Mikhail J. Atallah - Publications

Affiliations: 
Purdue University, West Lafayette, IN, United States 
Area:
Computer Science

80 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Nassar M, Malluhi Q, Atallah M, Shikfa A. Securing Aggregate Queries for DNA Databases Ieee Transactions On Cloud Computing. 7: 827-837. DOI: 10.1109/Tcc.2017.2682860  0.374
2018 Darivandpour J, Atallah MJ. Efficient and secure pattern matching with wildcards using lightweight cryptography Computers & Security. 77: 666-674. DOI: 10.1016/J.Cose.2018.01.004  0.374
2017 Zhang P, Atallah MJ. On approximate pattern matching with thresholds Information Processing Letters. 123: 21-26. DOI: 10.1016/J.Ipl.2017.03.001  0.346
2016 Bentounsi M, Benbernou S, Atallah MJ. Security-aware Business Process as a Service by hiding provenance Computer Standards and Interfaces. 44: 220-233. DOI: 10.1016/J.Csi.2015.08.011  0.319
2014 Wang S, Bhandari S, Atallah M, Panchal JH, Ramani K. Secure Collaboration in Engineering Systems Design Journal of Computing and Information Science in Engineering. 17: 41010. DOI: 10.1115/Detc2014-34978  0.505
2012 Yakout M, Atallah MJ, Elmagarmid A. Efficient and Practical Approach for Private Record Linkage Journal of Data and Information Quality. 3: 5. DOI: 10.1145/2287714.2287715  0.347
2012 Blanton M, Atallah MJ, Frikken KB, Malluhi Q. Secure and efficient outsourcing of sequence comparisons Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 505-522. DOI: 10.1007/978-3-642-33167-1_29  0.71
2012 Atallah MJ, Frikken KB, Wang S. Private outsourcing of matrix multiplication over closed semi-rings Secrypt 2012 - Proceedings of the International Conference On Security and Cryptography. 136-144.  0.643
2011 Atallah MJ, Qi Y, Yuan H. Asymptotically efficient algorithms for skyline probabilities of uncertain data Acm Transactions On Database Systems. 36. DOI: 10.1145/1966385.1966390  0.322
2011 Deshpande V, Schwarz LB, Atallah MJ, Blanton M, Frikken KB. Outsourcing manufacturing: Secure price-masking mechanisms for purchasing component parts Production and Operations Management. 20: 165-180. DOI: 10.1111/J.1937-5956.2010.01188.X  0.737
2011 Sun Y, Wang Q, Li N, Bertino E, Atallah MJ. On the Complexity of Authorization in RBAC under Qualification and Security Constraints Ieee Transactions On Dependable and Secure Computing. 8: 883-897. DOI: 10.1109/Tdsc.2010.55  0.353
2011 Atallah MJ, Duket TW. Pattern matching in the Hamming distance with thresholds Information Processing Letters. 111: 674-677. DOI: 10.1016/J.Ipl.2011.04.004  0.3
2011 Frikken KB, Yuan H, Atallah MJ. Secure authenticated comparisons Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6715: 514-531. DOI: 10.1007/978-3-642-21554-4_30  0.711
2010 Atallah MJ, Frikken KB. Securely outsourcing linear algebra computations Proceedings of the 5th International Symposium On Information, Computer and Communications Security, Asiaccs 2010. 48-59. DOI: 10.1145/1755688.1755695  0.718
2009 Byun S, Ruffini C, Mills JE, Douglas AC, Niang M, Stepchenkova S, Lee SK, Loutfi J, Lee JK, Atallah M, Blanton M. Internet addiction: metasynthesis of 1996-2006 quantitative research. Cyberpsychology & Behavior : the Impact of the Internet, Multimedia and Virtual Reality On Behavior and Society. 12: 203-7. PMID 19072075 DOI: 10.1089/Cpb.2008.0102  0.735
2009 Grothoff C, Grothoff K, Stutsman R, Alkhutova L, Atallah M. Translation-based steganography Journal of Computer Security. 17: 269-303. DOI: 10.3233/Jcs-2009-0320  0.344
2009 Atallah MJ, Blanton M, Fazio N, Frikken KB. Dynamic and efficient key management for access hierarchies Acm Transactions On Information and System Security. 12. DOI: 10.1145/1455526.1455531  0.762
2009 Frikken KB, Blanton M, Atallah MJ. Robust authentication using physically unclonable functions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5735: 262-277. DOI: 10.1007/978-3-642-04474-8_22  0.702
2008 Yao D, Frikken KB, Atallah MJ, Tamassia R. Private information: To reveal or not to reveal Acm Transactions On Information and System Security. 12. DOI: 10.1145/1410234.1410240  0.724
2008 Atallah MJ, Frikken KB, Blanton M, Cho Y. Private combinatorial group testing Proceedings of the 2008 Acm Symposium On Information, Computer and Communications Security, Asiaccs '08. 312-320. DOI: 10.1145/1368310.1368355  0.637
2008 Douglas AC, Mills JE, Niang M, Stepchenkova S, Byun S, Ruffini C, Lee SK, Loutfi J, Lee JK, Atallah M, Blanton M. Internet addiction: Meta-synthesis of qualitative research for the decade 1996-2006 Computers in Human Behavior. 24: 3027-3044. DOI: 10.1016/J.Chb.2008.05.009  0.749
2007 Topkara U, Atallah MJ, Topkara M. Passwords decay, words endure: Secure and re-usable multiple password mnemonics Proceedings of the Acm Symposium On Applied Computing. 292-299. DOI: 10.1145/1244002.1244072  0.744
2007 Atallah MJ, Blanton M, Frikken KB. Efficient techniques for realizing geo-spatial access control Proceedings of the 2nd Acm Symposium On Information, Computer and Communications Security, Asiaccs '07. 82-92. DOI: 10.1145/1229285.1229301  0.714
2007 Topkara M, Topkara U, Atallah MJ. Information hiding through errors: A confusing approach Proceedings of Spie - the International Society For Optical Engineering. 6505.  0.679
2007 Atallah MJ, Blanton M, Frikken KB. Incorporating temporal capabilities in existing key management schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4734: 515-530.  0.72
2006 Topkara M, Topkara U, Atallah MJ. Words are not enough: Sentence level natural language watermarking Proceedings of the Acm International Multimedia Conference and Exhibition. 37-46. DOI: 10.1145/1178766.1178777  0.687
2006 Sion R, Atallah M, Prabhakar S. Rights protection for discrete numeric streams Ieee Transactions On Knowledge and Data Engineering. 18: 699-714. DOI: 10.1109/Tkde.2006.82  0.337
2006 Frikken K, Atallah M, Li J. Attribute-Based Access Control with Hidden Policies and Hidden Credentials Ieee Transactions On Computers. 55: 1259-1270. DOI: 10.1109/Tc.2006.158  0.703
2006 Jeyaraman S, Atallah MJ. An empirical study of automatic event reconstruction systems Digital Investigation. 3: 108-115. DOI: 10.1016/J.Diin.2006.06.013  0.739
2006 Atallah MJ, Blanton M, Frikken KB. Key management for non-tree access hierarchies Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 2006: 11-18.  0.661
2006 Topkara U, Topkara M, Atallah MJ. The hiding virtues of ambiguity: Quantifiably resilient watermarking of natural language text through synonym substitutions Proceedings of the Multimedia and Security Workshop 2006, Mm and Sec'06. 2006: 164-174.  0.697
2006 Atallah MJ, Blanton M, Frikken KB, Li J. Efficient correlated action selection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4107: 296-310.  0.689
2005 Ioannidis I, Grama A, Atallah M. Adaptive data structures for IP lookups Acm Journal of Experimental Algorithms. 10. DOI: 10.1145/1064546.1064548  0.314
2005 Sion R, Atallah M, Prabhakar S. Rights protection for categorical data Ieee Transactions On Knowledge and Data Engineering. 17: 912-926. DOI: 10.1109/Tkde.2005.116  0.301
2005 Habib A, Xu D, Atallah M, Bhargava B, Chuang J. A tree-based forward digest protocol to verify data integrity in distributed media streaming Ieee Transactions On Knowledge and Data Engineering. 17: 1010-1014. DOI: 10.1109/Tkde.2005.102  0.317
2005 Atallah MJ, Li J. Secure outsourcing of sequence comparisons International Journal of Information Security. 4: 277-287. DOI: 10.1007/S10207-005-0070-3  0.353
2005 Gwadera R, Atallah MJ, Szpankowski W. Reliable detection of episodes in event sequences Knowledge and Information Systems. 7: 415-437. DOI: 10.1007/s10115-004-0174-5  0.718
2005 Atallah MJ, Frikken KB, Goodrich MT, Tamassia R. Secure biometric authentication for weak computational devices Lecture Notes in Computer Science. 3570: 357-371.  0.684
2005 Gwadera R, Atallah M, Szpankowski W. Markov models for identification of significant episodes Proceedings of the 2005 Siam International Conference On Data Mining, Sdm 2005. 404-414.  0.717
2004 Sion R, Atallah M, Prabhakar S. Rights protection for relational data Ieee Transactions On Knowledge and Data Engineering. 16: 1509-1525. DOI: 10.1109/Tkde.2004.94  0.318
2004 Atallah M, Gwadera R, Szpankowski W. Detection of significant sets of episodes in event sequences Proceedings - Fourth Ieee International Conference On Data Mining, Icdm 2004. 3-10. DOI: 10.1109/ICDM.2004.10090  0.695
2004 Kerschbaum F, Atallah MJ, M'Raïhi D, Rice JR. Private fingerprint verification without local storage Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3072: 387-394. DOI: 10.1007/978-3-540-25948-0_54  0.334
2004 Atallah MJ, Lonardi S. Augmenting LZ-77 with authentication and integrity assurance capabilities: Research Articles Concurrency and Computation: Practice and Experience. 16: 1063-1076. DOI: 10.1002/Cpe.V16:11  0.34
2004 Atallah MJ, Lonardi S. Augmenting LZ-77 with authentication and integrity assurance capabilities Concurrency Computation Practice and Experience. 16: 1063-1076. DOI: 10.1002/Cpe.804  0.351
2004 Topkara M, Topkara U, Atallah MJ, Taskiran C, Lin E, Delp EJ. A hierarchical protocol for increasing the stealthiness of steganographic methods Proceedings of the Multimedia and Security Workshop 2004, Mm and Sec'04. 16-24.  0.722
2004 Frikken KB, Atallah MJ. Privacy preserving route planning Wpes'04: Proceedings of the 2004 Acm Workshop On Privacy in the Electronic Society. 8-15.  0.695
2004 Atallah MJ, Frikken KB. Privacy-preserving location-dependent query processing Proceedings - the Ieee/Acs International Conference On Pervasive Services, Icps2004. 9-18.  0.675
2003 Atallah MJ, Prabhakar S. (Almost) Optimal parallel block access for range queries Information Sciences. 157: 21-31. DOI: 10.1016/S0020-0255(03)00181-6  0.325
2003 Frikken KB, Atallah MJ. Privacy Preserving Electronic Surveillance Proceedings of the Acm Workshop On Privacy in the Electronic Society. 45-52.  0.685
2003 Atallah MJ, Raskin V, Hempelmann CF, Karahan M, Sion R, Topkara U, Triezenberg KE. Natural language watermarking and tamperproofing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2578: 196-212.  0.689
2002 Atallah MJ, Pantazopoulos KN, Rice JR, Spafford EE. Secure outsourcing of scientific computations Advances in Computers. 54: 215-272. DOI: 10.1016/S0065-2458(01)80019-X  0.339
2001 Atallah MJ, Chen DZ. On connecting red and blue rectilinear polygonal obstacles with nonintersecting monotone rectilinear paths International Journal of Computational Geometry and Applications. 11: 373-400. DOI: 10.1142/S0218195901000547  0.311
2001 Atallah MJ, Chyzak F, Dumas P. A randomized algorithm for approximate string matching Algorithmica (New York). 29: 468-486. DOI: 10.1007/S004530010062  0.3
2000 Andrews MG, Atallah MJ, Chen DZ, Lee DT. Parallel algorithms for maximum matching in complements of interval graphs and related problems Algorithmica (New York). 26: 263-289. DOI: 10.1007/S004539910013  0.308
1999 Atallah MJ. An improved hypercube bound for multisearching and its applications International Journal of Computational Geometry and Applications. 9: 29-38. DOI: 10.1142/S0218195999000030  0.316
1999 Atallah MJ. Parallel algorithms for longest increasing chains in the plane and related problems Parallel Processing Letters. 9: 511-520. DOI: 10.1142/S0129626499000475  0.327
1999 Atallah MJ, Wagstaff SS. Watermarking with quadratic residues Electronic Imaging. 3657: 283-288. DOI: 10.1117/12.344677  0.301
1998 Atallah MJ, Comer DE. Algorithms for variable length subnet address assignment Ieee Transactions On Computers. 47: 693-699. DOI: 10.1109/12.689648  0.303
1996 Atallah MJ, Fabri A. On the multisearching problem for hypercubes Computational Geometry: Theory and Applications. 5: 293-302. DOI: 10.1016/0925-7721(94)00023-9  0.332
1995 ATALLAH MJ, CHEN DZ. COMPUTING THE ALL-PAIRS LONGEST CHAINS IN THE PLANE International Journal of Computational Geometry & Applications. 5: 257-271. DOI: 10.1142/S0218195995000155  0.321
1995 Atallah MJ, Chen DZ. Optimal Parallel Hypercube Algorithms for Polygon Problems Ieee Transactions On Computers. 44: 914-922. DOI: 10.1109/12.392849  0.318
1995 Atallah MJ, Chen DZ, Lee DT. An optimal algorithm for shortest paths on weighted interval and circular-arc graphs, with applications Algorithmica. 14: 429-441. DOI: 10.1007/Bf01192049  0.308
1994 Atallah MJ, Dehne F, Miller R, Rauchaplin A, Tsay JJ. Multisearch Techniques: Parallel Data Structures on Mesh-Connected Computers Journal of Parallel and Distributed Computing. 20: 1-13. DOI: 10.1006/Jpdc.1994.1001  0.334
1993 Atallah MJ, Chen DZ. On parallel rectilinear obstacle- avoiding paths Computational Geometry: Theory and Applications. 3: 307-313. DOI: 10.1016/0925-7721(93)90004-P  0.323
1993 Atallah MJ. A faster parallel algorithm for a matrix searching problem Algorithmica. 9: 156-167. DOI: 10.1007/Bf01188710  0.317
1993 Atallah MJ, Jacquet P, Szpankowski W. A probabilistic analysis of a pattern matching problem Random Structures and Algorithms. 4: 191-213. DOI: 10.1002/Rsa.3240040206  0.324
1992 Atallah MJ, Lock Black C, Marinescu DC, Jay Siegel H, Casavant TL. Models and algorithms for coscheduling compute-intensive taks on a network of workstations Journal of Parallel and Distributed Computing. 16: 319-327. DOI: 10.1016/0743-7315(92)90015-F  0.307
1992 Atallah MJ, Rao Kosaraju S. An efficient parallel algorithm for the row minima of a totally monotone matrix Journal of Algorithms. 13: 394-413. DOI: 10.1016/0196-6774(92)90046-F  0.301
1991 Atallah MJ, Wagener H, Chen DZ. An Optimal Parallel Algorithm for the Visibility of a Simple Polygon from a Point Journal of the Acm (Jacm). 38: 515-532. DOI: 10.1145/116825.116827  0.303
1991 Atallah MJ, Chen DZ. Parallel rectilinear shortest paths with rectangular obstacles Computational Geometry: Theory and Applications. 1: 79-113. DOI: 10.1016/0925-7721(91)90002-V  0.329
1991 Atallah MJ, McFaddin S. Sequence comparison on the connection machine Concurrency and Computation: Practice and Experience. 3: 89-107. DOI: 10.1002/Cpe.4330030203  0.303
1989 Atallah MJ, Chen DZ. An optimal parallel algorithm for the minimum circle-cover problem Information Processing Letters. 32: 159-165. DOI: 10.1016/0020-0190(89)90037-9  0.301
1989 Atallah MJ, Kosaraju SR. An efficient algorithm for maxdominance, with applications Algorithmica. 4: 221-236. DOI: 10.1007/Bf01553888  0.322
1988 Atallah MJ, Manacher GK, Urrutia J. Finding a minimum independent dominating set in a permutation graph Discrete Applied Mathematics. 21: 177-183. DOI: 10.1016/0166-218X(88)90064-9  0.301
1988 Atallah MJ, Goodrich MT. Parallel algorithms for some functions of two convex polygons Algorithmica. 3: 535-548. DOI: 10.1007/Bf01762130  0.312
1986 Atallah MJ, Hambrusch SE. Solving tree problems on a mesh-connected processor array Information and Control. 69: 168-187. DOI: 10.1016/S0019-9958(86)80046-8  0.327
1986 Atallah MJ, Goodrich MT. Efficient parallel solutions to some geometric problems Journal of Parallel and Distributed Computing. 3: 492-507. DOI: 10.1016/0743-7315(86)90011-0  0.309
1986 Atallah MJ, Frederickson GN. A note on finding a maximum empty rectangle Discrete Applied Mathematics. 13: 87-91. DOI: 10.1016/0166-218X(86)90071-5  0.313
1986 Atallah MJ, Hambrusch SE. An assignment algorithm with applications to integrated circuit layout Discrete Applied Mathematics. 13: 9-22. DOI: 10.1016/0166-218X(86)90064-8  0.305
1984 Atallah MJ. Checking similarity of planar figures International Journal of Computer &Amp; Information Sciences. 13: 279-290. DOI: 10.1007/Bf00977833  0.302
Show low-probability matches.