M Naveed, S Kamara, CV Wright
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2672015
Dynamic searchable encryption via blind storage
M Naveed, M Prabhakaran, CA Gunter
2014 IEEE Symposium on Security and Privacy (SP), 639-654, 2014
2152014
Identity, location, disease and more: Inferring your secrets from android public resources
X Zhou, S Demetriou, D He, M Naveed, X Pan, XF Wang, CA Gunter, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1512013
Privacy in the Genomic Era
M Naveed, E Ayday, EW Clayton, J Fellay, CA Gunter, JP Hubaux, ...
ACM Computing Surveys (CSUR), 2015, 2015
1232015
The peril of fragmentation: Security hazards in android device driver customizations
X Zhou, Y Lee, N Zhang, M Naveed, XF Wang
2014 IEEE Symposium on Security and Privacy (SP), 409-423, 2014
962014
Leakage-Abuse Attacks against Order-Revealing Encryption
P Grubbs, K Sekniqi, V Bindschaedler, M Naveed, T Ristenpart
2017 IEEE Symposium on Security and Privacy (SP), 2017
672017
Security Concerns in Android mHealth Apps
D He, M Naveed, CA Gunter, K Nahrstedt
AMIA 2014 Annual Symposium, 2014
672014
Leave Me Alone: App-level Protection Against Runtime Information Gathering on Android
N Zhang, K Yuan, M Naveed, X Zhou, XF Wang
2015 IEEE Symposium on Security and Privacy (SP), 2015
622015
Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward
V Bindschaedler, M Naveed, X Pan, XF Wang, Y Huang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
542015
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Bonding on Android
M Naveed, X Zhou, S Demetriou, XF Wang, CA Gunter
Proceedings of the 21st Annual Network and Distributed System Security …, 2014
532014
The Fallacy of Composition of Oblivious RAM and Searchable Encryption
M Naveed
512015
Breaking Web Applications Built On Top of Encrypted Data
P Grubbs, R McPherson, M Naveed, T Ristenpart, V Shmatikov
ACM SIGSAC Conference on Computer and Communications Security, 2016
452016
What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources
S Demetriou, X Zhou, M Naveed, Y Lee, K Yuan, X Wang, CA Gunter
Proceedings of the 22nd Annual Network and Distributed System Security …, 2015
43*2015
Controlled Functional Encryption
M Naveed, S Agrawal, M Prabhakaran, X Wang, E Ayday, JP Hubaux, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
412014
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services
T Li, X Zhou, L Xing, Y Lee, M Naveed, XF Wang, X Han
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
392014
Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM
C Fletcher, M Naveed, L Ren, E Shi, E Stefanov
302015
Network intrusion prevention by configuring ACLs on the routers, based on snort IDS alerts
M Naveed, S un Nihar, MI Babar
Emerging Technologies (ICET), 2010 6th International Conference on, 234-239, 2010
152010
Reliable and Low Cost RFID Based Authentication System for Large Scale Deployment.
M Naveed, W Habib, U Masud, U Ullah, G Ahmad
IJ Network Security 14 (3), 173-179, 2012
142012
Hurdles for genomic data usage management
M Naveed
Security and Privacy Workshops (SPW), 2014 IEEE, 44-48, 2014
42014
Novel use of Steganography for both Confidentiality and Compression
F Ullah, M Naveed, MI Babar, F Iqbal
International Journal of Engineering and Technology 2 (4), 361-366, 2010
42010
The system can't perform the operation now. Try again later.
Articles 1–20