The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Marina Blanton: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mikhail J. Atallah, Keith B. Frikken, Marina Blanton
    Dynamic and efficient key management for access hierarchies. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:190-202 [Conf]
  2. Mikhail J. Atallah, Marina Blanton, Keith B. Frikken
    Efficient techniques for realizing geo-spatial access control. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:82-92 [Conf]
  3. Mikhail J. Atallah, Marina Blanton, Keith B. Frikken, Jiangtao Li
    Efficient Correlated Action Selection. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:296-310 [Conf]
  4. Mikhail J. Atallah, Marina Blanton, Keith B. Frikken
    Key management for non-tree access hierarchies. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:11-18 [Conf]
  5. Marina Blanton, Mikhail J. Atallah
    Provable bounds for portable and flexible privacy-preserving access. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:95-101 [Conf]
  6. Marina Blanton, Mikhail J. Atallah
    Succinct representation of flexible and privacy-preserving access rights. [Citation Graph (0, 0)][DBLP]
    VLDB J., 2006, v:15, n:4, pp:334-354 [Journal]
  7. Mikhail J. Atallah, Marina Blanton, Keith B. Frikken
    Incorporating Temporal Capabilities in Existing Key Management Schemes. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:515-530 [Conf]
  8. Mikhail J. Atallah, Marina Blanton, Michael T. Goodrich, Stanislas Polu
    Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric. [Citation Graph (0, 0)][DBLP]
    WADS, 2007, pp:114-126 [Conf]

  9. Improved Conditional E-Payments. [Citation Graph (, )][DBLP]


  10. Online subscriptions with anonymous access. [Citation Graph (, )][DBLP]


  11. Private combinatorial group testing. [Citation Graph (, )][DBLP]


  12. Secure Outsourcing of DNA Searching via Finite Automata. [Citation Graph (, )][DBLP]


  13. Efficient Multi-dimensional Key Management in Broadcast Services. [Citation Graph (, )][DBLP]


  14. Biometric-Based Non-transferable Anonymous Credentials. [Citation Graph (, )][DBLP]


  15. Robust Authentication Using Physically Unclonable Functions. [Citation Graph (, )][DBLP]


  16. Secret Handshakes with Dynamic and Fuzzy Matching. [Citation Graph (, )][DBLP]


  17. Privacy-Preserving Network Aggregation. [Citation Graph (, )][DBLP]


  18. Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric [Citation Graph (, )][DBLP]


Search in 0.234secs, Finished in 0.235secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002