Æȷοì
Mikhail Atallah
Mikhail Atallah
Distinguished Professor of Computer Science
cs.purdue.eduÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Internet addiction: Metasynthesis of 1996–2006 quantitative research
S Byun, C Ruffini, JE Mills, AC Douglas, M Niang, S Stepchenkova, ...
Cyberpsychology & behavior 12 (2), 203-207, 2009
7862009
Secure multi-party computation problems and their applications: a review and open problems
W Du, MJ Atallah
Proceedings of the 2001 workshop on New security paradigms, 13-22, 2001
7082001
Algorithms and Theory of Computation Handbook, Volume 1: General Concepts and Techniques
MJ Atallah, M Blanton
Chapman & Hall/CRC, 2017
685*2017
Algorithms and theory of computation handbook, volume 2: special topics and techniques
MJ Atallah, M Blanton
CRC press, 2009
6832009
Algorithms and Theory of Computation Handbook, Volume 1: General Concepts and Techniques
M Atallah, M Blanton
CRC press, 2009
683*2009
Internet addiction: Meta-synthesis of qualitative research for the decade 1996–2006
AC Douglas, JE Mills, M Niang, S Stepchenkova, S Byun, C Ruffini, ...
Computers in human behavior 24 (6), 3027-3044, 2008
6652008
Disclosure limitation of sensitive rules
M Atallah, E Bertino, A Elmagarmid, M Ibrahim, V Verykios
Workshop on Knowledge and Data Engineering Exchange, 45-52, 1999
6421999
Dynamic and efficient key management for access hierarchies
MJ Atallah, M Blanton, N Fazio, KB Frikken
ACM Transactions on Information and System Security (TISSEC) 12 (3), 1-43, 2009
6212009
Rights protection for relational data
R Sion, M Atallah, S Prabhakar
Proceedings of the 2003 ACM SIGMOD international conference on Management of ¡¦, 2003
4822003
Secure multi-party computational geometry
MJ Atallah, W Du
Workshop on Algorithms and Data Structures, 165-179, 2001
4532001
Privacy-preserving cooperative statistical analysis
W Du, MJ Atallah
Seventeenth Annual Computer Security Applications Conference, 102-110, 2001
4052001
Securely outsourcing linear algebra computations
MJ Atallah, KB Frikken
Proceedings of the 5th ACM Symposium on Information, Computer and ¡¦, 2010
3852010
Secure outsourcing of scientific computations
MJ Atallah, KN Pantazopoulos, JR Rice, EE Spafford
Advances in computers 54, 215-272, 2002
3812002
Protecting software code by guards
H Chang, MJ Atallah
ACM Workshop on Digital Rights Management, 160-175, 2001
3772001
Natural language watermarking: Design, analysis, and a proof-of-concept implementation
MJ Atallah, V Raskin, M Crogan, C Hempelmann, F Kerschbaum, ...
Information Hiding: 4th International Workshop, IH 2001 Pittsburgh, PA, USA ¡¦, 2001
3562001
Dynamic computational geometry
MJ Atallah
24th Annual Symposium on Foundations of Computer Science (sfcs 1983), 92-99, 1983
3291983
Cascading divide-and-conquer: A technique for designing parallel algorithms
MJ Atallah, R Cole, MT Goodrich
SIAM Journal on Computing 18 (3), 499-532, 1989
3201989
On symmetry detection
Atallah
IEEE Transactions on Computers 100 (7), 663-666, 1985
3011985
Natural language watermarking and tamperproofing
MJ Atallah, V Raskin, CF Hempelmann, M Karahan, R Sion, U Topkara, ...
International workshop on information hiding, 196-212, 2002
3002002
Privacy-Preserving Cooperative Scientific Computations.
W Du, MJ Atallah
csfw 1, 273, 2001
2882001
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20