Atallah, Mikhail J.
40  Ergebnisse:
Personensuche X
?
1

ErsatzPasswords : Ending Password Cracking and Detecting..:

, In: Proceedings of the 31st Annual Computer Security Applications Conference,
 
?
2

Anonyfrag : an anonymization-based approach for privacy-..:

, In: Proceedings of the 1st International Workshop on Cloud Intelligence,
 
?
3

Leakage-free redactable signatures:

, In: Proceedings of the second ACM conference on Data and Application Security and Privacy,
 
?
4

Securely outsourcing linear algebra computations:

, In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security,
 
?
5

Session details: Streams and query processing:

, In: Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems,
 
?
6

Data structures for range minimum queries in multidimension..:

, In: Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms,
Yuan, Hao ; Atallah, Mikhail J. - p. 150-160 , 2010
 
?
7

Duress detection for authentication attacks against multipl..:

, In: Proceedings of the 2010 ACM workshop on Insider threats,
Stefanov, Emil ; Atallah, Mikhail - p. 37-46 , 2010
 
?
8

Efficient and secure distribution of massive geo-spatial da..:

, In: Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems,
Yuan, Hao ; Atallah, Mikhail J. - p. 440-443 , 2009
 
?
9

Computing all skyline probabilities for uncertain data:

, In: Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems,
Atallah, Mikhail J. ; Qi, Yinian - p. 279-287 , 2009
 
?
10

Efficient data structures for range-aggregate queries on tr..:

, In: Proceedings of the 12th International Conference on Database Theory,
Yuan, Hao ; Atallah, Mikhail J. - p. 111-120 , 2009
 
?
11

Binding software to specific native hardware in a VM enviro..:

, In: Proceedings of the 1st ACM workshop on Virtual machine security,
 
?
12

Private combinatorial group testing:

, In: Proceedings of the 2008 ACM symposium on Information, computer and communications security,
 
?
13

Efficient techniques for realizing geo-spatial access contr..:

, In: Proceedings of the 2nd ACM symposium on Information, computer and communications security,
 
?
14

Passwords decay, words endure : secure and re-usable mul..:

, In: Proceedings of the 2007 ACM symposium on Applied computing,
 
?
15

Key management for non-tree access hierarchies:

, In: Proceedings of the eleventh ACM symposium on Access control models and technologies,
 
1-15