Keith B. Frikken, Ph.D.

Affiliations: 
2005 Purdue University, West Lafayette, IN, United States 
Area:
Computer Science
Google:
"Keith Frikken"

Parents

Sign in to add mentor
Mikhail J. Atallah grad student 2005 Purdue
 (Secure and private online collaboration.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Blanton M, Zhang Y, Frikken KB. (2013) Secure and verifiable outsourcing of large-scale biometric computations Acm Transactions On Information and System Security. 16
Blanton M, Atallah MJ, Frikken KB, et al. (2012) Secure and efficient outsourcing of sequence comparisons Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 505-522
Frikken KB. (2012) Cryptographic enforcement of access control while mitigating key sharing Secrypt 2012 - Proceedings of the International Conference On Security and Cryptography. 245-250
Atallah MJ, Frikken KB, Wang S. (2012) Private outsourcing of matrix multiplication over closed semi-rings Secrypt 2012 - Proceedings of the International Conference On Security and Cryptography. 136-144
Deshpande V, Schwarz LB, Atallah MJ, et al. (2011) Outsourcing manufacturing: Secure price-masking mechanisms for purchasing component parts Production and Operations Management. 20: 165-180
Frikken KB, Yuan H, Atallah MJ. (2011) Secure authenticated comparisons Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6715: 514-531
Atallah MJ, Frikken KB. (2010) Securely outsourcing linear algebra computations Proceedings of the 5th International Symposium On Information, Computer and Communications Security, Asiaccs 2010. 48-59
Blanton M, Frikken KB. (2010) Efficient multi-dimensional key management in broadcast services Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6345: 424-440
Atallah MJ, Blanton M, Fazio N, et al. (2009) Dynamic and efficient key management for access hierarchies Acm Transactions On Information and System Security. 12
Frikken KB, Blanton M, Atallah MJ. (2009) Robust authentication using physically unclonable functions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5735: 262-277
See more...