Mikhail Atallah
Mikhail Atallah
Distinguished Professor of Computer Science
Verified email at cs.purdue.edu - Homepage
TitleCited byYear
Algorithms and Theory of Computation Handbook, Volume 1: General Concepts and Techniques
M Atallah, M Blanton
CRC press, 2009
605*2009
Algorithms and theory of computation handbook
MJ Atallah
CRC press, 1998
6041998
Internet addiction: Metasynthesis of 1996–2006 quantitative research
S Byun, C Ruffini, JE Mills, AC Douglas, M Niang, S Stepchenkova, ...
CyberPsychology & Behavior 12 (2), 203-207, 2009
5752009
Disclosure limitation of sensitive rules
M Atallah, E Bertino, A Elmagarmid, M Ibrahim, V Verykios
Workshop on Knowledge and Data Engineering Exchange, 45-52, 1999
5451999
Secure multi-party computation problems and their applications: a review and open problems
W Du, MJ Atallah
Proceedings of the 2001 workshop on New security paradigms, 13-22, 2001
5392001
Dynamic and efficient key management for access hierarchies
MJ Atallah, M Blanton, N Fazio, KB Frikken
ACM Transactions on Information and System Security (TISSEC) 12 (3), 1-43, 2009
5292009
Internet addiction: Meta-synthesis of qualitative research for the decade 1996–2006
AC Douglas, JE Mills, M Niang, S Stepchenkova, S Byun, C Ruffini, ...
Computers in human behavior 24 (6), 3027-3044, 2008
4322008
Rights protection for relational data
R Sion, M Atallah, S Prabhakar
IEEE transactions on knowledge and data engineering 16 (12), 1509-1525, 2004
4312004
Secure multi-party computational geometry
MJ Atallah, W Du
Workshop on Algorithms and Data Structures, 165-179, 2001
3802001
Privacy-preserving cooperative statistical analysis
W Du, MJ Atallah
Seventeenth Annual Computer Security Applications Conference, 102-110, 2001
3562001
Protecting software code by guards
H Chang, MJ Atallah
ACM Workshop on Digital Rights Management, 160-175, 2001
3322001
Securely outsourcing linear algebra computations
MJ Atallah, KB Frikken
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
3032010
Secure outsourcing of scientific computations.
MJ Atallah, KN Pantazopoulos, JR Rice, EH Spafford
Advances in Computers 54 (6), 215-272, 2001
3032001
Dynamic computational geometry
MJ Atallah
24th Annual Symposium on Foundations of Computer Science (sfcs 1983), 92-99, 1983
2941983
On symmetry detection
MJ Atallah
IEEE Transactions on Computers, 663-666, 1985
2831985
Cascading divide-and-conquer: A technique for designing parallel algorithms
MJ Atallah, R Cole, MT Goodrich
SIAM Journal on Computing 18 (3), 499-532, 1989
2751989
Natural language watermarking: Design, analysis, and a proof-of-concept implementation
MJ Atallah, V Raskin, M Crogan, C Hempelmann, F Kerschbaum, ...
International Workshop on Information Hiding, 185-200, 2001
2692001
Natural language watermarking and tamperproofing
MJ Atallah, V Raskin, CF Hempelmann, M Karahan, R Sion, U Topkara, ...
International workshop on information hiding, 196-212, 2002
2532002
Privacy-preserving cooperative scientific computations
W Du, MJ Atallah
csfw, 0273, 2001
2412001
Efficient parallel algorithms for string editing and related problems
A Apostolico, MJ Atallah, LL Larmore, S McFaddin
SIAM Journal on Computing 19 (5), 968-988, 1990
2131990
The system can't perform the operation now. Try again later.
Articles 1–20