• University of Huddersfield Queensgate Huddersfield HD1 3DH

    United Kingdom

Accepting PhD Students

20132019
If you made any changes in Pure these will be visible here soon.

Personal profile

Keywords

  • cryptography
  • secure distributed computing
  • blockchain
  • distributed ledgers
  • computing on encrypted data

Fingerprint Dive into the research topics where James Dyer is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Cryptography Engineering & Materials Science
Polynomials Engineering & Materials Science
Common divisor Mathematics
Secure Computation Mathematics
Homomorphic Encryption Mathematics
Integer Mathematics
MapReduce Mathematics
Authentication Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2013 2019

  • 3 Conference contribution
  • 2 Article

Order-preserving encryption using approximate common divisors

Dyer, J., Dyer, M. & Djemame, K., 25 Sep 2019, In : Journal of Information Security and Applications. 49, 102391.

Research output: Contribution to journalArticle

Cryptography
Polynomials
Distributed computer systems
Hardness

Practical homomorphic encryption over the integers for secure computation in the cloud

Dyer, J., Dyer, M. & Xu, J., Oct 2019, In : International Journal of Information Security. 18, 5, p. 549-579 31 p.

Research output: Contribution to journalArticle

Cryptography
Polynomials
Entropy
2 Citations (Scopus)

Order-Preserving Encryption Using Approximate Integer Common Divisors

Dyer, J., Dyer, M. & Xu, J., 13 Sep 2017, Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings. Garcia-Alfaro, J., Navarro-Arribas, G., Hartenstein, H. & Herrera-Joancomartí, J. (eds.). Springer Verlag, p. 257-274 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10436 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Common divisor
Encryption
Cryptography
Integer
Leakage
5 Citations (Scopus)

Practical Homomorphic Encryption Over the Integers for Secure Computation in the Cloud

Dyer, J., Dyer, M. & Xu, J., 26 Nov 2017, Cryptography and Coding: 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings. O’Neill, M. (ed.). Cham: Springer Verlag, p. 44-76 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10655 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure Computation
Homomorphic Encryption
Cryptography
Polynomials
Integer
6 Citations (Scopus)

Security Issues Relating to Inadequate Authentication in MapReduce Applications

Dyer, J. & Zhang, N., 21 Oct 2013, Proceedings of the 2013 International Conference on High Performance Computing and Simulation, HPCS 2013. Smari, W. W. (ed.). IEEE, p. 281-288 8 p. 6641427

Research output: Chapter in Book/Report/Conference proceedingConference contribution

MapReduce
Authentication
Requirements
Model