Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Brown University" +contributor:("Tamassia, Roberto"). Showing records 1 – 10 of 10 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters

1. Ohrimenko, Olga. Data-Oblivious Algorithms for Privacy-Preserving Access to Cloud Storage.

Degree: PhD, Computer Science, 2014, Brown University

 Cloud storage has emerged as the next generation of data storage where users can remotely store their data and leave its management to a third… (more)

Subjects/Keywords: cloud storage

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ohrimenko, O. (2014). Data-Oblivious Algorithms for Privacy-Preserving Access to Cloud Storage. (Doctoral Dissertation). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:386282/

Chicago Manual of Style (16th Edition):

Ohrimenko, Olga. “Data-Oblivious Algorithms for Privacy-Preserving Access to Cloud Storage.” 2014. Doctoral Dissertation, Brown University. Accessed October 23, 2019. https://repository.library.brown.edu/studio/item/bdr:386282/.

MLA Handbook (7th Edition):

Ohrimenko, Olga. “Data-Oblivious Algorithms for Privacy-Preserving Access to Cloud Storage.” 2014. Web. 23 Oct 2019.

Vancouver:

Ohrimenko O. Data-Oblivious Algorithms for Privacy-Preserving Access to Cloud Storage. [Internet] [Doctoral dissertation]. Brown University; 2014. [cited 2019 Oct 23]. Available from: https://repository.library.brown.edu/studio/item/bdr:386282/.

Council of Science Editors:

Ohrimenko O. Data-Oblivious Algorithms for Privacy-Preserving Access to Cloud Storage. [Doctoral Dissertation]. Brown University; 2014. Available from: https://repository.library.brown.edu/studio/item/bdr:386282/

2. Ghosh, Esha. Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data.

Degree: Department of Computer Science, 2018, Brown University

 An integral component of the modern computing era is the ability to outsource data and computation to remote Cloud Service Providers or CSPs. The advent… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ghosh, E. (2018). Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data. (Thesis). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:792909/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ghosh, Esha. “Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data.” 2018. Thesis, Brown University. Accessed October 23, 2019. https://repository.library.brown.edu/studio/item/bdr:792909/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ghosh, Esha. “Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data.” 2018. Web. 23 Oct 2019.

Vancouver:

Ghosh E. Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data. [Internet] [Thesis]. Brown University; 2018. [cited 2019 Oct 23]. Available from: https://repository.library.brown.edu/studio/item/bdr:792909/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ghosh E. Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data. [Thesis]. Brown University; 2018. Available from: https://repository.library.brown.edu/studio/item/bdr:792909/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

3. Baldimtsi, Foteini. Efficient Cryptography for Information Privacy.

Degree: PhD, Computer Science, 2014, Brown University

 In the modern digital society, individuals, businesses and governments perform numerous everyday tasks such as shopping, banking and commuting using electronic media. Although these electronic… (more)

Subjects/Keywords: private authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Baldimtsi, F. (2014). Efficient Cryptography for Information Privacy. (Doctoral Dissertation). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:386305/

Chicago Manual of Style (16th Edition):

Baldimtsi, Foteini. “Efficient Cryptography for Information Privacy.” 2014. Doctoral Dissertation, Brown University. Accessed October 23, 2019. https://repository.library.brown.edu/studio/item/bdr:386305/.

MLA Handbook (7th Edition):

Baldimtsi, Foteini. “Efficient Cryptography for Information Privacy.” 2014. Web. 23 Oct 2019.

Vancouver:

Baldimtsi F. Efficient Cryptography for Information Privacy. [Internet] [Doctoral dissertation]. Brown University; 2014. [cited 2019 Oct 23]. Available from: https://repository.library.brown.edu/studio/item/bdr:386305/.

Council of Science Editors:

Baldimtsi F. Efficient Cryptography for Information Privacy. [Doctoral Dissertation]. Brown University; 2014. Available from: https://repository.library.brown.edu/studio/item/bdr:386305/

4. Kelley, James Alan. Secure Data Compression and Error Correcting Codes for Networks and Cloud Storage.

Degree: PhD, Computer Science, 2015, Brown University

 We present several novel constructions—combining cryptography, error correcting codes (ECCs), and data compression—that find ready application in enhancing security and fault-tolerance in cloud storage. We… (more)

Subjects/Keywords: data compression

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kelley, J. A. (2015). Secure Data Compression and Error Correcting Codes for Networks and Cloud Storage. (Doctoral Dissertation). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:419483/

Chicago Manual of Style (16th Edition):

Kelley, James Alan. “Secure Data Compression and Error Correcting Codes for Networks and Cloud Storage.” 2015. Doctoral Dissertation, Brown University. Accessed October 23, 2019. https://repository.library.brown.edu/studio/item/bdr:419483/.

MLA Handbook (7th Edition):

Kelley, James Alan. “Secure Data Compression and Error Correcting Codes for Networks and Cloud Storage.” 2015. Web. 23 Oct 2019.

Vancouver:

Kelley JA. Secure Data Compression and Error Correcting Codes for Networks and Cloud Storage. [Internet] [Doctoral dissertation]. Brown University; 2015. [cited 2019 Oct 23]. Available from: https://repository.library.brown.edu/studio/item/bdr:419483/.

Council of Science Editors:

Kelley JA. Secure Data Compression and Error Correcting Codes for Networks and Cloud Storage. [Doctoral Dissertation]. Brown University; 2015. Available from: https://repository.library.brown.edu/studio/item/bdr:419483/

5. Küpçü, Alptekin. Efficient Cryptography for the Next Generation Secure Cloud.

Degree: PhD, Computer Science, 2010, Brown University

 Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since… (more)

Subjects/Keywords: security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Küpçü, A. (2010). Efficient Cryptography for the Next Generation Secure Cloud. (Doctoral Dissertation). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:11123/

Chicago Manual of Style (16th Edition):

Küpçü, Alptekin. “Efficient Cryptography for the Next Generation Secure Cloud.” 2010. Doctoral Dissertation, Brown University. Accessed October 23, 2019. https://repository.library.brown.edu/studio/item/bdr:11123/.

MLA Handbook (7th Edition):

Küpçü, Alptekin. “Efficient Cryptography for the Next Generation Secure Cloud.” 2010. Web. 23 Oct 2019.

Vancouver:

Küpçü A. Efficient Cryptography for the Next Generation Secure Cloud. [Internet] [Doctoral dissertation]. Brown University; 2010. [cited 2019 Oct 23]. Available from: https://repository.library.brown.edu/studio/item/bdr:11123/.

Council of Science Editors:

Küpçü A. Efficient Cryptography for the Next Generation Secure Cloud. [Doctoral Dissertation]. Brown University; 2010. Available from: https://repository.library.brown.edu/studio/item/bdr:11123/

6. Erway, Charles Christophe. Anonymous Accounting for Decentralized Systems.

Degree: PhD, Computer Science, 2011, Brown University

 Peer-to-peer systems have been proposed for a wide variety of applications, such as file-sharing, distributed storage, and distributed computation. These systems seek the benefits of… (more)

Subjects/Keywords: computer systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Erway, C. C. (2011). Anonymous Accounting for Decentralized Systems. (Doctoral Dissertation). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:11316/

Chicago Manual of Style (16th Edition):

Erway, Charles Christophe. “Anonymous Accounting for Decentralized Systems.” 2011. Doctoral Dissertation, Brown University. Accessed October 23, 2019. https://repository.library.brown.edu/studio/item/bdr:11316/.

MLA Handbook (7th Edition):

Erway, Charles Christophe. “Anonymous Accounting for Decentralized Systems.” 2011. Web. 23 Oct 2019.

Vancouver:

Erway CC. Anonymous Accounting for Decentralized Systems. [Internet] [Doctoral dissertation]. Brown University; 2011. [cited 2019 Oct 23]. Available from: https://repository.library.brown.edu/studio/item/bdr:11316/.

Council of Science Editors:

Erway CC. Anonymous Accounting for Decentralized Systems. [Doctoral Dissertation]. Brown University; 2011. Available from: https://repository.library.brown.edu/studio/item/bdr:11316/

7. Papamanthou, Charalampos. Cryptography for Efficiency: New Directions in Authenticated Data Structures.

Degree: PhD, Computer Science, 2011, Brown University

 Cloud computing has emerged as an important new computational andstorage medium and is increasingly being adopted both by companies and individuals as a means of… (more)

Subjects/Keywords: applied cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Papamanthou, C. (2011). Cryptography for Efficiency: New Directions in Authenticated Data Structures. (Doctoral Dissertation). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:11333/

Chicago Manual of Style (16th Edition):

Papamanthou, Charalampos. “Cryptography for Efficiency: New Directions in Authenticated Data Structures.” 2011. Doctoral Dissertation, Brown University. Accessed October 23, 2019. https://repository.library.brown.edu/studio/item/bdr:11333/.

MLA Handbook (7th Edition):

Papamanthou, Charalampos. “Cryptography for Efficiency: New Directions in Authenticated Data Structures.” 2011. Web. 23 Oct 2019.

Vancouver:

Papamanthou C. Cryptography for Efficiency: New Directions in Authenticated Data Structures. [Internet] [Doctoral dissertation]. Brown University; 2011. [cited 2019 Oct 23]. Available from: https://repository.library.brown.edu/studio/item/bdr:11333/.

Council of Science Editors:

Papamanthou C. Cryptography for Efficiency: New Directions in Authenticated Data Structures. [Doctoral Dissertation]. Brown University; 2011. Available from: https://repository.library.brown.edu/studio/item/bdr:11333/

8. Zsolt Revesz, Peter. Constraint query languages.

Degree: 1991, Brown University

 Constraint Query Languages assume that the relations in the database represent data implicitly by constraint specifications. Unlike standard database query languages, Constraint Query Languages allow… (more)

Subjects/Keywords: Query languages (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zsolt Revesz, P. (1991). Constraint query languages. (Thesis). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:698525/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zsolt Revesz, Peter. “Constraint query languages.” 1991. Thesis, Brown University. Accessed October 23, 2019. https://repository.library.brown.edu/studio/item/bdr:698525/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zsolt Revesz, Peter. “Constraint query languages.” 1991. Web. 23 Oct 2019.

Vancouver:

Zsolt Revesz P. Constraint query languages. [Internet] [Thesis]. Brown University; 1991. [cited 2019 Oct 23]. Available from: https://repository.library.brown.edu/studio/item/bdr:698525/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zsolt Revesz P. Constraint query languages. [Thesis]. Brown University; 1991. Available from: https://repository.library.brown.edu/studio/item/bdr:698525/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

9. Chase, Melissa Erin. Efficient Non-Interactive Zero-Knowledge Proofs for Privacy Applications.

Degree: PhD, Computer Science, 2008, Brown University

 Non-interactive zero-knowledge (NIZK) proofs can be an extremely powerful tool, allowing one to prove a statement in a single message without revealing any information besides… (more)

Subjects/Keywords: cryptography zero-knowledge

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chase, M. E. (2008). Efficient Non-Interactive Zero-Knowledge Proofs for Privacy Applications. (Doctoral Dissertation). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:281/

Chicago Manual of Style (16th Edition):

Chase, Melissa Erin. “Efficient Non-Interactive Zero-Knowledge Proofs for Privacy Applications.” 2008. Doctoral Dissertation, Brown University. Accessed October 23, 2019. https://repository.library.brown.edu/studio/item/bdr:281/.

MLA Handbook (7th Edition):

Chase, Melissa Erin. “Efficient Non-Interactive Zero-Knowledge Proofs for Privacy Applications.” 2008. Web. 23 Oct 2019.

Vancouver:

Chase ME. Efficient Non-Interactive Zero-Knowledge Proofs for Privacy Applications. [Internet] [Doctoral dissertation]. Brown University; 2008. [cited 2019 Oct 23]. Available from: https://repository.library.brown.edu/studio/item/bdr:281/.

Council of Science Editors:

Chase ME. Efficient Non-Interactive Zero-Knowledge Proofs for Privacy Applications. [Doctoral Dissertation]. Brown University; 2008. Available from: https://repository.library.brown.edu/studio/item/bdr:281/

10. Belenkiy, Mira. Sharing Secrets for Fun and Profit.

Degree: PhD, Computer Science, 2008, Brown University

 Electronic cash is an important tool for preserving on-line privacy. It allows a user to make purchases without revealing his identity to the merchant and… (more)

Subjects/Keywords: secret sharing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Belenkiy, M. (2008). Sharing Secrets for Fun and Profit. (Doctoral Dissertation). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:298/

Chicago Manual of Style (16th Edition):

Belenkiy, Mira. “Sharing Secrets for Fun and Profit.” 2008. Doctoral Dissertation, Brown University. Accessed October 23, 2019. https://repository.library.brown.edu/studio/item/bdr:298/.

MLA Handbook (7th Edition):

Belenkiy, Mira. “Sharing Secrets for Fun and Profit.” 2008. Web. 23 Oct 2019.

Vancouver:

Belenkiy M. Sharing Secrets for Fun and Profit. [Internet] [Doctoral dissertation]. Brown University; 2008. [cited 2019 Oct 23]. Available from: https://repository.library.brown.edu/studio/item/bdr:298/.

Council of Science Editors:

Belenkiy M. Sharing Secrets for Fun and Profit. [Doctoral Dissertation]. Brown University; 2008. Available from: https://repository.library.brown.edu/studio/item/bdr:298/

.