Muhammad Naveed 0001
Person information
- affiliation: University of Illinois at Urbana-Champaign, USA
Other persons with the same name
- Muhammad Naveed
- Muhammad Naveed 0002 — Muhammad Ali Jinnah University, Karachi, Pakistan
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2017
- [c13]Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, Thomas Ristenpart:
Leakage-Abuse Attacks against Order-Revealing Encryption. IEEE Symposium on Security and Privacy 2017: 655-672 - 2016
- [c12]Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov:
Breaking Web Applications Built On Top of Encrypted Data. ACM Conference on Computer and Communications Security 2016: 1353-1364 - [i5]Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, Thomas Ristenpart:
Leakage-Abuse Attacks against Order-Revealing Encryption. IACR Cryptology ePrint Archive 2016: 895 (2016) - [i4]Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov:
Breaking Web Applications Built On Top of Encrypted Data. IACR Cryptology ePrint Archive 2016: 920 (2016) - 2015
- [j2]Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy in the Genomic Era. ACM Comput. Surv. 48(1): 6:1-6:44 (2015) - [c11]Vincent Bindschaedler, Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, Yan Huang:
Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward. ACM Conference on Computer and Communications Security 2015: 837-849 - [c10]Soteris Demetriou, Xiao-yong Zhou, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, XiaoFeng Wang, Carl A. Gunter:
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources. NDSS 2015 - [c9]Nan Zhang, Kan Yuan, Muhammad Naveed, Xiao-yong Zhou, XiaoFeng Wang:
Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android. IEEE Symposium on Security and Privacy 2015: 915-930 - [i3]Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy in the Genomic Era. IACR Cryptology ePrint Archive 2015: 563 (2015) - 2014
- [c8]Dongjing He, Muhammad Naveed, Carl A. Gunter, Klara Nahrstedt:
Security Concerns in Android mHealth Apps. AMIA 2014 - [c7]Tongxin Li, Xiao-yong Zhou, Luyi Xing, Yeonjoon Lee, Muhammad Naveed, XiaoFeng Wang, Xinhui Han:
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services. ACM Conference on Computer and Communications Security 2014: 978-989 - [c6]Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, XiaoFeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl A. Gunter:
Controlled Functional Encryption. ACM Conference on Computer and Communications Security 2014: 1280-1291 - [c5]Muhammad Naveed, Xiao-yong Zhou, Soteris Demetriou, XiaoFeng Wang, Carl A. Gunter:
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android. NDSS 2014 - [c4]Muhammad Naveed:
Hurdles for Genomic Data Usage Management. IEEE Symposium on Security and Privacy Workshops 2014: 44-48 - [c3]Xiao-yong Zhou, Yeonjoon Lee, Nan Zhang, Muhammad Naveed, XiaoFeng Wang:
The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations. IEEE Symposium on Security and Privacy 2014: 409-423 - [c2]Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter:
Dynamic Searchable Encryption via Blind Storage. IEEE Symposium on Security and Privacy 2014: 639-654 - [i2]Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy and Security in the Genomic Era. CoRR abs/1405.1891 (2014) - [i1]Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter:
Dynamic Searchable Encryption via Blind Storage. IACR Cryptology ePrint Archive 2014: 219 (2014) - 2013
- [c1]Xiao-yong Zhou, Soteris Demetriou, Dongjing He, Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, Carl A. Gunter, Klara Nahrstedt:
Identity, location, disease and more: inferring your secrets from android public resources. ACM Conference on Computer and Communications Security 2013: 1017-1028 - 2012
- [j1]Muhammad Naveed, Wasim Habib, Usman Masud, Ubaid Ullah, Gulzar Ahmad:
Reliable and Low Cost RFID Based Authentication System for Large Scale Deployment. I. J. Network Security 14(3): 173-179 (2012)
Coauthor Index
data released under the ODC-BY 1.0 license; see also our legal information page
last updated on 2018-04-26 16:15 CEST by the dblp team