Marina V. Blanton, Ph.D. - Publications

Affiliations: 
2007 Computer Sciences Purdue University, West Lafayette, IN, United States 
Area:
Computer Science

14 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Samadani MH, Berenjkoob M, Blanton M. Secure pattern matching based on bit parallelism: Non-interactive protocols for non-deterministic string matching automata evaluation International Journal of Information Security. 18: 371-391. DOI: 10.1007/S10207-018-0410-8  0.433
2018 Shan Z, Ren K, Blanton M, Wang C. Practical Secure Computation Outsourcing: A Survey Acm Computing Surveys. 51: 31. DOI: 10.1145/3158363  0.453
2017 Aliasgari M, Blanton M, Bayatbabolghani F. Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model International Journal of Information Security. 16: 577-601. DOI: 10.1007/S10207-016-0350-0  0.474
2016 Zhang Y, Blanton M. Efficient Dynamic Provable Possession of Remote Data via Update Trees Acm Transactions On Storage. 12: 9. DOI: 10.1145/2747877  0.422
2016 Blanton M, Aguiar E. Private and oblivious set and multiset operations International Journal of Information Security. 15: 493-518. DOI: 10.1007/S10207-015-0301-1  0.424
2015 Zhang Y, Blanton M, Almashaqbeh G. Secure distributed genome analysis for GWAS and sequence comparison computation. Bmc Medical Informatics and Decision Making. 15: S4. PMID 26733307 DOI: 10.1186/1472-6947-15-S5-S4  0.327
2013 Blanton M, Zhang Y, Frikken KB. Secure and verifiable outsourcing of large-scale biometric computations Acm Transactions On Information and System Security. 16. DOI: 10.1145/2535523  0.612
2013 Hoens TR, Blanton M, Steele A, Chawla NV. Reliable medical recommendation systems with patient privacy Acm Transactions On Intelligent Systems and Technology. 4: 1-31. DOI: 10.1145/2508037.2508048  0.386
2013 Blanton M, Aliasgari M. Analysis of Reusability of Secure Sketches and Fuzzy Extractors Ieee Transactions On Information Forensics and Security. 8: 1433-1445. DOI: 10.1109/Tifs.2013.2272786  0.411
2012 Blanton M, Aliasgari M. Secure outsourced computation of iris matching Journal of Computer Security. 20: 259-305. DOI: 10.3233/Jcs-2012-0447  0.469
2011 Deshpande V, Schwarz LB, Atallah MJ, Blanton M, Frikken KB. Outsourcing manufacturing: Secure price-masking mechanisms for purchasing component parts Production and Operations Management. 20: 165-180. DOI: 10.1111/J.1937-5956.2010.01188.X  0.579
2009 Byun S, Ruffini C, Mills JE, Douglas AC, Niang M, Stepchenkova S, Lee SK, Loutfi J, Lee JK, Atallah M, Blanton M. Internet addiction: metasynthesis of 1996-2006 quantitative research. Cyberpsychology & Behavior : the Impact of the Internet, Multimedia and Virtual Reality On Behavior and Society. 12: 203-7. PMID 19072075 DOI: 10.1089/Cpb.2008.0102  0.51
2009 Atallah MJ, Blanton M, Fazio N, Frikken KB. Dynamic and efficient key management for access hierarchies Acm Transactions On Information and System Security. 12. DOI: 10.1145/1455526.1455531  0.596
2008 Douglas AC, Mills JE, Niang M, Stepchenkova S, Byun S, Ruffini C, Lee SK, Loutfi J, Lee JK, Atallah M, Blanton M. Internet addiction: Meta-synthesis of qualitative research for the decade 1996-2006 Computers in Human Behavior. 24: 3027-3044. DOI: 10.1016/J.Chb.2008.05.009  0.528
Show low-probability matches.