Mikhail Atallah

Results: 22



#Item
11

International Journal on Very Large Data Bases manuscript No. (will be inserted by the editor) Succinct Representation of Flexible and Privacy-Preserving Access Rights? Marina Blanton, Mikhail Atallah

Add to Reading List

Source URL: www.cse.nd.edu

Language: English - Date: 2007-08-02 16:59:44
    12

    Portable and Flexible Document Access Control Mechanisms? Mikhail Atallah, Marina Bykova Computer Sciences Department and CERIAS Purdue University {mja,mbykova}@cs.purdue.edu

    Add to Reading List

    Source URL: www.cse.nd.edu

    Language: English - Date: 2007-08-02 16:59:37
      13

      Key Management for Non-Tree Access Hierarchies ∗ Mikhail J. Atallah, Marina Blanton, Keith B. Frikken Department of Computer Science

      Add to Reading List

      Source URL: www.cse.nd.edu

      Language: English - Date: 2007-08-02 16:59:41
        14

        Efficient Correlated Action Selection? Mikhail J. Atallah, Marina Blanton, Keith B. Frikken, and Jiangtao Li Department of Computer Science Purdue University {mja,mbykova,kbf,jtli}@cs.purdue.edu

        Add to Reading List

        Source URL: www.cse.nd.edu

        Language: English - Date: 2007-08-02 16:59:38
          15

          Provable Bounds for Portable and Flexible Privacy-Preserving Access Rights ∗ Marina Blanton Mikhail J. Atallah

          Add to Reading List

          Source URL: www.cse.nd.edu

          Language: English - Date: 2007-08-02 16:59:41
            16

            Dynamic and Efficient Key Management for Access Hierarchies MIKHAIL J. ATALLAH Purdue University MARINA BLANTON University of Notre Dame

            Add to Reading List

            Source URL: www.cse.nd.edu

            Language: English - Date: 2009-02-11 09:47:47
              17

              Private Collaborative Forecasting and Benchmarking Mikhail Atallah ∗ Marina Bykova Jiangtao Li Keith Frikken Mercan Topkara

              Add to Reading List

              Source URL: www.cse.nd.edu

              Language: English - Date: 2007-08-02 16:59:45
                18Knowledge / Computer-assisted translation / Communication / Steganography / Literal translation / Parallel text / Translation / Statistical machine translation / Translation memory / Science / Linguistics / Machine translation

                Translation-Based Steganography Christian Grotho Krista Grotho Ludmila Alkhutova Ryan Stutsman Mikhail Atallah CERIAS, Purdue University {christian,krista}@grothoff.org, {lalkhuto,rstutsma}@purdue.edu,

                Add to Reading List

                Source URL: www.scs.stanford.edu

                Language: English - Date: 2012-10-04 00:45:33
                19Social engineering / Internet protocols / One-time password / Two-factor authentication / Password / Phishing / Transaction authentication number / Authentication / Man-in-the-middle attack / Security / Computer security / Cryptography

                CERIAS Tech ReportDefending against Password Exposure using Deceptive Covert Communication by Mohammed H. Almeshekah, Mikhail J. Atallah and Eugene H. Spafford Center for Education and Research Information Assura

                Add to Reading List

                Source URL: www.cerias.purdue.edu

                Language: English - Date: 2015-02-13 13:31:35
                20Password / Salt / Passwd / John the Ripper / Key derivation function / Crypt / Password strength / OTPW / Cryptography / Computer security / Security

                CERIAS Tech ReportErsatzPasswords Ending Password Cracking by Mohammed H. Almeshekah, Christopher N. Gutierrez, Mikhail J. Atallah and Eugene H. Spafford Center for Education and Research Information Assurance an

                Add to Reading List

                Source URL: www.cerias.purdue.edu

                Language: English - Date: 2015-02-13 11:29:28
                UPDATE