Share This Author
Dynamic and Efficient Key Management for Access Hierarchies
- M. Atallah, Marina Blanton, Nelly Fazio, Keith B. Frikken
- Computer ScienceTSEC
- 2009
TLDR
Internet Addiction: Metasynthesis of 1996-2006 Quantitative Research
- Sookeun Byun, Celestino Ruffini, Marina Blanton
- BusinessCyberpsychology Behav. Soc. Netw.
- 10 April 2009
TLDR
Internet addiction: Meta-synthesis of qualitative research for the decade 1996-2006
- Alecia Douglas, J. Mills, Marina Blanton
- PsychologyComput. Hum. Behav.
- 17 September 2008
Secure multi-party computation problems and their applications: a review and open problems
- Wenliang Du, M. Atallah
- Computer Science, MathematicsNSPW '01
- 10 September 2001
TLDR
Disclosure limitation of sensitive rules
- M. Atallah, E. Bertino, A. Elmagarmid, M. Ibrahim, V. Verykios
- Computer ScienceProceedings Workshop on Knowledge and Data…
- 7 November 1999
TLDR
Rights protection for relational data
- R. Sion, M. Atallah, S. Prabhakar
- Computer ScienceIEEE Transactions on Knowledge and Data…
- 9 June 2003
we introduce a solution for relational database content rights protection through watermarking. Rights protection for relational data is of ever-increasing interest, especially considering areas…
Algorithms and Theory of Computation Handbook
- M. Atallah
- Computer ScienceChapman & Hall/CRC Applied Algorithms and Data…
- 20 November 2009
TLDR
Privacy-preserving cooperative statistical analysis
- Wenliang Du, M. Atallah
- Computer ScienceSeventeenth Annual Computer Security Applications…
- 10 December 2001
TLDR
Private and Cheating-Free Outsourcing of Algebraic Computations
- David Benjamin, M. Atallah
- Mathematics, Computer ScienceSixth Annual Conference on Privacy, Security and…
- 1 October 2008
We give protocols for the secure and private outsourcing of linear algebra computations, that enable a client to securely outsource expensive algebraic computations (like the multiplication of huge…
...
...