Browse by Author: Kaosar, Md. Golam

Up a level
Export as [feed] Atom [feed] RSS
Group by: Item Type | No Grouping
Number of items: 11.

Yi, Xun, Kaosar, Md. Golam, Paulet, Russell and Bertino, E (2012) Single-Database Private Information Retrieval from Fully Homomorphic Encryption. IEEE Transactions on Knowledge and Data Engineering, 25 (5). pp. 1125-1134. ISSN 1041-4347

Paulet, Russell, Kaosar, Md. Golam, Yi, Xun and Bertino, E (2012) Privacy-Preserving and Content-Protection Location Based Queries. In: 2012 IEEE 28th International Conference on Data Engineering (ICDE 2012). IEEE, United States, pp. 44-53.

Kaosar, Md. Golam, Paulet, Russell and Yi, Xun (2012) Fully homomorphic encryption based two-party association rule mining. Data and Knowledge Engineering, 76-78. pp. 1-15. ISSN 0169-023X

Kaosar, Md. Golam and Yi, Xun (2011) Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree a one-pass FP-tree method to perform association rule mining without compromising any data privacy among two parties. International Journal of Information Security and Privacy, 5 (2). pp. 13-32. ISSN 1930-1650 (print) 1930-1669 (online)

Kaosar, Md. Golam and Yi, Xun (2011) Privacy Preserving Data Gathering in Wireless Sensor Network. In: Network Security, Administration and Management: Advancing Technology and Practice. Kar, Dulal Chandra and Syed, Mahbubur Rahman, eds. Information Science Reference, Hershey, PA, pp. 237-251.

Kaosar, Md. Golam, Paulet, Russell and Yi, Xun (2011) Optimized Two Party Privacy Preserving Association Rule Mining Using Fully Homomorphic Encryption. In: Algorithms and Architectures for Parallel Processing: 11th International Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings, Part I. Xiang, Yang, Cuzzocrea, Alfredo, Hobbs, Michael and Zhou, Wanlei, eds. Lecture Notes in Computer Science, Vol. 7016 . Springer, Heidelberg, pp. 360-370.

Kaosar, Md. Golam, Paulet, Russell and Yi, Xun (2011) Secure Two-Party Association Rule Mining. In: Information Security 2011 : Proceedings of the Ninth Australasian Information Security Conference (AISC 2011), Perth, Australia, 17-20 January 2011. Boyd, Colin and Pieprzyk, Josef, eds. Conferences in Research and Practice in Information Technology (116). Australian Computer Society, Sydney, Australia, pp. 15-22.

Kaosar, Md. Golam and Yi, Xun (2010) Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices. International Journal of computer science and information security, 8 (1). pp. 44-51. ISSN 1947-5500

Kaosar, Md. Golam and Yi, Xun (2009) Privacy Preserving Association Rule Mining in Ubiquitous Computing Environment. Ubiquitous Computing and Communication Journal, 6 (3). pp. 925-933. ISSN 1994-4608 (print) 1992-8424 (online)

Kaosar, Md. Golam and Sheltami, Tarek (2008) Voice transmission over ad hoc network adapting optimum approaches to maximize the performance. Computer Communications, 32 (4). pp. 634-639. ISSN 0140-3664

Kaosar, Md. Golam, Mahmoud, Ashraf S Hasan and Sheltami, Tarek (2007) Delay and Power Efficient Voice Transmission over MANET. In: 2007 IEEE International Conference on Communications, Glasgow, Scotland, 24-28 June 2007. IEEE, Piscataway, N.J., pp. 3313-3318.