Marina Blanton
Marina Blanton
Verified email at buffalo.edu
TitleCited byYear
Algorithms and theory of computation handbook
MJ Atallah, M Blanton
CRC press, 2009
584*2009
Internet addiction: Metasynthesis of 1996–2006 quantitative research
S Byun, C Ruffini, JE Mills, AC Douglas, M Niang, S Stepchenkova, ...
CyberPsychology & Behavior 12 (2), 203-207, 2009
5392009
Dynamic and efficient key management for access hierarchies
MJ Atallah, M Blanton, N Fazio, KB Frikken
ACM Transactions on Information and System Security (TISSEC) 12 (3), 43, 2009
5002009
Dynamic and efficient key management for access hierarchies
MJ Atallah, KB Frikken, M Blanton
ACM Conference on Computer and Communications Security (CCS), 190-201, 2005
500*2005
Internet addiction: Meta-synthesis of qualitative research for the decade 1996–2006
AC Douglas, JE Mills, M Niang, S Stepchenkova, S Byun, C Ruffini, ...
Computers in human behavior 24 (6), 3027-3044, 2008
4012008
Secure and efficient protocols for iris and fingerprint identification
M Blanton, P Gasti
European Symposium on Research in Computer Security (ESORICS), 190-209, 2011
1682011
Private collaborative forecasting and benchmarking
M Atallah, M Bykova, J Li, K Frikken, M Topkara
ACM Workshop on Privacy in the Electronic Society (WPES), 103-114, 2004
1512004
Secret handshakes with dynamic and fuzzy matching
G Ateniese, M Blanton, J Kirsch
Network and Distributed System Security Symposium (NDSS), 159-177, 2007
1232007
Secure outsourcing of DNA searching via finite automata
M Blanton, M Aliasgari
Data and Applications Security and Privacy XXIV, 49-64, 2010
1012010
PICCO: a general-purpose compiler for private distributed computation
Y Zhang, A Steele, M Blanton
ACM SIGSAC Conference on Computer & Communications Security (CCS), 813-826, 2013
852013
Data-oblivious graph algorithms for secure computation and outsourcing
M Blanton, A Steele, M Alisagari
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
782013
Detecting network intrusions via a statistical analysis of network packet characteristics
M Bykova, S Ostermann, B Tjaden
Proceedings of the 33rd Southeastern Symposium on System Theory, 309-314, 2001
782001
Secure Computation on Floating Point Numbers.
M Aliasgari, M Blanton, Y Zhang, A Steele
NDSS, 2013
752013
Secure and Efficient Outsourcing of Sequence Comparisons
M Blanton, M Atallah, K Frikken, Q Malluhi
European Symposium on Research in Computer Security (ESORICS), 505-522, 2012
702012
Robust authentication using physically unclonable functions
KB Frikken, M Blanton, MJ Atallah
Information Security Conference (ISC), 262-277, 2009
692009
Reliable medical recommendation systems with patient privacy
TR Hoens, M Blanton, NV Chawla
Proceedings of the 1st ACM International Health Informatics Symposium (IHI …, 2010
572010
Efficient dynamic provable possession of remote data via balanced update trees
Y Zhang, M Blanton
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
482013
Incorporating temporal capabilities in existing key management schemes
M Atallah, M Blanton, K Frikken
European Symposium on Research in Computer Security (ESORICS), 515-530, 2007
472007
Private and Oblivious Set and Multiset Operations
M Blanton, E Aguiar
ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2012
44*2012
Analysis of Reusability of Secure Sketches and Fuzzy Extractors
M Blanton, M Aliasgari
IEEE Transactions on Information Forensics and Security 8 (9), 1433-1445, 2013
432013
The system can't perform the operation now. Try again later.
Articles 1–20