Marina V. Blanton, Ph.D.

Affiliations: 
2007 Computer Sciences Purdue University, West Lafayette, IN, United States 
Area:
Computer Science
Google:
"Marina Blanton"

Parents

Sign in to add mentor
Mikhail J. Atallah grad student 2007 Purdue
 (Key management in hierarchical access control systems.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Samadani MH, Berenjkoob M, Blanton M. (2019) Secure pattern matching based on bit parallelism: Non-interactive protocols for non-deterministic string matching automata evaluation International Journal of Information Security. 18: 371-391
Shan Z, Ren K, Blanton M, et al. (2018) Practical Secure Computation Outsourcing: A Survey Acm Computing Surveys. 51: 31
Aliasgari M, Blanton M, Bayatbabolghani F. (2017) Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model International Journal of Information Security. 16: 577-601
Zhang Y, Blanton M. (2016) Efficient Dynamic Provable Possession of Remote Data via Update Trees Acm Transactions On Storage. 12: 9
Blanton M, Aguiar E. (2016) Private and oblivious set and multiset operations International Journal of Information Security. 15: 493-518
Zhang Y, Blanton M, Almashaqbeh G. (2015) Secure distributed genome analysis for GWAS and sequence comparison computation. Bmc Medical Informatics and Decision Making. 15: S4
Blanton M, Zhang Y, Frikken KB. (2013) Secure and verifiable outsourcing of large-scale biometric computations Acm Transactions On Information and System Security. 16
Hoens TR, Blanton M, Steele A, et al. (2013) Reliable medical recommendation systems with patient privacy Acm Transactions On Intelligent Systems and Technology. 4: 1-31
Blanton M, Aliasgari M. (2013) Analysis of Reusability of Secure Sketches and Fuzzy Extractors Ieee Transactions On Information Forensics and Security. 8: 1433-1445
Blanton M, Aliasgari M. (2012) Secure outsourced computation of iris matching Journal of Computer Security. 20: 259-305
See more...