default search action
Keith B. Frikken
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [j6]Keith B. Frikken, Shumiao Wang, Mikhail J. Atallah:
A Scheme for Collaboratively Processing Nearest Neighbor Queries in Oblivious Storage. EAI Endorsed Trans. Collab. Comput. 1(2): e3 (2014) - 2013
- [j5]Marina Blanton, Yihua Zhang, Keith B. Frikken:
Secure and verifiable outsourcing of large-scale biometric computations. ACM Trans. Inf. Syst. Secur. 16(3): 11 (2013) - 2012
- [c42]Marina Blanton, Mikhail J. Atallah, Keith B. Frikken, Qutaibah M. Malluhi:
Secure and Efficient Outsourcing of Sequence Comparisons. ESORICS 2012: 505-522 - [c41]Mikhail J. Atallah, Keith B. Frikken, Shumiao Wang:
Private Outsourcing of Matrix Multiplication over Closed Semi-rings. SECRYPT 2012: 136-144 - [c40]Keith B. Frikken:
Cryptographic Enforcement of Access Control while Mitigating Key Sharing. SECRYPT 2012: 245-250 - 2011
- [c39]Keith B. Frikken, Hao Yuan, Mikhail J. Atallah:
Secure Authenticated Comparisons. ACNS 2011: 514-531 - [c38]Keith B. Frikken, Boyang Li:
Private Database Search with Sublinear Query Time. DBSec 2011: 154-169 - [c37]Aaron Steele, Keith B. Frikken:
An Index Structure for Private Data Outsourcing. DBSec 2011: 247-254 - [c36]Keith B. Frikken, Kyle Kauffman, Aaron Steele:
General secure sensor aggregation in the presence of malicious nodes. ICDE 2011: 506-516 - [c35]Marina Blanton, Yihua Zhang, Keith B. Frikken:
Secure and Verifiable Outsourcing of Large-Scale Biometric Computations. SocialCom/PASSAT 2011: 1185-1191 - [r2]Keith B. Frikken:
Secure Multiparty Computation (SMC). Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1121-1123 - 2010
- [c34]Mikhail J. Atallah, Keith B. Frikken:
Securely outsourcing linear algebra computations. AsiaCCS 2010: 48-59 - [c33]Marina Blanton, Keith B. Frikken:
Efficient Multi-dimensional Key Management in Broadcast Services. ESORICS 2010: 424-440 - [c32]Keith B. Frikken, Yihua Zhang:
Sum Aggregation in Sensor Networks While Preserving Confidentiality and Integrity. ICETE (Selected Papers) 2010: 172-187 - [c31]Troy Raeder, Marina Blanton, Nitesh V. Chawla, Keith B. Frikken:
Privacy-Preserving Network Aggregation. PAKDD (1) 2010: 198-207 - [c30]Keith B. Frikken, Yihua Zhang:
Confidentiality and Integrity for SUM Aggregation in Sensor Networks. SECRYPT 2010: 231-240 - [e1]Ehab Al-Shaer, Keith B. Frikken:
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, WPES 2010, Chicago, Illinois, USA, October 4, 2010. ACM 2010, ISBN 978-1-4503-0096-4 [contents]
2000 – 2009
- 2009
- [j4]Mikhail J. Atallah, Marina Blanton, Nelly Fazio, Keith B. Frikken:
Dynamic and Efficient Key Management for Access Hierarchies. ACM Trans. Inf. Syst. Secur. 12(3): 18:1-18:43 (2009) - [c29]Keith B. Frikken:
Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation. DBSec 2009: 81-94 - [c28]Keith B. Frikken, Marina Blanton, Mikhail J. Atallah:
Robust Authentication Using Physically Unclonable Functions. ISC 2009: 262-277 - [c27]Keith B. Frikken, Preethi Srinivas:
Key allocation schemes for private social networks. WPES 2009: 11-20 - 2008
- [j3]Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia:
Private Information: To Reveal or not to Reveal. ACM Trans. Inf. Syst. Secur. 12(1): 6:1-6:27 (2008) - [c26]Mikhail J. Atallah, Keith B. Frikken, Marina Blanton, YounSun Cho:
Private combinatorial group testing. AsiaCCS 2008: 312-320 - [c25]Keith B. Frikken, Lukasz Opyrchal:
PBS: Private Bartering Systems. Financial Cryptography 2008: 113-127 - [c24]Keith B. Frikken, Joseph A. Dougherty IV:
An efficient integrity-preserving scheme for hierarchical sensor aggregation. WISEC 2008: 68-76 - [c23]Keith B. Frikken, Yihua Zhang:
Yet another privacy metric for publishing micro-data. WPES 2008: 117-122 - 2007
- [c22]Keith B. Frikken:
Privacy-Preserving Set Union. ACNS 2007: 237-252 - [c21]Mikhail J. Atallah, Marina Blanton, Keith B. Frikken:
Efficient techniques for realizing geo-spatial access control. AsiaCCS 2007: 82-92 - [c20]Mikhail J. Atallah, Marina Blanton, Keith B. Frikken:
Incorporating Temporal Capabilities in Existing Key Management Schemes. ESORICS 2007: 515-530 - [i1]Mikhail J. Atallah, Marina Blanton, Keith B. Frikken:
Incorporating Temporal Capabilities in Existing Key Management Schemes. IACR Cryptol. ePrint Arch. 2007: 245 (2007) - 2006
- [j2]Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li:
Attribute-Based Access Control with Hidden Policies and Hidden Credentials. IEEE Trans. Computers 55(10): 1259-1270 (2006) - [c19]Mikhail J. Atallah, Marina Blanton, Keith B. Frikken, Jiangtao Li:
Efficient Correlated Action Selection. Financial Cryptography 2006: 296-310 - [c18]Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia:
Point-Based Trust: Define How Much Privacy Is Worth. ICICS 2006: 190-209 - [c17]Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah:
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles. NDSS 2006 - [c16]Mikhail J. Atallah, Marina Blanton, Keith B. Frikken:
Key management for non-tree access hierarchies. SACMAT 2006: 11-18 - [c15]Keith B. Frikken, Philippe Golle:
Private social network analysis: how to assemble pieces of a graph privately. WPES 2006: 89-98 - 2005
- [b1]Keith B. Frikken:
Secure and private online collaboration. Purdue University, USA, 2005 - [c14]Keith B. Frikken, Mikhail J. Atallah, Marina Bykova:
Remote Revocation of Smart Cards in a Private DRM System. ACSW 2005: 169-178 - [c13]Mikhail J. Atallah, Keith B. Frikken, Marina Blanton:
Dynamic and efficient key management for access hierarchies. CCS 2005: 190-202 - [c12]Keith B. Frikken, Mikhail J. Atallah:
Achieving Fairness in Private Contract Negotiation. Financial Cryptography 2005: 270-284 - [c11]Mikhail J. Atallah, Keith B. Frikken, Michael T. Goodrich, Roberto Tamassia:
Secure Biometric Authentication for Weak Computational Devices. Financial Cryptography 2005: 357-371 - [c10]Keith B. Frikken:
Optimal Distributed Declustering Using Replication. ICDT 2005: 144-157 - [c9]Keith B. Frikken, Mikhail J. Atallah, Chen Zhang:
Privacy-preserving credit checking. EC 2005: 147-154 - 2004
- [j1]Mikhail J. Atallah, Sunil Prabhakar, Keith B. Frikken, Radu Sion:
Digital Rights Protection. IEEE Data Eng. Bull. 27(1): 19-25 (2004) - [c8]Mikhail J. Atallah, Keith B. Frikken:
Privacy-Preserving Location-Dependent Query Processing. ICPS 2004: 9-17 - [c7]Keith B. Frikken, Mikhail J. Atallah:
Privacy preserving route planning. WPES 2004: 8-15 - [c6]Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li:
Hidden access control policies with hidden credentials. WPES 2004: 27 - [c5]Mikhail J. Atallah, Marina Bykova, Jiangtao Li, Keith B. Frikken, Mercan Topkara:
Private collaborative forecasting and benchmarking. WPES 2004: 103-114 - [r1]Mikhail J. Atallah, Keith B. Frikken, Carrie Black, Susan Overstreet, Pooja Bhatia:
Digital Rights Management. The Practical Handbook of Internet Computing 2004 - 2003
- [c4]Mikhail J. Atallah, Keith B. Frikken:
Replicated Parallel I/O without Additional Scheduling Costs. DEXA 2003: 223-232 - [c3]Keith B. Frikken, Mikhail J. Atallah:
Cropping-Resilient Segmented Multiple Watermarking. WADS 2003: 231-242 - [c2]Keith B. Frikken, Mikhail J. Atallah:
Privacy preserving electronic surveillance. WPES 2003: 45-52 - 2002
- [c1]Keith B. Frikken, Mikhail J. Atallah, Sunil Prabhakar, Reihaneh Safavi-Naini:
Optimal Parallel I/O for Range Queries through Replication. DEXA 2002: 669-678
Coauthor Index
aka: Marina Bykova
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint