Name
Affiliation
Papers
MIKHAIL J. ATALLAH
Department of Computer Science, Purdue University, United States
214
Collaborators
Citations 
PageRank 
194
3828
340.54
Referers 
Referees 
References 
5804
2973
2748
Search Limit
1001000
Title
Citations
PageRank
Year
Extraction and Analysis of Spatial Correlation Micrograph Features for Traceability in Manufacturing.00.342020
Strategic information revelation in collaborative design.20.362018
Secure Collaboration in Engineering Systems Design.00.342017
On approximate pattern matching with thresholds.20.352017
Security and privacy risks in electronic communications: A user's assessment00.342017
Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords.00.342016
A Scheme for Collaboratively Processing Nearest Neighbor Queries in Oblivious Storage.00.342014
Secure and Private Outsourcing of Shape-Based Feature Extraction90.522013
Anonyfrag: an anonymization-based approach for privacy-preserving BPaaS90.612012
Secure and Efficient Outsourcing of Sequence Comparisons.311.132012
Privacy-Preserving Business Process Outsourcing50.442012
Efficient and Practical Approach for Private Record Linkage50.412012
Guest Editors' Introduction: Software Protection221.052011
Pattern matching in the Hamming distance with thresholds20.412011
Asymptotically efficient algorithms for skyline probabilities of uncertain data180.702011
Data structures for range minimum queries in multidimensional arrays321.372010
Duress detection for authentication attacks against multiple administrators10.422010
Privacy Enhancing Technologies, 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings152.532010
Computing all skyline probabilities for uncertain data551.202009
Dynamic and efficient key management for access hierarchies1646.822009
Translation-based steganography131.102009
Efficient Private Record Linkage220.972009
Efficient Distributed Third-Party Data Authentication for Tree Hierarchies40.432008
Internet addiction: Meta-synthesis of qualitative research for the decade 1996-2006321.642008
Private combinatorial group testing30.392008
A tree-covering problem arising in integrity of tree-structured data10.362008
Incentives and Perceptions of Information Security Risks.70.592008
Discrepancy-sensitive dynamic fractional cascading, dominated maxima searching, and 2-D nearest neighbors in any minkowski metric00.342007
The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions361.802006
Point-based trust: define how much privacy is worth160.692006
Lost in just the translation311.392006
Key management for non-tree access hierarchies200.832006
Remote Revocation of Smart Cards in a Private DRM System10.422005
Privacy-preserving credit checking120.812005
Indexing information for data forensics391.722005
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming100.562005
A survey of watermarking techniques for non-media digital objects (invited talk)00.342005
Rights Protection for Categorical Data191.162005
Digital Rights Protection10.352004
Augmenting Lz-77 With Authentication And Integrity Assurance Capabilities20.422004
Succinct specifications of portable document access policies40.442004
Detection of Significant Sets of Episodes in Event Sequences353.372004
Attacking digital watermarks00.342004
Privacy-Preserving Location-Dependent Query Processing110.942004
Privacy preserving electronic surveillance70.752003
Adaptive data structures for IP lookups80.492003
Secure Supply-Chain Protocols.362.552003
Cropping-Resilient Segmented Multiple Watermarking30.432003
Secure and private sequence comparisons1034.772003
On-the-fly Intrusion Detection for Web Portals30.632003
  • 1
  • 2