Publications
Log in to add an entry
2017
- Location Privacy for Rank-based Geo-Query Systems (Wisam Eltarjaman, Rinku Dewri, Ramakrishna Thurimella), Proceedings on Privacy Enhancing Technologies, 4(0), pp. , 2017.
- Private Retrieval of POI Details in Top-K Queries (Wisam Eltarjaman, Rinku Dewri, Ramakrishna Thurimella), IEEE Transactions on Mobile Computing, 16(9), pp. 2611 - 2624, 2017.
- Driving Habits Data: Location Privacy Implications and Solutions (Jake Bellati, Andrew Brunner, Joseph Lewis, Prasad Annadata, Wisam Eltarjaman, Rinku Dewri, Ramakrishna Thurimella), IEEE Security & Privacy, 15(1), pp. 12-202, 2017.
2016
- Mobile Local Search with Noisy Locations (Rinku Dewri, Ramakrishna Thurimella), Pervasive and Mobile Computing, 32, pp. 78-92, 2016.
- Linking Health Records for Federated Query Processing (Rinku Dewri, Toan Ong, Ramakrishna Thurimella), Proceedings on Privacy Enhancing Technologies, 3(0), pp. 4-23, 2016.
2015
- Record Linkage Applications in Health Services Research: Opportunities and Challenges (Ramakrishna Thurimella, Rinku Dewri, William Mitchell), Proceedings of the 8th International Conference on Security of Information and Networks, pp. 6-6, 2015.
- Leveraging Smartphone Advances for Continuous Location Privacy (Wisam Eltarjaman, Prasad Annadata, Rinku Dewri, Ramakrishna Thurimella), Proceedings of the 16th IEEE International Conference on Mobile Data Management, pp. 197-202, 2015.
- Privacy in Mobile Devices (Rinku Dewri, Ramakrishna Thurimella), Chapter in Privacy in a Digital, Networked World: Technologies, Implications and Solutions (Sherali Zeadally, Mohamad Badra, eds.), Springer, London, 2015.
2014
- Exploiting Service Similarity for Privacy in Location Based Search Queries (Rinku Dewri, Ramakrishna Thurimella), IEEE Transactions on Parallel and Distributed Systems, 25(2), pp. 374-383, 2014.
2013
- Match+Guardian: A Secure Peer-to-Peer Trading Card Game Protocol (Daniel Pittman, Chris GauthierDickey), Multimedia Systems, 19(3), pp. 303-314, 2013.
- Local Differential Perturbations: Location Privacy Under Approximate Knowledge Attackers (Rinku Dewri), IEEE Transactions on Mobile Computing, 12(12), pp. 2360-2372, 2013.
- Inferring Trip Destinations From Driving Habits Data (Rinku Dewri, Prasad Annadata, Wisam Eltarjaman, Ramakrishna Thurimella), Proceedings of the 2013 ACM Workshop on Privacy in the Electronic Society, pp. 267-272, 2013.
- Beyond the Thin Client Model for Location Privacy (Rinku Dewri, Wisam Eltarjaman, Prasad Annadata, Ramakrishna Thurimella), Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, pp. 1-8, 2013.
- Can a Phone's GPS Lie Intelligently? (Rinku Dewri, Ramakrishna Thurimella), IEEE Computer Magazine, 46(2), pp. 91-93, 2013.
2012
- Partitioning the Internet (Ramakrishna Thurimella, Matthias Wachs, Christian Grothoff), Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, pp. 1-8, 2012.
- Optimal Security Hardening on Attack Tree Models of Networks: A Cost-Benefit Analysis (Rinku Dewri, Indrajit Ray, Nayot Poolsappasit, Darrell Whitley), International Journal of Information Security, 11(3), pp. 167-188, 2012.
- Dynamic Security Risk Management Using Bayesian Attack Graphs (Nayot Poolsappasit, Rinku Dewri, Indrajit Ray), IEEE Transactions on Dependable and Secure Computing, 9(1), pp. 61-74, 2012.
- Secure Peer-to-Peer Trading for Multiplayer Games, Proceedings of the 11th Annual Workshop on Network and Systems Support for Games, pp. 1-6, 2012.
2011
- Network Security (Ramakrishna Thurimella, Leemon C. Baird III), Chapter in Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering (Hamid Nemati & Li Yang, ed.), IGI Global, pp. 1-31, 2011.
- Cheat-Proof Peer-to-Peer Trading Card Games (Daniel Pittman, Chris GauthierDickey), Proceedings of the 10th Annual Workshop on Network and Systems Support for Games, pp. 9, 2011.
- Identifying Algorithmic Vulnerabilities Through Simulated Annealing (S. Andrew Johnson, Dinesh P. Mehta, Ramakrishna Thurimella), Optimization Letters, 5(3), pp. 479-490, 2011.
- Location Privacy and Attacker Knowledge: Who Are We Fighting Against? (Rinku Dewri), Proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, pp. 96-115, 2011.
- Exploring Privacy Versus Data Utility Tradeoffs in Anonymization Techniques Using Multi-objective Optimization (Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley), Journal of Computer Security, 19(5), pp. 935-974, 2011.
- k-Anonymization in the Presence of Publisher Preferences (Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley), IEEE Transactions on Knowledge and Data Engineering, 23(11), pp. 1678-1690, 2011.
2010
- On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS (Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley), Proceedings of the 6th International ICST Conference on Security and Privacy in Communication Networks, pp. 71-88, 2010.

