Internet addiction: Metasynthesis of 1996–2006 quantitative research S Byun, C Ruffini, JE Mills, AC Douglas, M Niang, S Stepchenkova, ... Cyberpsychology & behavior 12 (2), 203-207, 2009 | 820 | 2009 |
Secure multi-party computation problems and their applications: a review and open problems W Du, MJ Atallah Proceedings of the 2001 workshop on New security paradigms, 13-22, 2001 | 735 | 2001 |
Algorithms and Theory of Computation Handbook, Volume 1: General Concepts and Techniques MJ Atallah, M Blanton Chapman & Hall/CRC, 2017 | 694* | 2017 |
Algorithms and Theory of Computation Handbook, Volume 1: General Concepts and Techniques M Atallah, M Blanton CRC press, 2009 | 692* | 2009 |
Internet addiction: Meta-synthesis of qualitative research for the decade 1996–2006 AC Douglas, JE Mills, M Niang, S Stepchenkova, S Byun, C Ruffini, ... Computers in human behavior 24 (6), 3027-3044, 2008 | 692 | 2008 |
Disclosure limitation of sensitive rules M Atallah, E Bertino, A Elmagarmid, M Ibrahim, V Verykios Workshop on Knowledge and Data Engineering Exchange, 45-52, 1999 | 646 | 1999 |
Dynamic and efficient key management for access hierarchies MJ Atallah, M Blanton, N Fazio, KB Frikken ACM Transactions on Information and System Security (TISSEC) 12 (3), 1-43, 2009 | 636 | 2009 |
Rights protection for relational data R Sion, M Atallah, S Prabhakar Proceedings of the 2003 ACM SIGMOD international conference on Management of …, 2003 | 492 | 2003 |
Secure multi-party computational geometry MJ Atallah, W Du Workshop on Algorithms and Data Structures, 165-179, 2001 | 464 | 2001 |
Privacy-preserving cooperative statistical analysis W Du, MJ Atallah Seventeenth Annual Computer Security Applications Conference, 102-110, 2001 | 411 | 2001 |
Secure outsourcing of scientific computations MJ Atallah, KN Pantazopoulos, JR Rice, EE Spafford Advances in computers 54, 215-272, 2002 | 388 | 2002 |
Securely outsourcing linear algebra computations MJ Atallah, KB Frikken Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010 | 386 | 2010 |
Natural language watermarking: Design, analysis, and a proof-of-concept implementation MJ Atallah, V Raskin, M Crogan, C Hempelmann, F Kerschbaum, ... Information Hiding: 4th International Workshop, IH 2001 Pittsburgh, PA, USA …, 2001 | 383 | 2001 |
Protecting software code by guards H Chang, MJ Atallah ACM Workshop on Digital Rights Management, 160-175, 2001 | 381 | 2001 |
Cascading divide-and-conquer: A technique for designing parallel algorithms MJ Atallah, R Cole, MT Goodrich SIAM Journal on Computing 18 (3), 499-532, 1989 | 320 | 1989 |
Natural language watermarking and tamperproofing MJ Atallah, V Raskin, CF Hempelmann, M Karahan, R Sion, U Topkara, ... International workshop on information hiding, 196-212, 2002 | 307 | 2002 |
On symmetry detection Atallah IEEE Transactions on Computers 100 (7), 663-666, 1985 | 306 | 1985 |
Privacy-Preserving Cooperative Scientific Computations. W Du, MJ Atallah csfw 1, 273, 2001 | 289 | 2001 |
Scheduling Algorithms". Algorithms and Theory of Computation Handbook D Karger, C Stein, J Wein CRC Press, 1998 | 276* | 1998 |
Private and cheating-free outsourcing of algebraic computations D Benjamin, MJ Atallah 2008 Sixth Annual Conference on Privacy, Security and Trust, 240-245, 2008 | 270 | 2008 |