Research Publications for Mark A Will
Welcome to the University of Waikato research publications search. This database includes all research publications produced by the University from 1998.
Author's Publications
Search our Staff Profiles to contact our current staff members.
Will, M., Garae, J., Tan, Y. S., Scoon, C., & Ko, R. (2017). Returning control of data to users with a personal information crunch - a position paper. In Proc 2017 International Conference on Cloud Computing Research and Innovation (pp. 23-32). Conference held Singapore: IEEE. doi:10.1109/ICCCRI.2017.12
Will, M. A., Ko, R. K. L., & Witten, I. H. (2016). Privacy preserving computation by fragmenting individual bits and distributing gates. In Proc 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 900-908). Conference held Tianjin, China: IEEE Computer Society. doi:10.1109/TrustCom.2016.0154
Open Access version at:
https://hdl.handle.net/10289/11002
Other publications by:
WILL, Mark A :: KO, Ryan Kok Leong K L (Ryan) :: WITTEN, Ian HWill, M. A., & Ko, R. K. L. (2016). Computing mod with a variable lookup table. In P. Mueller, S. M. Thampi, M. Z. Alam Bhuiyan, R. Ko, R. Doss, & J. M. Alcaraz Calero (Eds.), Proc 4th International Symposium on Security in Computing and Communications Vol. CCIS 625 (pp. 3-17). Conference held Jaipur, India: Springer. doi:10.1007/978-981-10-2738-3_1
Open Access version at:
https://hdl.handle.net/10289/11039
Other publications by:
WILL, Mark A :: KO, Ryan Kok Leong K L (Ryan)Will, M. A., & Ko, R. K. L. (2015). A guide to homomorphic encryption. In R. Ko, & K. -K. R. Choo (Eds.), The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues (pp. 101-127). Elsevier Inc. doi:10.1016/B978-0-12-801595-7.00005-7
Will, M., Ko, R. K. L., & Witten, I. (2015). Bin encoding: a user-centric secure full-text search scheme for the Cloud. In Proc 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 563-570). Helsinki, Finland: IEEE. doi:10.1109/Trustcom.2015.420
Will, M. A., Nicholson, B., Tiehuis, M., & Ko, R. K. L. (2015). Secure voting in the cloud using homomorphic encryption and mobile agents. In Proc 2015 International Conference on Cloud Computing Research and Innovation (pp. 173-184). Conference held at Singapore: IEEE. doi:10.1109/ICCCRI.2015.30
Open Access version at:
https://hdl.handle.net/10289/10568
Other publications by:
WILL, Mark A :: KO, Ryan Kok Leong K L (Ryan)Ko, R. K. L., & Will, M. A. (2014). Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking. In C. Kesselman (Ed.), Proc IEEE Seventh International Conference on Cloud Computing (pp. 881-889). Conference held Alaska, USA: IEEE. doi:10.1109/CLOUD.2014.121
Open Access version at:
https://hdl.handle.net/10289/9018
Other publications by:
KO, Ryan Kok Leong K L (Ryan) :: WILL, Mark AWill, M. A. (2013). Real-time image processing. (Undergraduate Dissertation).
Other publications by:
WILL, Mark A
See Also: Research Links | Student Research Theses | Research Commons