dblp.uni-trier.dewww.uni-trier.de

Marina Blanton

Marina Bykova

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
19EEMikhail J. Atallah, Marina Blanton, Nelly Fazio, Keith B. Frikken: Dynamic and Efficient Key Management for Access Hierarchies. ACM Trans. Inf. Syst. Secur. 12(3): (2009)
18EEMikhail J. Atallah, Marina Blanton, Michael T. Goodrich, Stanislas Polu: Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric CoRR abs/0904.4670: (2009)
2008
17EEMarina Blanton: Improved Conditional E-Payments. ACNS 2008: 188-206
16EEMarina Blanton: Online subscriptions with anonymous access. ASIACCS 2008: 217-227
15EEMikhail J. Atallah, Keith B. Frikken, Marina Blanton, YounSun Cho: Private combinatorial group testing. ASIACCS 2008: 312-320
2007
14EEMikhail J. Atallah, Marina Blanton, Keith B. Frikken: Efficient techniques for realizing geo-spatial access control. ASIACCS 2007: 82-92
13EEMikhail J. Atallah, Marina Blanton, Keith B. Frikken: Incorporating Temporal Capabilities in Existing Key Management Schemes. ESORICS 2007: 515-530
12EEGiuseppe Ateniese, Jonathan Kirsch, Marina Blanton: Secret Handshakes with Dynamic and Fuzzy Matching. NDSS 2007
11EEMikhail J. Atallah, Marina Blanton, Michael T. Goodrich, Stanislas Polu: Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric. WADS 2007: 114-126
2006
10EEMikhail J. Atallah, Marina Blanton, Keith B. Frikken, Jiangtao Li: Efficient Correlated Action Selection. Financial Cryptography 2006: 296-310
9EEMikhail J. Atallah, Marina Blanton, Keith B. Frikken: Key management for non-tree access hierarchies. SACMAT 2006: 11-18
8EEMarina Blanton, Mikhail J. Atallah: Succinct representation of flexible and privacy-preserving access rights. VLDB J. 15(4): 334-354 (2006)
2005
7EEMikhail J. Atallah, Keith B. Frikken, Marina Blanton: Dynamic and efficient key management for access hierarchies. ACM Conference on Computer and Communications Security 2005: 190-202
6EEKeith B. Frikken, Mikhail J. Atallah, Marina Bykova: Remote Revocation of Smart Cards in a Private DRM System. ACSW Frontiers 2005: 169-178
5EEMarina Blanton, Mikhail J. Atallah: Provable bounds for portable and flexible privacy-preserving access. SACMAT 2005: 95-101
2004
4EEMikhail J. Atallah, Marina Bykova: Portable and Flexible Document Access Control Mechanisms. ESORICS 2004: 193-208
3EEMarina Bykova, Mikhail J. Atallah: Succinct specifications of portable document access policies. SACMAT 2004: 41-50
2EEMikhail J. Atallah, Marina Bykova, Jiangtao Li, Keith B. Frikken, Mercan Topkara: Private collaborative forecasting and benchmarking. WPES 2004: 103-114
2002
1EEMarina Bykova, Shawn Ostermann: Statistical analysis of malformed packets and their origins in the modern internet. Internet Measurement Workshop 2002: 83-88

Coauthor Index

1Mikhail J. Atallah [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [13] [14] [15] [18] [19]
2Giuseppe Ateniese [12]
3YounSun Cho [15]
4Nelly Fazio [19]
5Keith B. Frikken [2] [6] [7] [9] [10] [13] [14] [15] [19]
6Michael T. Goodrich [11] [18]
7Jonathan Kirsch [12]
8Jiangtao Li [2] [10]
9Shawn Ostermann [1]
10Stanislas Polu [11] [18]
11Mercan Topkara (Mercan Karahan) [2]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)