Marina Bykova
List of publications from the DBLP Bibliography Server - FAQ
2009 | ||
---|---|---|
19 | EE | Mikhail J. Atallah, Marina Blanton, Nelly Fazio, Keith B. Frikken: Dynamic and Efficient Key Management for Access Hierarchies. ACM Trans. Inf. Syst. Secur. 12(3): (2009) |
18 | EE | Mikhail J. Atallah, Marina Blanton, Michael T. Goodrich, Stanislas Polu: Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric CoRR abs/0904.4670: (2009) |
2008 | ||
17 | EE | Marina Blanton: Improved Conditional E-Payments. ACNS 2008: 188-206 |
16 | EE | Marina Blanton: Online subscriptions with anonymous access. ASIACCS 2008: 217-227 |
15 | EE | Mikhail J. Atallah, Keith B. Frikken, Marina Blanton, YounSun Cho: Private combinatorial group testing. ASIACCS 2008: 312-320 |
2007 | ||
14 | EE | Mikhail J. Atallah, Marina Blanton, Keith B. Frikken: Efficient techniques for realizing geo-spatial access control. ASIACCS 2007: 82-92 |
13 | EE | Mikhail J. Atallah, Marina Blanton, Keith B. Frikken: Incorporating Temporal Capabilities in Existing Key Management Schemes. ESORICS 2007: 515-530 |
12 | EE | Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton: Secret Handshakes with Dynamic and Fuzzy Matching. NDSS 2007 |
11 | EE | Mikhail J. Atallah, Marina Blanton, Michael T. Goodrich, Stanislas Polu: Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric. WADS 2007: 114-126 |
2006 | ||
10 | EE | Mikhail J. Atallah, Marina Blanton, Keith B. Frikken, Jiangtao Li: Efficient Correlated Action Selection. Financial Cryptography 2006: 296-310 |
9 | EE | Mikhail J. Atallah, Marina Blanton, Keith B. Frikken: Key management for non-tree access hierarchies. SACMAT 2006: 11-18 |
8 | EE | Marina Blanton, Mikhail J. Atallah: Succinct representation of flexible and privacy-preserving access rights. VLDB J. 15(4): 334-354 (2006) |
2005 | ||
7 | EE | Mikhail J. Atallah, Keith B. Frikken, Marina Blanton: Dynamic and efficient key management for access hierarchies. ACM Conference on Computer and Communications Security 2005: 190-202 |
6 | EE | Keith B. Frikken, Mikhail J. Atallah, Marina Bykova: Remote Revocation of Smart Cards in a Private DRM System. ACSW Frontiers 2005: 169-178 |
5 | EE | Marina Blanton, Mikhail J. Atallah: Provable bounds for portable and flexible privacy-preserving access. SACMAT 2005: 95-101 |
2004 | ||
4 | EE | Mikhail J. Atallah, Marina Bykova: Portable and Flexible Document Access Control Mechanisms. ESORICS 2004: 193-208 |
3 | EE | Marina Bykova, Mikhail J. Atallah: Succinct specifications of portable document access policies. SACMAT 2004: 41-50 |
2 | EE | Mikhail J. Atallah, Marina Bykova, Jiangtao Li, Keith B. Frikken, Mercan Topkara: Private collaborative forecasting and benchmarking. WPES 2004: 103-114 |
2002 | ||
1 | EE | Marina Bykova, Shawn Ostermann: Statistical analysis of malformed packets and their origins in the modern internet. Internet Measurement Workshop 2002: 83-88 |
1 | Mikhail J. Atallah | [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [13] [14] [15] [18] [19] |
2 | Giuseppe Ateniese | [12] |
3 | YounSun Cho | [15] |
4 | Nelly Fazio | [19] |
5 | Keith B. Frikken | [2] [6] [7] [9] [10] [13] [14] [15] [19] |
6 | Michael T. Goodrich | [11] [18] |
7 | Jonathan Kirsch | [12] |
8 | Jiangtao Li | [2] [10] |
9 | Shawn Ostermann | [1] |
10 | Stanislas Polu | [11] [18] |
11 | Mercan Topkara (Mercan Karahan) | [2] |