Keith B. Frikken, Ph.D. - Publications

Affiliations: 
2005 Purdue University, West Lafayette, IN, United States 
Area:
Computer Science

21 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2013 Blanton M, Zhang Y, Frikken KB. Secure and verifiable outsourcing of large-scale biometric computations Acm Transactions On Information and System Security. 16. DOI: 10.1145/2535523  0.696
2012 Blanton M, Atallah MJ, Frikken KB, Malluhi Q. Secure and efficient outsourcing of sequence comparisons Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 505-522. DOI: 10.1007/978-3-642-33167-1_29  0.566
2012 Frikken KB. Cryptographic enforcement of access control while mitigating key sharing Secrypt 2012 - Proceedings of the International Conference On Security and Cryptography. 245-250.  0.361
2012 Atallah MJ, Frikken KB, Wang S. Private outsourcing of matrix multiplication over closed semi-rings Secrypt 2012 - Proceedings of the International Conference On Security and Cryptography. 136-144.  0.451
2011 Deshpande V, Schwarz LB, Atallah MJ, Blanton M, Frikken KB. Outsourcing manufacturing: Secure price-masking mechanisms for purchasing component parts Production and Operations Management. 20: 165-180. DOI: 10.1111/J.1937-5956.2010.01188.X  0.664
2011 Frikken KB, Yuan H, Atallah MJ. Secure authenticated comparisons Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6715: 514-531. DOI: 10.1007/978-3-642-21554-4_30  0.589
2010 Atallah MJ, Frikken KB. Securely outsourcing linear algebra computations Proceedings of the 5th International Symposium On Information, Computer and Communications Security, Asiaccs 2010. 48-59. DOI: 10.1145/1755688.1755695  0.613
2010 Blanton M, Frikken KB. Efficient multi-dimensional key management in broadcast services Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6345: 424-440. DOI: 10.1007/978-3-642-15497-3_26  0.307
2009 Atallah MJ, Blanton M, Fazio N, Frikken KB. Dynamic and efficient key management for access hierarchies Acm Transactions On Information and System Security. 12. DOI: 10.1145/1455526.1455531  0.694
2009 Frikken KB, Blanton M, Atallah MJ. Robust authentication using physically unclonable functions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5735: 262-277. DOI: 10.1007/978-3-642-04474-8_22  0.592
2008 Yao D, Frikken KB, Atallah MJ, Tamassia R. Private information: To reveal or not to reveal Acm Transactions On Information and System Security. 12. DOI: 10.1145/1410234.1410240  0.577
2008 Atallah MJ, Frikken KB, Blanton M, Cho Y. Private combinatorial group testing Proceedings of the 2008 Acm Symposium On Information, Computer and Communications Security, Asiaccs '08. 312-320. DOI: 10.1145/1368310.1368355  0.443
2007 Atallah MJ, Blanton M, Frikken KB. Efficient techniques for realizing geo-spatial access control Proceedings of the 2nd Acm Symposium On Information, Computer and Communications Security, Asiaccs '07. 82-92. DOI: 10.1145/1229285.1229301  0.604
2007 Atallah MJ, Blanton M, Frikken KB. Incorporating temporal capabilities in existing key management schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4734: 515-530.  0.61
2006 Frikken K, Atallah M, Li J. Attribute-Based Access Control with Hidden Policies and Hidden Credentials Ieee Transactions On Computers. 55: 1259-1270. DOI: 10.1109/Tc.2006.158  0.587
2006 Atallah MJ, Blanton M, Frikken KB. Key management for non-tree access hierarchies Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 2006: 11-18.  0.505
2006 Atallah MJ, Blanton M, Frikken KB, Li J. Efficient correlated action selection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4107: 296-310.  0.537
2005 Atallah MJ, Frikken KB, Goodrich MT, Tamassia R. Secure biometric authentication for weak computational devices Lecture Notes in Computer Science. 3570: 357-371.  0.564
2004 Atallah MJ, Frikken KB. Privacy-preserving location-dependent query processing Proceedings - the Ieee/Acs International Conference On Pervasive Services, Icps2004. 9-18.  0.512
2004 Frikken KB, Atallah MJ. Privacy preserving route planning Wpes'04: Proceedings of the 2004 Acm Workshop On Privacy in the Electronic Society. 8-15.  0.559
2003 Frikken KB, Atallah MJ. Privacy Preserving Electronic Surveillance Proceedings of the Acm Workshop On Privacy in the Electronic Society. 45-52.  0.533
Show low-probability matches.