Year |
Citation |
Score |
2013 |
Blanton M, Zhang Y, Frikken KB. Secure and verifiable outsourcing of large-scale biometric computations Acm Transactions On Information and System Security. 16. DOI: 10.1145/2535523 |
0.696 |
|
2012 |
Blanton M, Atallah MJ, Frikken KB, Malluhi Q. Secure and efficient outsourcing of sequence comparisons Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 505-522. DOI: 10.1007/978-3-642-33167-1_29 |
0.566 |
|
2012 |
Frikken KB. Cryptographic enforcement of access control while mitigating key sharing Secrypt 2012 - Proceedings of the International Conference On Security and Cryptography. 245-250. |
0.361 |
|
2012 |
Atallah MJ, Frikken KB, Wang S. Private outsourcing of matrix multiplication over closed semi-rings Secrypt 2012 - Proceedings of the International Conference On Security and Cryptography. 136-144. |
0.451 |
|
2011 |
Deshpande V, Schwarz LB, Atallah MJ, Blanton M, Frikken KB. Outsourcing manufacturing: Secure price-masking mechanisms for purchasing component parts Production and Operations Management. 20: 165-180. DOI: 10.1111/J.1937-5956.2010.01188.X |
0.664 |
|
2011 |
Frikken KB, Yuan H, Atallah MJ. Secure authenticated comparisons Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6715: 514-531. DOI: 10.1007/978-3-642-21554-4_30 |
0.589 |
|
2010 |
Atallah MJ, Frikken KB. Securely outsourcing linear algebra computations Proceedings of the 5th International Symposium On Information, Computer and Communications Security, Asiaccs 2010. 48-59. DOI: 10.1145/1755688.1755695 |
0.613 |
|
2010 |
Blanton M, Frikken KB. Efficient multi-dimensional key management in broadcast services Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6345: 424-440. DOI: 10.1007/978-3-642-15497-3_26 |
0.307 |
|
2009 |
Atallah MJ, Blanton M, Fazio N, Frikken KB. Dynamic and efficient key management for access hierarchies Acm Transactions On Information and System Security. 12. DOI: 10.1145/1455526.1455531 |
0.694 |
|
2009 |
Frikken KB, Blanton M, Atallah MJ. Robust authentication using physically unclonable functions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5735: 262-277. DOI: 10.1007/978-3-642-04474-8_22 |
0.592 |
|
2008 |
Yao D, Frikken KB, Atallah MJ, Tamassia R. Private information: To reveal or not to reveal Acm Transactions On Information and System Security. 12. DOI: 10.1145/1410234.1410240 |
0.577 |
|
2008 |
Atallah MJ, Frikken KB, Blanton M, Cho Y. Private combinatorial group testing Proceedings of the 2008 Acm Symposium On Information, Computer and Communications Security, Asiaccs '08. 312-320. DOI: 10.1145/1368310.1368355 |
0.443 |
|
2007 |
Atallah MJ, Blanton M, Frikken KB. Efficient techniques for realizing geo-spatial access control Proceedings of the 2nd Acm Symposium On Information, Computer and Communications Security, Asiaccs '07. 82-92. DOI: 10.1145/1229285.1229301 |
0.604 |
|
2007 |
Atallah MJ, Blanton M, Frikken KB. Incorporating temporal capabilities in existing key management schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4734: 515-530. |
0.61 |
|
2006 |
Frikken K, Atallah M, Li J. Attribute-Based Access Control with Hidden Policies and Hidden Credentials Ieee Transactions On Computers. 55: 1259-1270. DOI: 10.1109/Tc.2006.158 |
0.587 |
|
2006 |
Atallah MJ, Blanton M, Frikken KB. Key management for non-tree access hierarchies Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 2006: 11-18. |
0.505 |
|
2006 |
Atallah MJ, Blanton M, Frikken KB, Li J. Efficient correlated action selection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4107: 296-310. |
0.537 |
|
2005 |
Atallah MJ, Frikken KB, Goodrich MT, Tamassia R. Secure biometric authentication for weak computational devices Lecture Notes in Computer Science. 3570: 357-371. |
0.564 |
|
2004 |
Atallah MJ, Frikken KB. Privacy-preserving location-dependent query processing Proceedings - the Ieee/Acs International Conference On Pervasive Services, Icps2004. 9-18. |
0.512 |
|
2004 |
Frikken KB, Atallah MJ. Privacy preserving route planning Wpes'04: Proceedings of the 2004 Acm Workshop On Privacy in the Electronic Society. 8-15. |
0.559 |
|
2003 |
Frikken KB, Atallah MJ. Privacy Preserving Electronic Surveillance Proceedings of the Acm Workshop On Privacy in the Electronic Society. 45-52. |
0.533 |
|
Show low-probability matches. |