Theo dõi
Mikhail Atallah
Mikhail Atallah
Distinguished Professor of Computer Science
Email được xác minh tại cs.purdue.edu - Trang chủ
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
Internet addiction: Metasynthesis of 1996–2006 quantitative research
S Byun, C Ruffini, JE Mills, AC Douglas, M Niang, S Stepchenkova, ...
Cyberpsychology & behavior 12 (2), 203-207, 2009
8112009
Secure multi-party computation problems and their applications: a review and open problems
W Du, MJ Atallah
Proceedings of the 2001 workshop on New security paradigms, 13-22, 2001
7422001
Algorithms and Theory of Computation Handbook, Volume 1: General Concepts and Techniques
MJ Atallah, M Blanton
Chapman & Hall/CRC, 2017
688*2017
Internet addiction: Meta-synthesis of qualitative research for the decade 1996–2006
AC Douglas, JE Mills, M Niang, S Stepchenkova, S Byun, C Ruffini, ...
Computers in human behavior 24 (6), 3027-3044, 2008
6882008
Algorithms and Theory of Computation Handbook, Volume 1: General Concepts and Techniques
M Atallah, M Blanton
CRC press, 2009
686*2009
Disclosure limitation of sensitive rules
M Atallah, E Bertino, A Elmagarmid, M Ibrahim, V Verykios
Workshop on Knowledge and Data Engineering Exchange, 45-52, 1999
6461999
Dynamic and efficient key management for access hierarchies
MJ Atallah, M Blanton, N Fazio, KB Frikken
ACM Transactions on Information and System Security (TISSEC) 12 (3), 1-43, 2009
6422009
Rights protection for relational data
R Sion, M Atallah, S Prabhakar
Proceedings of the 2003 ACM SIGMOD international conference on Management of …, 2003
4892003
Privacy-preserving cooperative statistical analysis
W Du, MJ Atallah
Seventeenth Annual Computer Security Applications Conference, 102-110, 2001
4152001
Natural language watermarking: Design, analysis, and a proof-of-concept implementation
MJ Atallah, V Raskin, M Crogan, C Hempelmann, F Kerschbaum, ...
Information Hiding: 4th International Workshop, IH 2001 Pittsburgh, PA, USA …, 2001
3882001
Securely outsourcing linear algebra computations
MJ Atallah, KB Frikken
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
3872010
Secure outsourcing of scientific computations
MJ Atallah, KN Pantazopoulos, JR Rice, EE Spafford
Advances in computers 54, 215-272, 2002
3872002
Secure multi-party computational geometry
MJ Atallah, W Du
Workshop on algorithms and data structures, 165-179, 2001
3852001
Protecting software code by guards
H Chang, MJ Atallah
ACM Workshop on Digital Rights Management, 160-175, 2001
3822001
Cascading divide-and-conquer: A technique for designing parallel algorithms
MJ Atallah, R Cole, MT Goodrich
SIAM Journal on Computing 18 (3), 499-532, 1989
3231989
On symmetry detection
Atallah
IEEE Transactions on Computers 100 (7), 663-666, 1985
3061985
Natural language watermarking and tamperproofing
MJ Atallah, V Raskin, CF Hempelmann, M Karahan, R Sion, U Topkara, ...
International workshop on information hiding, 196-212, 2002
2992002
Privacy-Preserving Cooperative Scientific Computations.
W Du, MJ Atallah
csfw 1, 273, 2001
2922001
Scheduling Algorithms". Algorithms and Theory of Computation Handbook
D Karger, C Stein, J Wein
CRC Press, 1998
271*1998
Private and cheating-free outsourcing of algebraic computations
D Benjamin, MJ Atallah
2008 Sixth Annual Conference on Privacy, Security and Trust, 240-245, 2008
2652008
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20