Internet addiction: Metasynthesis of 1996–2006 quantitative research S Byun, C Ruffini, JE Mills, AC Douglas, M Niang, S Stepchenkova, ... Cyberpsychology & behavior 12 (2), 203-207, 2009 | 795 | 2009 |
Algorithms and theory of computation handbook MJ Atallah, M Blanton CRC press, 2009 | 682 | 2009 |
Internet addiction: Meta-synthesis of qualitative research for the decade 1996–2006 AC Douglas, JE Mills, M Niang, S Stepchenkova, S Byun, C Ruffini, ... Computers in human behavior 24 (6), 3027-3044, 2008 | 673 | 2008 |
Dynamic and efficient key management for access hierarchies MJ Atallah, M Blanton, N Fazio, KB Frikken ACM Transactions on Information and System Security (TISSEC) 12 (3), 43, 2009 | 623 | 2009 |
Dynamic and efficient key management for access hierarchies MJ Atallah, KB Frikken, M Blanton ACM Conference on Computer and Communications Security (CCS), 190-201, 2005 | 623* | 2005 |
Secure and efficient protocols for iris and fingerprint identification M Blanton, P Gasti European Symposium on Research in Computer Security (ESORICS), 190-209, 2011 | 258 | 2011 |
Private collaborative forecasting and benchmarking M Atallah, M Bykova, J Li, K Frikken, M Topkara ACM Workshop on Privacy in the Electronic Society (WPES), 103-114, 2004 | 209 | 2004 |
Secure computation on floating point numbers M Aliasgari, M Blanton, Y Zhang, A Steele Network and Distributed System Security Symposium (NDSS), 2013 | 160 | 2013 |
Secret handshakes with dynamic and fuzzy matching G Ateniese, M Blanton, J Kirsch Network and Distributed System Security Symposium (NDSS), 159-177, 2007 | 152 | 2007 |
PICCO: a general-purpose compiler for private distributed computation Y Zhang, A Steele, M Blanton ACM SIGSAC Conference on Computer & Communications Security (CCS), 813-826, 2013 | 149 | 2013 |
Practical secure computation outsourcing: A survey Z Shan, K Ren, M Blanton, C Wang ACM Computing Surveys (CSUR) 51 (2), 1-40, 2018 | 138 | 2018 |
Robust authentication using physically unclonable functions KB Frikken, M Blanton, MJ Atallah Information Security Conference (ISC), 262-277, 2009 | 132 | 2009 |
Secure outsourcing of DNA searching via finite automata M Blanton, M Aliasgari Data and Applications Security and Privacy XXIV, 49-64, 2010 | 130 | 2010 |
Data-oblivious graph algorithms for secure computation and outsourcing M Blanton, A Steele, M Aliasgari ACM SIGSAC Symposium on Information, Computer and Communications Security …, 2013 | 127 | 2013 |
Private and Oblivious Set and Multiset Operations M Blanton, E Aguiar ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2012 | 108 | 2012 |
Reliable medical recommendation systems with patient privacy TR Hoens, M Blanton, NV Chawla Proceedings of the 1st ACM International Health Informatics Symposium (IHI …, 2010 | 106 | 2010 |
Secure and Efficient Outsourcing of Sequence Comparisons M Blanton, M Atallah, K Frikken, Q Malluhi European Symposium on Research in Computer Security (ESORICS), 505-522, 2012 | 96 | 2012 |
Detecting network intrusions via a statistical analysis of network packet characteristics M Bykova, S Ostermann, B Tjaden Proceedings of the 33rd Southeastern Symposium on System Theory, 309-314, 2001 | 95 | 2001 |
Analysis of Reusability of Secure Sketches and Fuzzy Extractors M Blanton, M Aliasgari IEEE Transactions on Information Forensics and Security 8 (9), 1433-1445, 2013 | 73 | 2013 |
An overview of issues and recent developments in cloud computing and storage security E Aguiar, Y Zhang, M Blanton High Performance Cloud Auditing and Applications, 3-33, 2013 | 71 | 2013 |