2009 |
30 | EE | Mikhail J. Atallah,
Marina Blanton,
Nelly Fazio,
Keith B. Frikken:
Dynamic and Efficient Key Management for Access Hierarchies.
ACM Trans. Inf. Syst. Secur. 12(3): (2009) |
2008 |
29 | EE | Mikhail J. Atallah,
Keith B. Frikken,
Marina Blanton,
YounSun Cho:
Private combinatorial group testing.
ASIACCS 2008: 312-320 |
28 | EE | Keith B. Frikken,
Lukasz Opyrchal:
PBS: Private Bartering Systems.
Financial Cryptography 2008: 113-127 |
27 | EE | Keith B. Frikken,
Joseph A. Dougherty IV:
An efficient integrity-preserving scheme for hierarchical sensor aggregation.
WISEC 2008: 68-76 |
26 | EE | Keith B. Frikken,
Yihua Zhang:
Yet another privacy metric for publishing micro-data.
WPES 2008: 117-122 |
25 | EE | Danfeng Yao,
Keith B. Frikken,
Mikhail J. Atallah,
Roberto Tamassia:
Private Information: To Reveal or not to Reveal.
ACM Trans. Inf. Syst. Secur. 12(1): (2008) |
2007 |
24 | EE | Keith B. Frikken:
Privacy-Preserving Set Union.
ACNS 2007: 237-252 |
23 | EE | Mikhail J. Atallah,
Marina Blanton,
Keith B. Frikken:
Efficient techniques for realizing geo-spatial access control.
ASIACCS 2007: 82-92 |
22 | EE | Mikhail J. Atallah,
Marina Blanton,
Keith B. Frikken:
Incorporating Temporal Capabilities in Existing Key Management Schemes.
ESORICS 2007: 515-530 |
2006 |
21 | EE | Mikhail J. Atallah,
Marina Blanton,
Keith B. Frikken,
Jiangtao Li:
Efficient Correlated Action Selection.
Financial Cryptography 2006: 296-310 |
20 | EE | Danfeng Yao,
Keith B. Frikken,
Mikhail J. Atallah,
Roberto Tamassia:
Point-Based Trust: Define How Much Privacy Is Worth.
ICICS 2006: 190-209 |
19 | EE | Keith B. Frikken,
Jiangtao Li,
Mikhail J. Atallah:
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles.
NDSS 2006 |
18 | EE | Mikhail J. Atallah,
Marina Blanton,
Keith B. Frikken:
Key management for non-tree access hierarchies.
SACMAT 2006: 11-18 |
17 | EE | Keith B. Frikken,
Philippe Golle:
Private social network analysis: how to assemble pieces of a graph privately.
WPES 2006: 89-98 |
16 | EE | Keith B. Frikken,
Mikhail J. Atallah,
Jiangtao Li:
Attribute-Based Access Control with Hidden Policies and Hidden Credentials.
IEEE Trans. Computers 55(10): 1259-1270 (2006) |
2005 |
15 | EE | Mikhail J. Atallah,
Keith B. Frikken,
Marina Blanton:
Dynamic and efficient key management for access hierarchies.
ACM Conference on Computer and Communications Security 2005: 190-202 |
14 | EE | Keith B. Frikken,
Mikhail J. Atallah,
Chen Zhang:
Privacy-preserving credit checking.
ACM Conference on Electronic Commerce 2005: 147-154 |
13 | EE | Keith B. Frikken,
Mikhail J. Atallah,
Marina Bykova:
Remote Revocation of Smart Cards in a Private DRM System.
ACSW Frontiers 2005: 169-178 |
12 | EE | Keith B. Frikken,
Mikhail J. Atallah:
Achieving Fairness in Private Contract Negotiation.
Financial Cryptography 2005: 270-284 |
11 | EE | Mikhail J. Atallah,
Keith B. Frikken,
Michael T. Goodrich,
Roberto Tamassia:
Secure Biometric Authentication for Weak Computational Devices.
Financial Cryptography 2005: 357-371 |
10 | EE | Keith B. Frikken:
Optimal Distributed Declustering Using Replication.
ICDT 2005: 144-157 |
2004 |
9 | EE | Mikhail J. Atallah,
Keith B. Frikken:
Privacy-Preserving Location-Dependent Query Processing.
ICPS 2004: 9-17 |
8 | EE | Mikhail J. Atallah,
Marina Bykova,
Jiangtao Li,
Keith B. Frikken,
Mercan Topkara:
Private collaborative forecasting and benchmarking.
WPES 2004: 103-114 |
7 | EE | Keith B. Frikken,
Mikhail J. Atallah,
Jiangtao Li:
Hidden access control policies with hidden credentials.
WPES 2004: 27 |
6 | EE | Keith B. Frikken,
Mikhail J. Atallah:
Privacy preserving route planning.
WPES 2004: 8-15 |
5 | EE | Mikhail J. Atallah,
Sunil Prabhakar,
Keith B. Frikken,
Radu Sion:
Digital Rights Protection.
IEEE Data Eng. Bull. 27(1): 19-25 (2004) |
2003 |
4 | EE | Mikhail J. Atallah,
Keith B. Frikken:
Replicated Parallel I/O without Additional Scheduling Costs.
DEXA 2003: 223-232 |
3 | EE | Keith B. Frikken,
Mikhail J. Atallah:
Cropping-Resilient Segmented Multiple Watermarking.
WADS 2003: 231-242 |
2 | EE | Keith B. Frikken,
Mikhail J. Atallah:
Privacy preserving electronic surveillance.
WPES 2003: 45-52 |
2002 |
1 | EE | Keith B. Frikken,
Mikhail J. Atallah,
Sunil Prabhakar,
Reihaneh Safavi-Naini:
Optimal Parallel I/O for Range Queries through Replication.
DEXA 2002: 669-678 |