Follow
James Alderman
James Alderman
Thales Cyber and Consulting (UK)
Verified email at live.rhul.ac.uk
Title
Cited by
Cited by
Year
Multi-level access in searchable symmetric encryption
J Alderman, KM Martin, SL Renwick
Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017
262017
Access control in publicly verifiable outsourced computation
J Alderman, C Janson, C Cid, J Crampton
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
182015
Revocation in publicly verifiable outsourced computation
J Alderman, C Janson, C Cid, J Crampton
International Conference on Information Security and Cryptology, 51-71, 2014
152014
Tree-based cryptographic access control
J Alderman, N Farley, J Crampton
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
142017
Hybrid publicly verifiable computation
J Alderman, C Janson, C Cid, J Crampton
Topics in Cryptology-CT-RSA 2016: The Cryptographers' Track at the RSA …, 2016
142016
Extended functionality in verifiable searchable encryption
J Alderman, C Janson, KM Martin, SL Renwick
Cryptography and Information Security in the Balkans: Second International …, 2016
92016
A framework for the cryptographic enforcement of information flow policies
J Alderman, J Crampton, N Farley
Proceedings of the 22nd ACM on Symposium on Access Control Models and …, 2017
62017
On the use of key assignment schemes in authentication protocols
J Alderman, J Crampton
Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013
52013
Private outsourced kriging interpolation
J Alderman, BR Curtis, O Farràs, KM Martin, J Ribes-González
Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017
22017
Cryptographic tools for cloud environments
J Alderman, J Crampton, KM Martin
Guide to security assurance for cloud computing, 15-30, 2015
22015
On the use of attribute-based encryption in publicly verifiable outsourced computation.
J Alderman
Royal Holloway, University of London, 2016
12016
The CLARUS modules V1
F Brouillé, T Chevallier, M Azraoui, K Elkhiyaoui, M Önen, W Mallouli, ...
Multi-level Searchable Symmetric Encryption
SL Renwick, J Alderman, KM Martin
A framework for user centred privacy and security in the cloud
F Brouillé, T Chevallier, M Azraoui, K Elkhiyaoui, M Önen, W Mallouli, ...
Characterization of enabling technologies
J Alderman
The system can't perform the operation now. Try again later.
Articles 1–15