Skip to Content.

Recent Publications

Information Security & Privacy

  • Hanifi, H., Baird, L., and Thurimella, R., A New Algorithm for Unkeyed Jam Resistance in the proceeding of the 8th International Conference on Security of Information and Networks (SIN 2015), Sochi, September 8-10, 2015, pp. 210-216.
  • Eltarjaman, W., Annadata, P., Dewri R. and Thurimella, R., "Leveraging Smartphone Advances for Continuous Location Privacy," 16th IEEE International Conference on Mobile Data Management, MDM 2015, Pittsburgh, Pennsylvania, June 15-18, 2015.
  • Dewri, R. and Thurimella, R., "Privacy in Mobile Devices," Privacy in a Digital, Networked World: Technologies, Implications and Solutions , Ed. Sherali Zeadally and Mohamad Badra, Springer, London, UK, 2014.
  • Dewri, R., Annadata, P., Eltarjaman, W., Thurimella, R., "Inferring trip destinations from driving habits data," presented at Workshop on Privacy in the Electronic Society (WPES), workshop held in conjunction with ACM CCS in Berlin, 2013: 267-272. This work was quoted in the popular media including the Computerworld, Insurance Journal, and the ScienceDaily.
  • Dewri, R., Thurimella, R., "Exploiting Service Similarity for Privacy in Location Based Search Queries," IEEE Trans. on Parallel and Distributed Systems, Vol. 25 No. 2, 2014, pp. 374-383.
  • Dewri, R., Eltarjaman, W., Annadata, P., and Thurimella, R., "Beyond the Thin Client Model for Location Privacy," presented at PRISMS (successor to MobiSeC), in conjection with Global Wireless Summit 2013 and co-sponsered by IEEE, June 24-27, 2013, Atlantic City, NJ, USA.
  • Dewri, R., Thurimella, R., "Can a Phone's GPS 'Lie' Intelligently?" IEEE Computer 46(2): 91-93 (2013).
  • Wachs, M., Grothoff, C., and Thurimella, R., "Partitioning the Internet," presented at the 7th Int. Conf. on Risks and Security of Internet and Systems (CRISIS 2012), Cork, Ireland, (CRISIS 2012 ), October 10-12, 2012.
  • Johnson, A., Mehta, D., and Thurimella, R., "Identifying Algorithmic Vulnerabilities through Simulated Annealing," presented at the 10th International Symposium on Experimental Algorithms ( SEA2011), May 2011. Invited to Optimization Letters 5(3): 479-490 (2011).
  • Thurimella, R., and Baird III, L., "Network Security," in Applied Cryptography for Cyber Security and Defense: Information Encryption and Ciphering . Editors: Nemati, H., & Yang, L. IGI Global, Hershey, PA, USA, pp. 1--31, 2011.
  • Thurimella, R., and Mitchell, W., "Cloak and Dagger: Man-In-The-Middle and Other Insidious Attacks," International Journal of Information Security and Privacy, Volume: 3(3) (2009), pp. 55--75
  • James J. Treinen, Ramakrishna Thurimella, "Finding the Needle: Suppression of False Alarms in Large Intrusion Detection Data Sets," cse, vol. 2, pp.237-244, 2009 International Conference on Computational Science and Engineering, 2009

Algorithms

Privacy Preserving Record Linkage

  • Thurimella, R., "Linking Health Records for Federated Query Processing " (joint work with Rinku Dewri and Toan Ong), under review.
  • Thurimella, R., "A Graph Traversal Attack on Bloom Filter Based Medical Data Aggregation" (joint work with Rinku Dewri, William Mitchell and Max Roschke), under review.
  • Thurimella, R., "Record Linkage Applications in Health Services Research: Opportunities and Challenges, " (joint work with Rinku Dewri and William Mitchell, keynote speech presented at the 8th International Conference on Security of Information and Networks (SIN 2015), Sochi, September 8-10, 2015.

Knowledge Discovery