Search

Your search keyword '"Mikhail J. Atallah"' showing total 152 results

Search Constraints

Start Over You searched for: Author "Mikhail J. Atallah" Remove constraint Author: "Mikhail J. Atallah" Topic computer science Remove constraint Topic: computer science
152 results on '"Mikhail J. Atallah"'

Search Results

1. Secure two-party input-size reduction: Challenges, solutions and applications

2. Securing Aggregate Queries for DNA Databases

3. Efficient and secure pattern matching with wildcards using lightweight cryptography

4. Extraction and Analysis of Spatial Correlation Micrograph Features for Traceability in Manufacturing

5. sFEA: A Secure Finite Element Analysis Technique

6. Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords

7. sFEA: A Lightweight, Scalable, and Secure Finite Element Analysis Technique

8. Optical PUF Design for Anti-Counterfeiting in Manufacturing of Metallic Goods

9. Security in Cyber-Enabled Design and Manufacturing: A Survey

10. Secure Codesign: Achieving Optimality Without Revealing

11. Similarity Group-by Operators for Multi-Dimensional Relational Data

12. Security and privacy risks in electronic communications: A user's assessment

13. Secure Collaboration in Engineering Systems Design

14. Erratum to: Privacy Enhancing Technologies

15. Efficient and Practical Approach for Private Record Linkage

16. On the Complexity of Authorization in RBAC under Qualification and Security Constraints

17. Genuinity Signatures: Designing Signatures for Verifying 3D Object Genuinity

18. Dynamic and Efficient Key Management for Access Hierarchies

19. Private Information

20. ErsatzPasswords

21. Security-Aware Business Process as a Service by hiding provenance

22. Attribute-Based Access Control with Hidden Policies and Hidden Credentials

23. An empirical study of automatic event reconstruction systems

24. Succinct representation of flexible and privacy-preserving access rights

25. Rights protection for discrete numeric streams

26. A tree-based forward digest protocol to verify data integrity in distributed media streaming

27. Rights protection for categorical data

28. Secure outsourcing of sequence comparisons

29. Enhancing Passwords Security Using Deceptive Covert Communication

30. Secure Collaboration in Engineering Systems Design

31. On estimating the large entries of a convolution

32. Algorithms for variable length subnet address assignment

33. Techniques for Secure and Reliable Computational Outsourcing

34. Secure and Private Outsourcing of Shape-Based Feature Extraction

35. Back Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication

36. Optimal parallel hypercube algorithms for polygon problems

37. Efficient relaxed search in hierarchically clustered sequence datasets

38. Privacy-Preserving Business Process Outsourcing

39. Leakage-free redactable signatures

40. Secure and Efficient Outsourcing of Sequence Comparisons

41. Parallel algorithms for evaluating sequences of set-manipulation operations

42. A Block-Based Mode Selection Model for SIMD/SPMD Parallel Environments

43. Multisearch Techniques: Parallel Data Structures on Mesh-Connected Computers

44. Secure Authenticated Comparisons

45. A faster parallel algorithm for a matrix searching problem

46. Securely outsourcing linear algebra computations

47. Identifying Interesting Instances for Probabilistic Skylines

48. Computational Geometry for Uncertain Data

49. Models and algorithms for coscheduling compute-intensive taks on a network of workstations

Catalog

Books, media, physical & digital resources