scispace - formally typeset
J

Joseph A. Akinyele

Researcher at Johns Hopkins University

Publications -  15
Citations -  1046

Joseph A. Akinyele is an academic researcher from Johns Hopkins University. The author has contributed to research in topics: Encryption & Cryptography. The author has an hindex of 10, co-authored 15 publications receiving 827 citations. Previous affiliations of Joseph A. Akinyele include Carnegie Mellon University.

Papers
More filters
Journal ArticleDOI

Charm: a framework for rapidly prototyping cryptosystems

TL;DR: Charm as discussed by the authors is an extensible framework for rapidly prototyping cryptographic systems, including support for modular composition of cryptographic building blocks, infrastructure for developing interactive protocols, and an extensive library of re-usable code.
Proceedings ArticleDOI

Securing electronic medical records using attribute-based encryption on mobile devices

TL;DR: The system allows healthcare organizations to export EMRs to locations outside of their trust boundary and is designed to maintain EMR availability even when providers are offline, i.e., where network connectivity is not available.
Proceedings Article

Charm: A Framework for Rapidly Prototyping Cryptosystems.

TL;DR: The modular architecture of Charm is described, which includes a built-in benchmarking module to compare the performance of Charm primitives to existing C implementations, and it is shown that in many cases the techniques result in an order of magnitude decrease in code size, while inducing an acceptable performance impact.
Posted Content

Self-Protecting Electronic Medical Records Using Attribute-Based Encryption

TL;DR: In this article, the authors provide a design and implementation of self-protecting electronic medical records (EMRs) using attribute-based encryption, which allows healthcare organizations to export EMRs to storage locations outside of their trust boundary, including mobile devices, Regional Health Information Organizations (RHIOs), and cloud systems such as Google Health.
Proceedings ArticleDOI

Using SMT solvers to automate design tasks for encryption and signature schemes

TL;DR: This work investigates tools for programmatically altering existing cryptographic constructions to reflect particular design goals, and proposes two complementary tools, AutoGroup and AutoStrong, which enhance both security and efficiency.