Keith B. Frikken, Ph.D.
Affiliations: | 2005 | Purdue University, West Lafayette, IN, United States |
Area:
Computer ScienceGoogle:
"Keith Frikken"Parents
Sign in to add mentorMikhail J. Atallah | grad student | 2005 | Purdue | |
(Secure and private online collaboration.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Blanton M, Zhang Y, Frikken KB. (2013) Secure and verifiable outsourcing of large-scale biometric computations Acm Transactions On Information and System Security. 16 |
Blanton M, Atallah MJ, Frikken KB, et al. (2012) Secure and efficient outsourcing of sequence comparisons Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 505-522 |
Frikken KB. (2012) Cryptographic enforcement of access control while mitigating key sharing Secrypt 2012 - Proceedings of the International Conference On Security and Cryptography. 245-250 |
Atallah MJ, Frikken KB, Wang S. (2012) Private outsourcing of matrix multiplication over closed semi-rings Secrypt 2012 - Proceedings of the International Conference On Security and Cryptography. 136-144 |
Deshpande V, Schwarz LB, Atallah MJ, et al. (2011) Outsourcing manufacturing: Secure price-masking mechanisms for purchasing component parts Production and Operations Management. 20: 165-180 |
Frikken KB, Yuan H, Atallah MJ. (2011) Secure authenticated comparisons Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6715: 514-531 |
Atallah MJ, Frikken KB. (2010) Securely outsourcing linear algebra computations Proceedings of the 5th International Symposium On Information, Computer and Communications Security, Asiaccs 2010. 48-59 |
Blanton M, Frikken KB. (2010) Efficient multi-dimensional key management in broadcast services Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6345: 424-440 |
Atallah MJ, Blanton M, Fazio N, et al. (2009) Dynamic and efficient key management for access hierarchies Acm Transactions On Information and System Security. 12 |
Frikken KB, Blanton M, Atallah MJ. (2009) Robust authentication using physically unclonable functions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5735: 262-277 |