Marina Blanton
Marina Blanton
buffalo.edu의 이메일 확인됨
제목
인용
인용
연도
Algorithms and theory of computation handbook
MJ Atallah, M Blanton
CRC press, 2009
6352009
Internet addiction: Metasynthesis of 1996–2006 quantitative research
S Byun, C Ruffini, JE Mills, AC Douglas, M Niang, S Stepchenkova, ...
CyberPsychology & Behavior 12 (2), 203-207, 2009
6262009
Dynamic and efficient key management for access hierarchies
MJ Atallah, M Blanton, N Fazio, KB Frikken
ACM Transactions on Information and System Security (TISSEC) 12 (3), 43, 2009
5512009
Dynamic and efficient key management for access hierarchies
MJ Atallah, KB Frikken, M Blanton
ACM Conference on Computer and Communications Security (CCS), 190-201, 2005
551*2005
Internet addiction: Meta-synthesis of qualitative research for the decade 1996–2006
AC Douglas, JE Mills, M Niang, S Stepchenkova, S Byun, C Ruffini, ...
Computers in human behavior 24 (6), 3027-3044, 2008
4752008
Secure and efficient protocols for iris and fingerprint identification
M Blanton, P Gasti
European Symposium on Research in Computer Security (ESORICS), 190-209, 2011
2012011
Private collaborative forecasting and benchmarking
M Atallah, M Bykova, J Li, K Frikken, M Topkara
ACM Workshop on Privacy in the Electronic Society (WPES), 103-114, 2004
1722004
Secret handshakes with dynamic and fuzzy matching
G Ateniese, M Blanton, J Kirsch
Network and Distributed System Security Symposium (NDSS), 159-177, 2007
1312007
Secure outsourcing of DNA searching via finite automata
M Blanton, M Aliasgari
Data and Applications Security and Privacy XXIV, 49-64, 2010
1112010
PICCO: a general-purpose compiler for private distributed computation
Y Zhang, A Steele, M Blanton
ACM SIGSAC Conference on Computer & Communications Security (CCS), 813-826, 2013
1022013
Secure Computation on Floating Point Numbers.
M Aliasgari, M Blanton, Y Zhang, A Steele
NDSS, 2013
972013
Data-oblivious graph algorithms for secure computation and outsourcing
M Blanton, A Steele, M Alisagari
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
872013
Robust authentication using physically unclonable functions
KB Frikken, M Blanton, MJ Atallah
Information Security Conference (ISC), 262-277, 2009
842009
Detecting network intrusions via a statistical analysis of network packet characteristics
M Bykova, S Ostermann, B Tjaden
Proceedings of the 33rd Southeastern Symposium on System Theory, 309-314, 2001
842001
Secure and Efficient Outsourcing of Sequence Comparisons
M Blanton, M Atallah, K Frikken, Q Malluhi
European Symposium on Research in Computer Security (ESORICS), 505-522, 2012
832012
Reliable medical recommendation systems with patient privacy
TR Hoens, M Blanton, NV Chawla
Proceedings of the 1st ACM International Health Informatics Symposium (IHI …, 2010
682010
Private and Oblivious Set and Multiset Operations
M Blanton, E Aguiar
ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2012
59*2012
Efficient dynamic provable possession of remote data via balanced update trees
Y Zhang, M Blanton
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
522013
Analysis of Reusability of Secure Sketches and Fuzzy Extractors
M Blanton, M Aliasgari
IEEE Transactions on Information Forensics and Security 8 (9), 1433-1445, 2013
512013
Incorporating temporal capabilities in existing key management schemes
M Atallah, M Blanton, K Frikken
European Symposium on Research in Computer Security (ESORICS), 515-530, 2007
502007
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20