Marina Blanton
Marina Blanton
Verified email at
Cited by
Cited by
Internet addiction: Metasynthesis of 1996–2006 quantitative research
S Byun, C Ruffini, JE Mills, AC Douglas, M Niang, S Stepchenkova, ...
Cyberpsychology & behavior 12 (2), 203-207, 2009
Algorithms and theory of computation handbook
MJ Atallah, M Blanton
CRC press, 2009
Internet addiction: Meta-synthesis of qualitative research for the decade 1996–2006
AC Douglas, JE Mills, M Niang, S Stepchenkova, S Byun, C Ruffini, ...
Computers in human behavior 24 (6), 3027-3044, 2008
Dynamic and efficient key management for access hierarchies
MJ Atallah, M Blanton, N Fazio, KB Frikken
ACM Transactions on Information and System Security (TISSEC) 12 (3), 43, 2009
Dynamic and efficient key management for access hierarchies
MJ Atallah, KB Frikken, M Blanton
ACM Conference on Computer and Communications Security (CCS), 190-201, 2005
Secure and efficient protocols for iris and fingerprint identification
M Blanton, P Gasti
European Symposium on Research in Computer Security (ESORICS), 190-209, 2011
Private collaborative forecasting and benchmarking
M Atallah, M Bykova, J Li, K Frikken, M Topkara
ACM Workshop on Privacy in the Electronic Society (WPES), 103-114, 2004
Secure computation on floating point numbers
M Aliasgari, M Blanton, Y Zhang, A Steele
Network and Distributed System Security Symposium (NDSS), 2013
Secret handshakes with dynamic and fuzzy matching
G Ateniese, M Blanton, J Kirsch
Network and Distributed System Security Symposium (NDSS), 159-177, 2007
PICCO: a general-purpose compiler for private distributed computation
Y Zhang, A Steele, M Blanton
ACM SIGSAC Conference on Computer & Communications Security (CCS), 813-826, 2013
Practical secure computation outsourcing: A survey
Z Shan, K Ren, M Blanton, C Wang
ACM Computing Surveys (CSUR) 51 (2), 1-40, 2018
Secure outsourcing of DNA searching via finite automata
M Blanton, M Aliasgari
Data and Applications Security and Privacy XXIV, 49-64, 2010
Robust authentication using physically unclonable functions
KB Frikken, M Blanton, MJ Atallah
Information Security Conference (ISC), 262-277, 2009
Data-oblivious graph algorithms for secure computation and outsourcing
M Blanton, A Steele, M Aliasgari
ACM SIGSAC Symposium on Information, Computer and Communications Security …, 2013
Reliable medical recommendation systems with patient privacy
TR Hoens, M Blanton, NV Chawla
Proceedings of the 1st ACM International Health Informatics Symposium (IHI …, 2010
Private and Oblivious Set and Multiset Operations
M Blanton, E Aguiar
ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2012
Secure and Efficient Outsourcing of Sequence Comparisons
M Blanton, M Atallah, K Frikken, Q Malluhi
European Symposium on Research in Computer Security (ESORICS), 505-522, 2012
Detecting network intrusions via a statistical analysis of network packet characteristics
M Bykova, S Ostermann, B Tjaden
Proceedings of the 33rd Southeastern Symposium on System Theory, 309-314, 2001
Analysis of Reusability of Secure Sketches and Fuzzy Extractors
M Blanton, M Aliasgari
IEEE Transactions on Information Forensics and Security 8 (9), 1433-1445, 2013
An overview of issues and recent developments in cloud computing and storage security
E Aguiar, Y Zhang, M Blanton
High Performance Cloud Auditing and Applications, 3-33, 2013
The system can't perform the operation now. Try again later.
Articles 1–20