dblp.uni-trier.dewww.uni-trier.de

Keith B. Frikken

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
30EEMikhail J. Atallah, Marina Blanton, Nelly Fazio, Keith B. Frikken: Dynamic and Efficient Key Management for Access Hierarchies. ACM Trans. Inf. Syst. Secur. 12(3): (2009)
2008
29EEMikhail J. Atallah, Keith B. Frikken, Marina Blanton, YounSun Cho: Private combinatorial group testing. ASIACCS 2008: 312-320
28EEKeith B. Frikken, Lukasz Opyrchal: PBS: Private Bartering Systems. Financial Cryptography 2008: 113-127
27EEKeith B. Frikken, Joseph A. Dougherty IV: An efficient integrity-preserving scheme for hierarchical sensor aggregation. WISEC 2008: 68-76
26EEKeith B. Frikken, Yihua Zhang: Yet another privacy metric for publishing micro-data. WPES 2008: 117-122
25EEDanfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia: Private Information: To Reveal or not to Reveal. ACM Trans. Inf. Syst. Secur. 12(1): (2008)
2007
24EEKeith B. Frikken: Privacy-Preserving Set Union. ACNS 2007: 237-252
23EEMikhail J. Atallah, Marina Blanton, Keith B. Frikken: Efficient techniques for realizing geo-spatial access control. ASIACCS 2007: 82-92
22EEMikhail J. Atallah, Marina Blanton, Keith B. Frikken: Incorporating Temporal Capabilities in Existing Key Management Schemes. ESORICS 2007: 515-530
2006
21EEMikhail J. Atallah, Marina Blanton, Keith B. Frikken, Jiangtao Li: Efficient Correlated Action Selection. Financial Cryptography 2006: 296-310
20EEDanfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia: Point-Based Trust: Define How Much Privacy Is Worth. ICICS 2006: 190-209
19EEKeith B. Frikken, Jiangtao Li, Mikhail J. Atallah: Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles. NDSS 2006
18EEMikhail J. Atallah, Marina Blanton, Keith B. Frikken: Key management for non-tree access hierarchies. SACMAT 2006: 11-18
17EEKeith B. Frikken, Philippe Golle: Private social network analysis: how to assemble pieces of a graph privately. WPES 2006: 89-98
16EEKeith B. Frikken, Mikhail J. Atallah, Jiangtao Li: Attribute-Based Access Control with Hidden Policies and Hidden Credentials. IEEE Trans. Computers 55(10): 1259-1270 (2006)
2005
15EEMikhail J. Atallah, Keith B. Frikken, Marina Blanton: Dynamic and efficient key management for access hierarchies. ACM Conference on Computer and Communications Security 2005: 190-202
14EEKeith B. Frikken, Mikhail J. Atallah, Chen Zhang: Privacy-preserving credit checking. ACM Conference on Electronic Commerce 2005: 147-154
13EEKeith B. Frikken, Mikhail J. Atallah, Marina Bykova: Remote Revocation of Smart Cards in a Private DRM System. ACSW Frontiers 2005: 169-178
12EEKeith B. Frikken, Mikhail J. Atallah: Achieving Fairness in Private Contract Negotiation. Financial Cryptography 2005: 270-284
11EEMikhail J. Atallah, Keith B. Frikken, Michael T. Goodrich, Roberto Tamassia: Secure Biometric Authentication for Weak Computational Devices. Financial Cryptography 2005: 357-371
10EEKeith B. Frikken: Optimal Distributed Declustering Using Replication. ICDT 2005: 144-157
2004
9EEMikhail J. Atallah, Keith B. Frikken: Privacy-Preserving Location-Dependent Query Processing. ICPS 2004: 9-17
8EEMikhail J. Atallah, Marina Bykova, Jiangtao Li, Keith B. Frikken, Mercan Topkara: Private collaborative forecasting and benchmarking. WPES 2004: 103-114
7EEKeith B. Frikken, Mikhail J. Atallah, Jiangtao Li: Hidden access control policies with hidden credentials. WPES 2004: 27
6EEKeith B. Frikken, Mikhail J. Atallah: Privacy preserving route planning. WPES 2004: 8-15
5EEMikhail J. Atallah, Sunil Prabhakar, Keith B. Frikken, Radu Sion: Digital Rights Protection. IEEE Data Eng. Bull. 27(1): 19-25 (2004)
2003
4EEMikhail J. Atallah, Keith B. Frikken: Replicated Parallel I/O without Additional Scheduling Costs. DEXA 2003: 223-232
3EEKeith B. Frikken, Mikhail J. Atallah: Cropping-Resilient Segmented Multiple Watermarking. WADS 2003: 231-242
2EEKeith B. Frikken, Mikhail J. Atallah: Privacy preserving electronic surveillance. WPES 2003: 45-52
2002
1EEKeith B. Frikken, Mikhail J. Atallah, Sunil Prabhakar, Reihaneh Safavi-Naini: Optimal Parallel I/O for Range Queries through Replication. DEXA 2002: 669-678

Coauthor Index

1Mikhail J. Atallah [1] [2] [3] [4] [5] [6] [7] [8] [9] [11] [12] [13] [14] [15] [16] [18] [19] [20] [21] [22] [23] [25] [29] [30]
2Marina Blanton (Marina Bykova) [8] [13] [15] [18] [21] [22] [23] [29] [30]
3YounSun Cho [29]
4Joseph A. Dougherty IV [27]
5Nelly Fazio [30]
6Philippe Golle [17]
7Michael T. Goodrich [11]
8Jiangtao Li [7] [8] [16] [19] [21]
9Lukasz Opyrchal [28]
10Sunil Prabhakar [1] [5]
11Reihaneh Safavi-Naini [1]
12Radu Sion [5]
13Roberto Tamassia [11] [20] [25]
14Mercan Topkara (Mercan Karahan) [8]
15Danfeng Yao (Danfeng (Daphne) Yao) [20] [25]
16Chen Zhang [14]
17Yihua Zhang [26]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)