Year |
Citation |
Score |
2019 |
Samadani MH, Berenjkoob M, Blanton M. Secure pattern matching based on bit parallelism: Non-interactive protocols for non-deterministic string matching automata evaluation International Journal of Information Security. 18: 371-391. DOI: 10.1007/S10207-018-0410-8 |
0.433 |
|
2018 |
Shan Z, Ren K, Blanton M, Wang C. Practical Secure Computation Outsourcing: A Survey Acm Computing Surveys. 51: 31. DOI: 10.1145/3158363 |
0.453 |
|
2017 |
Aliasgari M, Blanton M, Bayatbabolghani F. Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model International Journal of Information Security. 16: 577-601. DOI: 10.1007/S10207-016-0350-0 |
0.474 |
|
2016 |
Zhang Y, Blanton M. Efficient Dynamic Provable Possession of Remote Data via Update Trees Acm Transactions On Storage. 12: 9. DOI: 10.1145/2747877 |
0.422 |
|
2016 |
Blanton M, Aguiar E. Private and oblivious set and multiset operations International Journal of Information Security. 15: 493-518. DOI: 10.1007/S10207-015-0301-1 |
0.424 |
|
2015 |
Zhang Y, Blanton M, Almashaqbeh G. Secure distributed genome analysis for GWAS and sequence comparison computation. Bmc Medical Informatics and Decision Making. 15: S4. PMID 26733307 DOI: 10.1186/1472-6947-15-S5-S4 |
0.327 |
|
2013 |
Blanton M, Zhang Y, Frikken KB. Secure and verifiable outsourcing of large-scale biometric computations Acm Transactions On Information and System Security. 16. DOI: 10.1145/2535523 |
0.612 |
|
2013 |
Hoens TR, Blanton M, Steele A, Chawla NV. Reliable medical recommendation systems with patient privacy Acm Transactions On Intelligent Systems and Technology. 4: 1-31. DOI: 10.1145/2508037.2508048 |
0.386 |
|
2013 |
Blanton M, Aliasgari M. Analysis of Reusability of Secure Sketches and Fuzzy Extractors Ieee Transactions On Information Forensics and Security. 8: 1433-1445. DOI: 10.1109/Tifs.2013.2272786 |
0.411 |
|
2012 |
Blanton M, Aliasgari M. Secure outsourced computation of iris matching Journal of Computer Security. 20: 259-305. DOI: 10.3233/Jcs-2012-0447 |
0.469 |
|
2011 |
Deshpande V, Schwarz LB, Atallah MJ, Blanton M, Frikken KB. Outsourcing manufacturing: Secure price-masking mechanisms for purchasing component parts Production and Operations Management. 20: 165-180. DOI: 10.1111/J.1937-5956.2010.01188.X |
0.579 |
|
2009 |
Byun S, Ruffini C, Mills JE, Douglas AC, Niang M, Stepchenkova S, Lee SK, Loutfi J, Lee JK, Atallah M, Blanton M. Internet addiction: metasynthesis of 1996-2006 quantitative research. Cyberpsychology & Behavior : the Impact of the Internet, Multimedia and Virtual Reality On Behavior and Society. 12: 203-7. PMID 19072075 DOI: 10.1089/Cpb.2008.0102 |
0.51 |
|
2009 |
Atallah MJ, Blanton M, Fazio N, Frikken KB. Dynamic and efficient key management for access hierarchies Acm Transactions On Information and System Security. 12. DOI: 10.1145/1455526.1455531 |
0.596 |
|
2008 |
Douglas AC, Mills JE, Niang M, Stepchenkova S, Byun S, Ruffini C, Lee SK, Loutfi J, Lee JK, Atallah M, Blanton M. Internet addiction: Meta-synthesis of qualitative research for the decade 1996-2006 Computers in Human Behavior. 24: 3027-3044. DOI: 10.1016/J.Chb.2008.05.009 |
0.528 |
|
Show low-probability matches. |