Year |
Citation |
Score |
2019 |
Nassar M, Malluhi Q, Atallah M, Shikfa A. Securing Aggregate Queries for DNA Databases Ieee Transactions On Cloud Computing. 7: 827-837. DOI: 10.1109/Tcc.2017.2682860 |
0.374 |
|
2018 |
Darivandpour J, Atallah MJ. Efficient and secure pattern matching with wildcards using lightweight cryptography Computers & Security. 77: 666-674. DOI: 10.1016/J.Cose.2018.01.004 |
0.374 |
|
2017 |
Zhang P, Atallah MJ. On approximate pattern matching with thresholds Information Processing Letters. 123: 21-26. DOI: 10.1016/J.Ipl.2017.03.001 |
0.346 |
|
2016 |
Bentounsi M, Benbernou S, Atallah MJ. Security-aware Business Process as a Service by hiding provenance Computer Standards and Interfaces. 44: 220-233. DOI: 10.1016/J.Csi.2015.08.011 |
0.319 |
|
2014 |
Wang S, Bhandari S, Atallah M, Panchal JH, Ramani K. Secure Collaboration in Engineering Systems Design Journal of Computing and Information Science in Engineering. 17: 41010. DOI: 10.1115/Detc2014-34978 |
0.505 |
|
2012 |
Yakout M, Atallah MJ, Elmagarmid A. Efficient and Practical Approach for Private Record Linkage Journal of Data and Information Quality. 3: 5. DOI: 10.1145/2287714.2287715 |
0.347 |
|
2012 |
Blanton M, Atallah MJ, Frikken KB, Malluhi Q. Secure and efficient outsourcing of sequence comparisons Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 505-522. DOI: 10.1007/978-3-642-33167-1_29 |
0.71 |
|
2012 |
Atallah MJ, Frikken KB, Wang S. Private outsourcing of matrix multiplication over closed semi-rings Secrypt 2012 - Proceedings of the International Conference On Security and Cryptography. 136-144. |
0.643 |
|
2011 |
Atallah MJ, Qi Y, Yuan H. Asymptotically efficient algorithms for skyline probabilities of uncertain data Acm Transactions On Database Systems. 36. DOI: 10.1145/1966385.1966390 |
0.322 |
|
2011 |
Deshpande V, Schwarz LB, Atallah MJ, Blanton M, Frikken KB. Outsourcing manufacturing: Secure price-masking mechanisms for purchasing component parts Production and Operations Management. 20: 165-180. DOI: 10.1111/J.1937-5956.2010.01188.X |
0.737 |
|
2011 |
Sun Y, Wang Q, Li N, Bertino E, Atallah MJ. On the Complexity of Authorization in RBAC under Qualification and Security Constraints Ieee Transactions On Dependable and Secure Computing. 8: 883-897. DOI: 10.1109/Tdsc.2010.55 |
0.353 |
|
2011 |
Atallah MJ, Duket TW. Pattern matching in the Hamming distance with thresholds Information Processing Letters. 111: 674-677. DOI: 10.1016/J.Ipl.2011.04.004 |
0.3 |
|
2011 |
Frikken KB, Yuan H, Atallah MJ. Secure authenticated comparisons Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6715: 514-531. DOI: 10.1007/978-3-642-21554-4_30 |
0.711 |
|
2010 |
Atallah MJ, Frikken KB. Securely outsourcing linear algebra computations Proceedings of the 5th International Symposium On Information, Computer and Communications Security, Asiaccs 2010. 48-59. DOI: 10.1145/1755688.1755695 |
0.718 |
|
2009 |
Byun S, Ruffini C, Mills JE, Douglas AC, Niang M, Stepchenkova S, Lee SK, Loutfi J, Lee JK, Atallah M, Blanton M. Internet addiction: metasynthesis of 1996-2006 quantitative research. Cyberpsychology & Behavior : the Impact of the Internet, Multimedia and Virtual Reality On Behavior and Society. 12: 203-7. PMID 19072075 DOI: 10.1089/Cpb.2008.0102 |
0.735 |
|
2009 |
Grothoff C, Grothoff K, Stutsman R, Alkhutova L, Atallah M. Translation-based steganography Journal of Computer Security. 17: 269-303. DOI: 10.3233/Jcs-2009-0320 |
0.344 |
|
2009 |
Atallah MJ, Blanton M, Fazio N, Frikken KB. Dynamic and efficient key management for access hierarchies Acm Transactions On Information and System Security. 12. DOI: 10.1145/1455526.1455531 |
0.762 |
|
2009 |
Frikken KB, Blanton M, Atallah MJ. Robust authentication using physically unclonable functions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5735: 262-277. DOI: 10.1007/978-3-642-04474-8_22 |
0.702 |
|
2008 |
Yao D, Frikken KB, Atallah MJ, Tamassia R. Private information: To reveal or not to reveal Acm Transactions On Information and System Security. 12. DOI: 10.1145/1410234.1410240 |
0.724 |
|
2008 |
Atallah MJ, Frikken KB, Blanton M, Cho Y. Private combinatorial group testing Proceedings of the 2008 Acm Symposium On Information, Computer and Communications Security, Asiaccs '08. 312-320. DOI: 10.1145/1368310.1368355 |
0.637 |
|
2008 |
Douglas AC, Mills JE, Niang M, Stepchenkova S, Byun S, Ruffini C, Lee SK, Loutfi J, Lee JK, Atallah M, Blanton M. Internet addiction: Meta-synthesis of qualitative research for the decade 1996-2006 Computers in Human Behavior. 24: 3027-3044. DOI: 10.1016/J.Chb.2008.05.009 |
0.749 |
|
2007 |
Topkara U, Atallah MJ, Topkara M. Passwords decay, words endure: Secure and re-usable multiple password mnemonics Proceedings of the Acm Symposium On Applied Computing. 292-299. DOI: 10.1145/1244002.1244072 |
0.744 |
|
2007 |
Atallah MJ, Blanton M, Frikken KB. Efficient techniques for realizing geo-spatial access control Proceedings of the 2nd Acm Symposium On Information, Computer and Communications Security, Asiaccs '07. 82-92. DOI: 10.1145/1229285.1229301 |
0.714 |
|
2007 |
Topkara M, Topkara U, Atallah MJ. Information hiding through errors: A confusing approach Proceedings of Spie - the International Society For Optical Engineering. 6505. |
0.679 |
|
2007 |
Atallah MJ, Blanton M, Frikken KB. Incorporating temporal capabilities in existing key management schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4734: 515-530. |
0.72 |
|
2006 |
Topkara M, Topkara U, Atallah MJ. Words are not enough: Sentence level natural language watermarking Proceedings of the Acm International Multimedia Conference and Exhibition. 37-46. DOI: 10.1145/1178766.1178777 |
0.687 |
|
2006 |
Sion R, Atallah M, Prabhakar S. Rights protection for discrete numeric streams Ieee Transactions On Knowledge and Data Engineering. 18: 699-714. DOI: 10.1109/Tkde.2006.82 |
0.337 |
|
2006 |
Frikken K, Atallah M, Li J. Attribute-Based Access Control with Hidden Policies and Hidden Credentials Ieee Transactions On Computers. 55: 1259-1270. DOI: 10.1109/Tc.2006.158 |
0.703 |
|
2006 |
Jeyaraman S, Atallah MJ. An empirical study of automatic event reconstruction systems Digital Investigation. 3: 108-115. DOI: 10.1016/J.Diin.2006.06.013 |
0.739 |
|
2006 |
Atallah MJ, Blanton M, Frikken KB. Key management for non-tree access hierarchies Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 2006: 11-18. |
0.661 |
|
2006 |
Topkara U, Topkara M, Atallah MJ. The hiding virtues of ambiguity: Quantifiably resilient watermarking of natural language text through synonym substitutions Proceedings of the Multimedia and Security Workshop 2006, Mm and Sec'06. 2006: 164-174. |
0.697 |
|
2006 |
Atallah MJ, Blanton M, Frikken KB, Li J. Efficient correlated action selection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4107: 296-310. |
0.689 |
|
2005 |
Ioannidis I, Grama A, Atallah M. Adaptive data structures for IP lookups Acm Journal of Experimental Algorithms. 10. DOI: 10.1145/1064546.1064548 |
0.314 |
|
2005 |
Sion R, Atallah M, Prabhakar S. Rights protection for categorical data Ieee Transactions On Knowledge and Data Engineering. 17: 912-926. DOI: 10.1109/Tkde.2005.116 |
0.301 |
|
2005 |
Habib A, Xu D, Atallah M, Bhargava B, Chuang J. A tree-based forward digest protocol to verify data integrity in distributed media streaming Ieee Transactions On Knowledge and Data Engineering. 17: 1010-1014. DOI: 10.1109/Tkde.2005.102 |
0.317 |
|
2005 |
Atallah MJ, Li J. Secure outsourcing of sequence comparisons International Journal of Information Security. 4: 277-287. DOI: 10.1007/S10207-005-0070-3 |
0.353 |
|
2005 |
Gwadera R, Atallah MJ, Szpankowski W. Reliable detection of episodes in event sequences Knowledge and Information Systems. 7: 415-437. DOI: 10.1007/s10115-004-0174-5 |
0.718 |
|
2005 |
Atallah MJ, Frikken KB, Goodrich MT, Tamassia R. Secure biometric authentication for weak computational devices Lecture Notes in Computer Science. 3570: 357-371. |
0.684 |
|
2005 |
Gwadera R, Atallah M, Szpankowski W. Markov models for identification of significant episodes Proceedings of the 2005 Siam International Conference On Data Mining, Sdm 2005. 404-414. |
0.717 |
|
2004 |
Sion R, Atallah M, Prabhakar S. Rights protection for relational data Ieee Transactions On Knowledge and Data Engineering. 16: 1509-1525. DOI: 10.1109/Tkde.2004.94 |
0.318 |
|
2004 |
Atallah M, Gwadera R, Szpankowski W. Detection of significant sets of episodes in event sequences Proceedings - Fourth Ieee International Conference On Data Mining, Icdm 2004. 3-10. DOI: 10.1109/ICDM.2004.10090 |
0.695 |
|
2004 |
Kerschbaum F, Atallah MJ, M'Raïhi D, Rice JR. Private fingerprint verification without local storage Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3072: 387-394. DOI: 10.1007/978-3-540-25948-0_54 |
0.334 |
|
2004 |
Atallah MJ, Lonardi S. Augmenting LZ-77 with authentication and integrity assurance capabilities: Research Articles Concurrency and Computation: Practice and Experience. 16: 1063-1076. DOI: 10.1002/Cpe.V16:11 |
0.34 |
|
2004 |
Atallah MJ, Lonardi S. Augmenting LZ-77 with authentication and integrity assurance capabilities Concurrency Computation Practice and Experience. 16: 1063-1076. DOI: 10.1002/Cpe.804 |
0.351 |
|
2004 |
Topkara M, Topkara U, Atallah MJ, Taskiran C, Lin E, Delp EJ. A hierarchical protocol for increasing the stealthiness of steganographic methods Proceedings of the Multimedia and Security Workshop 2004, Mm and Sec'04. 16-24. |
0.722 |
|
2004 |
Frikken KB, Atallah MJ. Privacy preserving route planning Wpes'04: Proceedings of the 2004 Acm Workshop On Privacy in the Electronic Society. 8-15. |
0.695 |
|
2004 |
Atallah MJ, Frikken KB. Privacy-preserving location-dependent query processing Proceedings - the Ieee/Acs International Conference On Pervasive Services, Icps2004. 9-18. |
0.675 |
|
2003 |
Atallah MJ, Prabhakar S. (Almost) Optimal parallel block access for range queries Information Sciences. 157: 21-31. DOI: 10.1016/S0020-0255(03)00181-6 |
0.325 |
|
2003 |
Frikken KB, Atallah MJ. Privacy Preserving Electronic Surveillance Proceedings of the Acm Workshop On Privacy in the Electronic Society. 45-52. |
0.685 |
|
2003 |
Atallah MJ, Raskin V, Hempelmann CF, Karahan M, Sion R, Topkara U, Triezenberg KE. Natural language watermarking and tamperproofing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2578: 196-212. |
0.689 |
|
2002 |
Atallah MJ, Pantazopoulos KN, Rice JR, Spafford EE. Secure outsourcing of scientific computations Advances in Computers. 54: 215-272. DOI: 10.1016/S0065-2458(01)80019-X |
0.339 |
|
2001 |
Atallah MJ, Chen DZ. On connecting red and blue rectilinear polygonal obstacles with nonintersecting monotone rectilinear paths International Journal of Computational Geometry and Applications. 11: 373-400. DOI: 10.1142/S0218195901000547 |
0.311 |
|
2001 |
Atallah MJ, Chyzak F, Dumas P. A randomized algorithm for approximate string matching Algorithmica (New York). 29: 468-486. DOI: 10.1007/S004530010062 |
0.3 |
|
2000 |
Andrews MG, Atallah MJ, Chen DZ, Lee DT. Parallel algorithms for maximum matching in complements of interval graphs and related problems Algorithmica (New York). 26: 263-289. DOI: 10.1007/S004539910013 |
0.308 |
|
1999 |
Atallah MJ. An improved hypercube bound for multisearching and its applications International Journal of Computational Geometry and Applications. 9: 29-38. DOI: 10.1142/S0218195999000030 |
0.316 |
|
1999 |
Atallah MJ. Parallel algorithms for longest increasing chains in the plane and related problems Parallel Processing Letters. 9: 511-520. DOI: 10.1142/S0129626499000475 |
0.327 |
|
1999 |
Atallah MJ, Wagstaff SS. Watermarking with quadratic residues Electronic Imaging. 3657: 283-288. DOI: 10.1117/12.344677 |
0.301 |
|
1998 |
Atallah MJ, Comer DE. Algorithms for variable length subnet address assignment Ieee Transactions On Computers. 47: 693-699. DOI: 10.1109/12.689648 |
0.303 |
|
1996 |
Atallah MJ, Fabri A. On the multisearching problem for hypercubes Computational Geometry: Theory and Applications. 5: 293-302. DOI: 10.1016/0925-7721(94)00023-9 |
0.332 |
|
1995 |
ATALLAH MJ, CHEN DZ. COMPUTING THE ALL-PAIRS LONGEST CHAINS IN THE PLANE International Journal of Computational Geometry & Applications. 5: 257-271. DOI: 10.1142/S0218195995000155 |
0.321 |
|
1995 |
Atallah MJ, Chen DZ. Optimal Parallel Hypercube Algorithms for Polygon Problems Ieee Transactions On Computers. 44: 914-922. DOI: 10.1109/12.392849 |
0.318 |
|
1995 |
Atallah MJ, Chen DZ, Lee DT. An optimal algorithm for shortest paths on weighted interval and circular-arc graphs, with applications Algorithmica. 14: 429-441. DOI: 10.1007/Bf01192049 |
0.308 |
|
1994 |
Atallah MJ, Dehne F, Miller R, Rauchaplin A, Tsay JJ. Multisearch Techniques: Parallel Data Structures on Mesh-Connected Computers Journal of Parallel and Distributed Computing. 20: 1-13. DOI: 10.1006/Jpdc.1994.1001 |
0.334 |
|
1993 |
Atallah MJ, Chen DZ. On parallel rectilinear obstacle- avoiding paths Computational Geometry: Theory and Applications. 3: 307-313. DOI: 10.1016/0925-7721(93)90004-P |
0.323 |
|
1993 |
Atallah MJ. A faster parallel algorithm for a matrix searching problem Algorithmica. 9: 156-167. DOI: 10.1007/Bf01188710 |
0.317 |
|
1993 |
Atallah MJ, Jacquet P, Szpankowski W. A probabilistic analysis of a pattern matching problem Random Structures and Algorithms. 4: 191-213. DOI: 10.1002/Rsa.3240040206 |
0.324 |
|
1992 |
Atallah MJ, Lock Black C, Marinescu DC, Jay Siegel H, Casavant TL. Models and algorithms for coscheduling compute-intensive taks on a network of workstations Journal of Parallel and Distributed Computing. 16: 319-327. DOI: 10.1016/0743-7315(92)90015-F |
0.307 |
|
1992 |
Atallah MJ, Rao Kosaraju S. An efficient parallel algorithm for the row minima of a totally monotone matrix Journal of Algorithms. 13: 394-413. DOI: 10.1016/0196-6774(92)90046-F |
0.301 |
|
1991 |
Atallah MJ, Wagener H, Chen DZ. An Optimal Parallel Algorithm for the Visibility of a Simple Polygon from a Point Journal of the Acm (Jacm). 38: 515-532. DOI: 10.1145/116825.116827 |
0.303 |
|
1991 |
Atallah MJ, Chen DZ. Parallel rectilinear shortest paths with rectangular obstacles Computational Geometry: Theory and Applications. 1: 79-113. DOI: 10.1016/0925-7721(91)90002-V |
0.329 |
|
1991 |
Atallah MJ, McFaddin S. Sequence comparison on the connection machine Concurrency and Computation: Practice and Experience. 3: 89-107. DOI: 10.1002/Cpe.4330030203 |
0.303 |
|
1989 |
Atallah MJ, Chen DZ. An optimal parallel algorithm for the minimum circle-cover problem Information Processing Letters. 32: 159-165. DOI: 10.1016/0020-0190(89)90037-9 |
0.301 |
|
1989 |
Atallah MJ, Kosaraju SR. An efficient algorithm for maxdominance, with applications Algorithmica. 4: 221-236. DOI: 10.1007/Bf01553888 |
0.322 |
|
1988 |
Atallah MJ, Manacher GK, Urrutia J. Finding a minimum independent dominating set in a permutation graph Discrete Applied Mathematics. 21: 177-183. DOI: 10.1016/0166-218X(88)90064-9 |
0.301 |
|
1988 |
Atallah MJ, Goodrich MT. Parallel algorithms for some functions of two convex polygons Algorithmica. 3: 535-548. DOI: 10.1007/Bf01762130 |
0.312 |
|
1986 |
Atallah MJ, Hambrusch SE. Solving tree problems on a mesh-connected processor array Information and Control. 69: 168-187. DOI: 10.1016/S0019-9958(86)80046-8 |
0.327 |
|
1986 |
Atallah MJ, Goodrich MT. Efficient parallel solutions to some geometric problems Journal of Parallel and Distributed Computing. 3: 492-507. DOI: 10.1016/0743-7315(86)90011-0 |
0.309 |
|
1986 |
Atallah MJ, Frederickson GN. A note on finding a maximum empty rectangle Discrete Applied Mathematics. 13: 87-91. DOI: 10.1016/0166-218X(86)90071-5 |
0.313 |
|
1986 |
Atallah MJ, Hambrusch SE. An assignment algorithm with applications to integrated circuit layout Discrete Applied Mathematics. 13: 9-22. DOI: 10.1016/0166-218X(86)90064-8 |
0.305 |
|
1984 |
Atallah MJ. Checking similarity of planar figures International Journal of Computer &Amp; Information Sciences. 13: 279-290. DOI: 10.1007/Bf00977833 |
0.302 |
|
Show low-probability matches. |