Research‎ > ‎

Publications

All copyrights and trademarks relating to the publications below are hereby acknowledged.


This webpage is being replaced by a newer one at http://www.anirbanbasu.com/#research -- please visit the new website for updated information.

Quick statistics

Here is a quick statistics about the publications listed on this page.

Books or book chapters: 2
Journals (including magazines and editorial): 11
Conference (including posters and symposiums) publications: 52
Workshops: 6
Invited talks: 3
Patent applications (public information only): 12 
Theses: 2

Google Scholar profile: https://scholar.google.com/citations?user=XHB3pcYAAAAJ [h-index (all): 14; i10-index (all): 19]

Patents

The publicly available patents and public information can be accessed through WIPO's database. These patents do not include those that are currently under consideration. The following is a list of patent numbers: 2016-167705, 2016-052047, 2016-025563, 2016-009243, 2015-210795, 2015-176496, 2015-014958, 2015-041863, 2015-069350, 2015-095671, 2015-127859, 2015-148907.

Papers and other publications

2017


  1. [CONFERENCE/SYMPOSIUM]  A. Al Omar, M. S. Rahman, A. Basu and S. Kiyomoto, MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data, To appear in the proceedings of the Third International Symposium on Dependability in Sensor, Cloud and Big Data Systems and Applications (DependSys), Guangzhou, China, 2017.
  2. [CONFERENCE/DEMO, POSTER] K. Suksomboon, A. Tagami, A. Basu, J. Kurihara, IPRES: In-device Proxy Re-Encryption Service for Secure ICN, In the Demos and Posters Track of the 4th ACM Conference on Information-Centric Networking (ACM ICN), Berlin, Germany, 2017.
  3. [INVITED TALK] A. BasuHomomorphic Encryption - an answer to privacy? Doctoral Symposium at the IFIP WG 11.11 International Conference on Trust Management (IFIPTM), Göteborg, Sweden, 2017.
  4. [WORKSHOP] R. Xu, K. Morozov, A. Basu, M. S. Rahman and S. Kiyomoto, Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation, In proceedings of the 12th International Workshop on Security (IWSEC), Hiroshima, Japan, 2017.
  5. [CONFERENCE] A. Basu, M. S. Rahman, R. Xu, K. Fukushima and S. Kiyomoto, VIGraph – a framework for verifiable information, In proceedings of the IFIP WG 11.11 International Conference on Trust Management (IFIPTM), Göteborg, Sweden, 2017.
  6. [CONFERENCE] S. Kiyomoto, M. S. Rahman and A. Basu, On Blockchain-Based Anonymized Dataset Distribution Platform, In proceedings of the 15th ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2017), London, UK, 2017.
  7. [POSTER/CONFERENCE] A. Basu, J. J. Daniel, S. Ruj, M. S. Rahman, T. Dimitrakos and S. Kiyomoto, Accountability and integrity for data management using blockchains, In proceedings of the 21st International Conference on Financial Cryptography and Data Security (FC), Malta. 2017.
  8. [POSTER/CONFERENCE] M. S. Rahman, A. Basu and S. Kiyomoto, Broker-mediated Trade Finance with Blockchains, In proceedings of the 21st International Conference on Financial Cryptography and Data Security (FC), Malta. 2017.
  9. [CONFERENCE] M. S. Rahman, A. Basu and S. Kiyomoto, Towards Outsourced Privacy-preserving Multiparty DBSCAN, In proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), Christchurch, New Zealand. 2017.
  10. [JOURNAL] M. S. Rahman, A. Basu, S. Kiyomoto and M. Z. A. Bhuiyan, Privacy-friendly Secure Bidding for Smart Grid Demand-Response, Information Sciences, Elsevier. 2017.

2016


  1. [POSTER/CONFERENCE] A. Basu, R. Xu, M. S. Rahman, S. Kiyomoto, User-in-a-context: a blueprint for context-aware identification, In proceedings of the 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 2016.
  2. [CONFERENCE] A. Basu, S. Kiyomoto, J. Vaidya, S. Marsh, PrefRank: quantification and aggregation of subjective user preferences, In proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), Tianjin, China, 2016.
  3. [CONFERENCE] M. S. Rahman, A. Basu and S. Kiyomoto, Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning With Errors over Rings, The 8th IEEE International Symposium on UbiSafe Computing (UbiSafe, collocated with IEEE TrustCom), Tianjin, China, 2016.
  4. [POSTER/CONFERENCE] T. Mimoto, A. Basu, S. Kiyomoto, Towards Practical k-Anonymization: Correlation-Based Construction of Generalization Hierarchy, In proceedings of the 13th International Conference on Security and Cryptography (SECRYPT 2016), Lisbon, Portugal, 2016.
  5. [CONFERENCE] A. Basu, S. Marsh, M. S. Rahman and S. Kiyomoto, A model for personalised perception of policiesIn proceedings of the IFIP WG 11.11 International Conference on Trust Management (IFIPTM), Darmstadt, Germany, 2016.

2015


  1. [JOURNAL] A. Basu, A. Monreale, R. Trasarti, J. C. Corena, F. Giannotti, D. Pedreschi, S. Kiyomoto, Y. Miyake and T. Yanagihara, A risk model for privacy in trajectory data, Springer Open Journal of Trust Management 2015, Thematic series: Best articles from IFIPTM 2014. See: http://dx.doi.org/10.1186/s40493-015-0020-6.
  2. [CONFERENCE] M. S. Rahman, A. Basu and S. Kiyomoto, Privacy-friendly Secure Bidding Scheme for Demand Response in Smart Grid, In proceedings of the First IEEE International Smart Cities Conference (ISC2), Mexico, 2015.
  3. [INVITED TALK] A. BasuHomomorphic Encryption - are we there yet? Next-generation Cryptography for Privacy Protection and Decentralized Control and Mathematical Structures to Support Techniques, Fukuoka, Japan, 2015.
  4. [CONFERENCE] M. S. Rahman, A. Basu and S. Kiyomoto, Secure and Private Bidding Protocol for Incentive-based Demand-Response System of Smart Grid, In proceedings of the 17th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), Edmonton, Canada, 2015.
  5. [CONFERENCE/SYMPOSIUM] A. Basu, T. Nakamura, S. Hidano and S. Kiyomotok-anonymity: risks and the reality,  IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (RATSP, collocated with the IEEE TrustCom), Helsinki, Finland, 2015.
  6. [CONFERENCE] A. Basu, J. C. Corena, J. Vaidya, J. Crowcroft, S. Kiyomoto, S. Marsh, Y. S. Van Der Sype, T. Nakamura, Lightweight practical private one-way anonymous messaging, In proceedings of the IFIP WG 11.11 International Conference on Trust Management (IFIPTM), Hamburg, Germany, 2015.
  7. [POSTER/CONFERENCE] A. Basu, J. C. Corena, J. Vaidya, J. Crowcroft, S. Kiyomoto, Y. S. Van Der Sype, Y. Miyake, Practical Private One-way Anonymous Message Routing, In proceedings of the ACM AsiaCCS, Singapore, 2015.

2014


  1. [CONFERENCE] J. Vaidya, I. Yakut and A. Basu, Efficient Integrity Verification for Outsourced Collaborative Filtering, In proceedings of the IEEE International Conference on Data Mining (ICDM), Shenzhen, China, 2014.
  2. [POSTER/CONFERENCE] A. Basu, J. C. Corena, A. Monreale, D. Pedreschi, F. Giannotti, S. Kiyomoto, J. Vaidya, and Y. Miyake, CF-inspired privacy-preserving prediction of next location in the cloudIn proceedings of the IEEE Cloudcom, Singapore, 2014.
  3. [POSTER/CONFERENCE] J. C. Corena, A. Basu, Y. Nakano, S. Kiyomoto, and Y. Miyake, Data storage on the cloud under user controlIn proceedings of the IEEE Cloudcom, Singapore, 2014.
  4. [MAGAZINE/JOURNAL] A. Basu, J. Vaidya, J. C. Corena, S. Kiyomoto, S. Marsh, G. Guo, J. Zhang, and Y. Miyake, Opinions of People: Factoring in Privacy and Trust, In the ACM SIGAPP Applied Computing Review, September 2014, Volume 14, Number 3. (Link to the magazine: http://www.sigapp.org/acr/Issues/V14.3/ACR%2014-3.pdf.)
  5. [BOOK CHAPTERS. Marsh, N. Dwyer, A. Basu, T. Storer, K. Renaud, K. El-Khatib, B. Esfandiari, S. Noël, M. V. Bicakci, Foreground Trust as a Security Paradigm: Turning Users into Strong Links, In book: Information Security in Diverse Computing Environments, IGI Global, 2014. (Link to IGI Global website: http://www.igi-global.com/chapter/foreground-trust-as-a-security-paradigm/114367.)
  6. [CONFERENCEJ. C. Corena, A. Basu, Y. Nakano, S. Kiyomoto and Y. Miyake, A Multiple-Server Efficient Reusable Proof of Data Possession from Private Information Retrieval Techniques, In proceedings of the 11th international conference on Security and Cryptography (SECRYPT), Vienna, Austria, 2014.
  7. [CONFERENCE] J. C. Corena, A. Basu, S. Kiyomoto, Y. Miyake and Tomoaki Ohtsuki, Beyond Proofs of Data Possession: Finding Defective Blocks in Outsourced Storage, In proceedings of IEEE Global Communications Conference (Globecom), Austin, USA, 2014.
  8. [CONFERENCE] Y. Nakano, A. Basu, S. Kiyomoto and Y. Miyake. Key extraction attack using statical analysis of memory dump data, In proceedings of the 9th International Conference on Risks and Security of Internet and Systems (CRiSIS), Trento, Italy. 2014.
  9. [CONFERENCE] A. Basu, A, Monreale, J. C. Corena, F. Giannotti, D. Pedreschi, S. Kiyomoto, Y. Miyake, T. Yanagihara and R. Trasarti. A privacy risk model for trajectory data, In proceedings of the IFIP WG 11.11 International Conference on Trust Management (IFIPTM), Singapore. 2014. (Link to the Springer website: http://link.springer.com/chapter/10.1007/978-3-662-43813-8_9.)
  10. [POSTER/CONFERENCE] A. Basu, J. C. Corena, S. Kiyomoto, J. Vaidya, S. Marsh and Y. Miyake. PrefRank: fair aggregation of subjective user preferences, In proceedings of the ACM Symposium on Applied Computing (SAC) RS track, Gyeongju, Korea. 2014. (Read more.)
  11. [CONFERENCE] A. Basu, J. C. Corena, S. Kiyomoto, S. Marsh, J. Vaidya, G. Guo, J. Zhang and Y. Miyake. Privacy preserving trusted social feedback, In proceedings of the ACM Symposium on Applied Computing (SAC) TRECK track, Gyeongju, Korea. 2014. (Read more.)
  12. [CONFERENCE] G. Guo, J. Zhang, D. Thalmann, A. Basu and N. Yorke-Smith. From Ratings to Trust: an Empirical Study of Implicit Trust in Recommender Systems, In proceedings of the ACM Symposium on Applied Computing (SAC) RS track, Gyeongju, Korea. 2014. (Read more.)
  13. [CONFERENCE] J. C. Corena, A. Basu, S. Kiyomoto, Y. Miyake, and T. Ohtsuki. XOR Network Coding Pollution Prevention Without Homomorphic FunctionsIn proceedings of the IEEE Consumer Communications and Networking Conference, Las Vegas, USA. 2014. (Read more.)

2013


  1. [CONFERENCE] J. Corena, A. Basu, S. Kiyomoto, Y. Miyake and T. Ohtsuki. Decodability attacks in XOR network coding, In proceedings of the 2013 IEICE Society Conference, Fukuoka, Japan. 2013. (Link to the National Institute of Informatics website: http://ci.nii.ac.jp/naid/110009730261.)
  2. [JOURNAL] A. Basu, S. Fleming, J. Stanier, S. Naicken, I. Wakeman and V. K. Gurbani. The state of peer-to-peer network simulators, ACM Computing Surveys. August 2013. Vol. 45, No. 4. (Link to the ACM site: http://doi.acm.org/10.1145/2501654.2501660.)
  3. [CONFERENCE] J. Vaidya, A. Basu, B. Shafiq and Y. Hong. Differentially Private Naïve Bayes Classification, In proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence, Atlanta, GA, USA. 2013. (Read more.)
  4. [CONFERENCE] A. Basu, J. Vaidya, H. Kikuchi, and T. Dimitrakos. Privacy-preserving collaborative filtering on the cloud – practical implementation experiences, In proceedings of the IEEE Cloud, Santa Clara, CA, USA. 2013. (Read more.)
  5. [CONFERENCE] N. Dwyer, A. Basu, S. Marsh. Reflections on Measuring the Trust Empowerment Potential of a Digital Environment, In proceedings of the IFIPTM, Malaga, Spain. 2013. (Read more.)
  6. [JOURNAL] H. Kikuchi, D. Kagawa, A. Basu, K. Ishii, M. Terada, and S. Hongo. Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Volume E96-A (1). January 2013. (More details will be available soon.)
  7. [CONFERENCE] S. Marsh, A. Basu, and N. Dwyer. Security Enhancement with Foreground Trust, Comfort, and Ten Commandments for Real People, Theories and Intricacies of Information Security Problems (workshop in the ISSA 2012), Hasso-Plattner Instituts fur Softwaresystemtechnick and der Universitat Potsdam. Volume Technische Berite Nr. 63. Pages 1–7. 2013. (Read more.)

2012


  1. [JOURNAL] A. Basu, J. Vaidya, H. Kikuchi, T. Dimitrakos and S. K. Nair. Privacy preserving collaborative filtering for SaaS enabling PaaS clouds, Journal of Cloud Computing: Advances, Systems and Applications, SpringerOpen, Springer-Verlag. 2012. (Springer Open Access paper available at: http://www.journalofcloudcomputing.com/content/1/1/8/.)
  2. [CONFERENCE] A. Basu, N. Dwyer, S. Naicken. A concordance framework for building trust evidences. In proceedings of the Tenth Annual Conference on Privacy, Security and Trust (PST), Paris, France, 2012. (Read more).
  3. [INVITED TALK] A. Basu, Practical privacy using homomorphic encryption - a myth or reality. SecureCloud -- Cloud Security Alliance. Frankfurt am Main, Germany, 2012. (Slides [PDF]).
  4. [CONFERENCE] S. Marsh, A. Basu, N. Dwyer, Rendering unto Caesar the Things that are Caesar’s: Complex Trust Models and Human Understanding, In proceedings of the 6th IFIP WG 11.11 International Conference on Trust Management (IFIPTM), Surat, India, 2012. (Read more)
  5. [CONFERENCE] A. Basu, J. Vaidya, H. Kikuchi, Perturbation based privacy preserving Slope One predictors for collaborative filtering, In proceedings of the 6th IFIP WG 11.11 International Conference on Trust Management (IFIPTM), Surat, India, 2012. (Read more)
  6. [CONFERENCE] A. Basu, J. Vaidya, T. Dimitrakos, H. Kikuchi, Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine - a performance case study, In the proceedings of the 27th ACM Symposium on Applied Computing (SAC) Cloud Computing track, Trento, Italy, 2012. (Read more)

2011


  1. [GUEST EDITORIAL/JOURNAL] C. D. Jensen, N. Dragoni, A. Basu, and C. Mancini, Special Issue on Frontiers in Trust Management, Journal of Internet Services and Information Security (JISIS), vol. 1 (4), pp. 1-4. ISSN: 2182-2069 (printed); ISSN: 2182-2077 (online). 2011.
  2. [JOURNAL] A. Basu, J. Vaidya and H. Kikuchi, Efficient privacy-preserving collaborative filtering based on the weighted Slope One predictor, Journal of Internet Services and Information Security (special edition), vol. 1 (4). ISSN: 2182-2069 (printed); ISSN: 2182-2077 (online). 2011. (Read more)
  3. [CONFERENCE] A. Basu, J. Vaidya, H. Kikuchi and T. Dimitrakos, Privacy-preserving collaborative filtering for the cloud, Proceedings of the 3rd IEEE International Conference on Cloud Computing Technology and Science (Cloudcom), Athens, Greece, 2011. (Read more)
  4. [CONFERENCE] A. Basu, J. Vaidya, H. Kikuchi and T. Dimitrakos, Practical privacy preserving collaborative filtering on the Google App Engine (Title in Japanese: Google App Engine におけるプライバシー保護協調フィルタリング), Proceedings of the Computer Security Symposium (CSS), Niigata, Japan, 2011. (Read more)
  5. [POSTER/CONFERENCE] A. Basu, H. Kikuchi, J. Vaidya and T. Dimitrakos, Privacy-Preserving Item Recommendation System in Cloud Computing, Poster in the International Workshop on Security (IWSEC), Tokyo, Japan. 2011. (Read more)
  6. [WORKSHOP] A. Basu, H. Kikuchi, and J. Vaidya, Privacy Preserving weighted Slope One predictor for Item-based Collaborative Filtering, Proceedings of the International Workshop on Trust and Privacy in Distributed Information Processing (workshop at the IFIPTM 2011), Copenhagen, Denmark, 2011. (Read more)
  7. [BOOK CHAPTER] I. Wakeman, A. Light, J. Robinson, D. Chalmers, and A. BasuDeploying Pervasive Advertising in a Farmers' Market, Chapter in Pervasive Advertising and Shopping, Springer HCI, 2011. (Read more)
  8. [CONFERENCE] H. Kikuchi, D. Kagawa, A. Basu, K. Ishii, M. Terada and S. Hongo, Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets, Proceedings of the 26th International Information Security Conference (IFIPSEC), Lucerne, Switzerland, 2011. (Read more)

2010


  1. [WORKSHOP] I. Wakeman, A. Light, J. Robinson, D. Chalmers, A. BasuDeploying Ubiquitous Computing Applications in a Farmers' Market, Proceedings of Pervasive Advertising and Shopping 2010i, (workshop at Pervasive 2010) Helsinki, Finland, 2010. (Read more)
  2. [CONFERENCE] A. Light, I. Wakeman, J. Robinson, A. Basu and D. Chalmers, Chutney and Relish: Designing to Augment the Experience of Shopping at a Farmers’ Market, Proceedings of OzCHI, QUT, Brisbane, Australia, 2010. (Read more
  3. [JOURNAL] J. Stanier, S. Naicken, A. Basu, J. Li and I. Wakeman, Can We Use Trust in Online Dating?, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 1 (4), pp.  50–61, 2010. (Read more)
  4. [WORKSHOP] J. Stanier, S. Naicken, A. Basu, J. Li and I. Wakeman, Can We Use Trust in Online Dating?, Proceedings of the International Workshop on Trusted Communications in Decentralised Computing (workshop in IFIPTM 2010), Morioka, Japan, 2010. (Read more)
  5. [CONFERENCE] A. Basu, I. Wakeman, and D. Chalmers, A Framework for Developing and Sharing Client Reputations, Proceedings of the Fourth IFIP WG 11.11 International Conference on Trust Management (IFIPTM), Morioka, Japan, 2010. (Read more)
  6. [CONFERENCE] I. Wakeman, A. Light, J. Robinson, D. Chalmers, and A. Basu, Bringing the Virtual to the Farmers' Market: Designing for Trust in Pervasive Computing Systems, Proceedings of the Fourth IFIP WG 11.11 International Conference on Trust Management (IFIPTM), Morioka, Japan, 2010. (Read more)
  7. [THESIS] A. Basu, A Reputation Framework for Behavioural History, Doctor of Philosophy thesis, School of Informatics, University of Sussex. 2010. (Read more)

2008


  1. [WORKSHOP] A. Basu, I. Wakeman, D. Chalmers, and J. Robinson, A Behavioural Model for Client Reputation, Proceedings of Trust in Mobile Environments (workshop in IFIPTM 2008), Trondheim, Norway, 2008. (Read more)
  2. [CONFERENCE] J. Robinson, I. Wakeman, D. Chalmers and A. Basu, The North Laine Shopping Guide: A Case Study in Modelling Trust in Applications, Proceedings of Joint iTrust and PST Conference on Privacy, Trust Management and Security (IFIPTM), Trondheim, Norway. 2008. (Read more)

2007


  1. [POSTER/WORKSHOP] A. Basu, I. Wakeman, and D. Chalmers, A Behavioural Model for Consumer Reputation, Poster in the International Workshop on Self-Organizing Systems, The Lake District, UK, 2007. (Read more)
  2. [EDITORIAL/JOURNAL] S. Naicken, B. Livingston, A. Basu, S. Rodhetbhai, I. Wakeman, and D. Chalmers, The State of Peer-to-Peer Simulators and Simulations, ACM Computer Communications Review, vol. 37 (2), pp. 95–98, 2007. (Read more)

2006


  1. [CONFERENCE] S. Naicken, A. Basu, B. Livingston, S. Rodhetbhai, and I.Wakeman, Towards Yet Another Peer-to-Peer Simulator, Proceedings of The Fourth International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET-NETs), Ilkley, UK, 2006. (Read more)
  2. [CONFERENCE] S. Naicken, A. Basu, B. Livingston, and S. Rodhetbhai, A Survey of Peer-to-Peer Network Simulators, Proceedings of The Seventh Annual Postgraduate Symposium (PGNet), Liverpool, UK, 2006. (Read more)

2005


  1. [CONFERENCE] P. Petridis, M.White, N. Mourkousis, F. Liarokapis, M. Sifniotis, A. Basu, and C. Gatzidis, Exploring and Interacting with Virtual Museums, Proceedings of Computer Applications and Quantitative Methods in Archaeology, Tomar, Portugal, 2005. (Read more)

2004


  1. [THESIS] A. Basu, ARCOLite – A Visualisation System for Viewing Museum Artefacts, Bachelor of Engineering Final Year Project report, School of Engineering and IT, University of Sussex, 2004. (Read more)
  2. [CONFERENCE] N. Mourkoussis, F. Liarokapis, A. Basu, M.White, and P. F. Lister, Using XML Technologies to Present Digital Content with Augmented Reality, Proceedings of Fifth Eurographics Ireland Chapter Workshop, Cork, Ireland, 2004. (Read more)
  3. [CONFERENCE] F. Liarokapis, S. Sylaiou, A. Basu, N. Mourkoussis, M. White, and P. F. Lister, An Interactive Visualisation Interface for Virtual Museums, Proceedings of the Fifth International Symposium on Virtual Reality, Archaeology and Cultural Heritage, Brussels, Belgium, 2004. (Read more)
  4. [JOURNAL] F. Liarokapis, N. Mourkoussis, M. White, J. Darcy, M. Sifniotis, P. Petridis, A. Basu, and P. F. Lister, Web3D and Augmented Reality to support Engineering Education, UNESCO International Centre for Engineering Education (UICEE) journal of World Transactions on Engineering and Technology Education, vol. 3(1), pp. 11-14, 2004. (Read more)
  5. [CONFERENCE] M. White, F. Liarokapis, N. Mourkoussis, A. Basu, J. Darcy, P. Petridis, M. Sifniotis, and P. F. Lister, ARCOLite – an XML based system for building and presenting Virtual Museums using Web3D and Augmented Reality, IEEE Proceedings of Theory and Practice of Computer Graphics (TPCG), Bournemouth, 2004. (Read more)
  6. [CONFERENCE] M. White, F. Liarokapis, N. Mourkoussis, A. Basu, J. Darcy, P. Petridis, and P. F. Lister, A Lightweight XML Driven Architecture for the Presentation of Virtual Cultural Exhibitions (ARCOLite), Proceedings of IADIS International Conference of Applied Computing, Lisbon, Portugal, 2004. (Read more)