关注
Marina Blanton
Marina Blanton
在 buffalo.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Internet addiction: Metasynthesis of 1996–2006 quantitative research
S Byun, C Ruffini, JE Mills, AC Douglas, M Niang, S Stepchenkova, ...
Cyberpsychology & behavior 12 (2), 203-207, 2009
7952009
Algorithms and theory of computation handbook
MJ Atallah, M Blanton
CRC press, 2009
6822009
Internet addiction: Meta-synthesis of qualitative research for the decade 1996–2006
AC Douglas, JE Mills, M Niang, S Stepchenkova, S Byun, C Ruffini, ...
Computers in human behavior 24 (6), 3027-3044, 2008
6732008
Dynamic and efficient key management for access hierarchies
MJ Atallah, M Blanton, N Fazio, KB Frikken
ACM Transactions on Information and System Security (TISSEC) 12 (3), 43, 2009
6232009
Dynamic and efficient key management for access hierarchies
MJ Atallah, KB Frikken, M Blanton
ACM Conference on Computer and Communications Security (CCS), 190-201, 2005
623*2005
Secure and efficient protocols for iris and fingerprint identification
M Blanton, P Gasti
European Symposium on Research in Computer Security (ESORICS), 190-209, 2011
2582011
Private collaborative forecasting and benchmarking
M Atallah, M Bykova, J Li, K Frikken, M Topkara
ACM Workshop on Privacy in the Electronic Society (WPES), 103-114, 2004
2092004
Secure computation on floating point numbers
M Aliasgari, M Blanton, Y Zhang, A Steele
Network and Distributed System Security Symposium (NDSS), 2013
1602013
Secret handshakes with dynamic and fuzzy matching
G Ateniese, M Blanton, J Kirsch
Network and Distributed System Security Symposium (NDSS), 159-177, 2007
1522007
PICCO: a general-purpose compiler for private distributed computation
Y Zhang, A Steele, M Blanton
ACM SIGSAC Conference on Computer & Communications Security (CCS), 813-826, 2013
1492013
Practical secure computation outsourcing: A survey
Z Shan, K Ren, M Blanton, C Wang
ACM Computing Surveys (CSUR) 51 (2), 1-40, 2018
1382018
Robust authentication using physically unclonable functions
KB Frikken, M Blanton, MJ Atallah
Information Security Conference (ISC), 262-277, 2009
1322009
Secure outsourcing of DNA searching via finite automata
M Blanton, M Aliasgari
Data and Applications Security and Privacy XXIV, 49-64, 2010
1302010
Data-oblivious graph algorithms for secure computation and outsourcing
M Blanton, A Steele, M Aliasgari
ACM SIGSAC Symposium on Information, Computer and Communications Security …, 2013
1272013
Private and Oblivious Set and Multiset Operations
M Blanton, E Aguiar
ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2012
1082012
Reliable medical recommendation systems with patient privacy
TR Hoens, M Blanton, NV Chawla
Proceedings of the 1st ACM International Health Informatics Symposium (IHI …, 2010
1062010
Secure and Efficient Outsourcing of Sequence Comparisons
M Blanton, M Atallah, K Frikken, Q Malluhi
European Symposium on Research in Computer Security (ESORICS), 505-522, 2012
962012
Detecting network intrusions via a statistical analysis of network packet characteristics
M Bykova, S Ostermann, B Tjaden
Proceedings of the 33rd Southeastern Symposium on System Theory, 309-314, 2001
952001
Analysis of Reusability of Secure Sketches and Fuzzy Extractors
M Blanton, M Aliasgari
IEEE Transactions on Information Forensics and Security 8 (9), 1433-1445, 2013
732013
An overview of issues and recent developments in cloud computing and storage security
E Aguiar, Y Zhang, M Blanton
High Performance Cloud Auditing and Applications, 3-33, 2013
712013
系统目前无法执行此操作,请稍后再试。
文章 1–20