The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Keith B. Frikken: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Keith B. Frikken, Mikhail J. Atallah, Marina Bykova
    Remote Revocation of Smart Cards in a Private DRM System. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:169-178 [Conf]
  2. Mikhail J. Atallah, Keith B. Frikken, Marina Blanton
    Dynamic and efficient key management for access hierarchies. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:190-202 [Conf]
  3. Mikhail J. Atallah, Marina Blanton, Keith B. Frikken
    Efficient techniques for realizing geo-spatial access control. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:82-92 [Conf]
  4. Mikhail J. Atallah, Keith B. Frikken
    Replicated Parallel I/O without Additional Scheduling Costs. [Citation Graph (0, 0)][DBLP]
    DEXA, 2003, pp:223-232 [Conf]
  5. Keith B. Frikken, Mikhail J. Atallah, Sunil Prabhakar, Reihaneh Safavi-Naini
    Optimal Parallel I/O for Range Queries through Replication. [Citation Graph (0, 0)][DBLP]
    DEXA, 2002, pp:669-678 [Conf]
  6. Mikhail J. Atallah, Keith B. Frikken, Michael T. Goodrich, Roberto Tamassia
    Secure Biometric Authentication for Weak Computational Devices. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:357-371 [Conf]
  7. Keith B. Frikken, Mikhail J. Atallah
    Achieving Fairness in Private Contract Negotiation. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:270-284 [Conf]
  8. Mikhail J. Atallah, Marina Blanton, Keith B. Frikken, Jiangtao Li
    Efficient Correlated Action Selection. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:296-310 [Conf]
  9. Keith B. Frikken
    Optimal Distributed Declustering Using Replication. [Citation Graph (0, 0)][DBLP]
    ICDT, 2005, pp:144-157 [Conf]
  10. Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia
    Point-Based Trust: Define How Much Privacy Is Worth. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:190-209 [Conf]
  11. Mikhail J. Atallah, Keith B. Frikken
    Privacy-Preserving Location-Dependent Query Processing. [Citation Graph (0, 0)][DBLP]
    ICPS, 2004, pp:9-17 [Conf]
  12. Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
    Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  13. Mikhail J. Atallah, Marina Blanton, Keith B. Frikken
    Key management for non-tree access hierarchies. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:11-18 [Conf]
  14. Keith B. Frikken, Mikhail J. Atallah, Chen Zhang
    Privacy-preserving credit checking. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2005, pp:147-154 [Conf]
  15. Keith B. Frikken, Mikhail J. Atallah
    Cropping-Resilient Segmented Multiple Watermarking. [Citation Graph (0, 0)][DBLP]
    WADS, 2003, pp:231-242 [Conf]
  16. Mikhail J. Atallah, Marina Bykova, Jiangtao Li, Keith B. Frikken, Mercan Topkara
    Private collaborative forecasting and benchmarking. [Citation Graph (0, 0)][DBLP]
    WPES, 2004, pp:103-114 [Conf]
  17. Keith B. Frikken, Mikhail J. Atallah
    Privacy preserving electronic surveillance. [Citation Graph (0, 0)][DBLP]
    WPES, 2003, pp:45-52 [Conf]
  18. Keith B. Frikken, Mikhail J. Atallah
    Privacy preserving route planning. [Citation Graph (0, 0)][DBLP]
    WPES, 2004, pp:8-15 [Conf]
  19. Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li
    Hidden access control policies with hidden credentials. [Citation Graph (0, 0)][DBLP]
    WPES, 2004, pp:27- [Conf]
  20. Mikhail J. Atallah, Sunil Prabhakar, Keith B. Frikken, Radu Sion
    Digital Rights Protection. [Citation Graph (0, 0)][DBLP]
    IEEE Data Eng. Bull., 2004, v:27, n:1, pp:19-25 [Journal]
  21. Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li
    Attribute-Based Access Control with Hidden Policies and Hidden Credentials. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2006, v:55, n:10, pp:1259-1270 [Journal]
  22. Keith B. Frikken
    Privacy-Preserving Set Union. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:237-252 [Conf]
  23. Mikhail J. Atallah, Marina Blanton, Keith B. Frikken
    Incorporating Temporal Capabilities in Existing Key Management Schemes. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:515-530 [Conf]

  24. Private combinatorial group testing. [Citation Graph (, )][DBLP]


  25. Securely outsourcing linear algebra computations. [Citation Graph (, )][DBLP]


  26. Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation. [Citation Graph (, )][DBLP]


  27. Efficient Multi-dimensional Key Management in Broadcast Services. [Citation Graph (, )][DBLP]


  28. PBS: Private Bartering Systems. [Citation Graph (, )][DBLP]


  29. Robust Authentication Using Physically Unclonable Functions. [Citation Graph (, )][DBLP]


  30. Privacy-Preserving Network Aggregation. [Citation Graph (, )][DBLP]


  31. Yet another privacy metric for publishing micro-data. [Citation Graph (, )][DBLP]


  32. Private social network analysis: how to assemble pieces of a graph privately. [Citation Graph (, )][DBLP]


  33. An efficient integrity-preserving scheme for hierarchical sensor aggregation. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002