Follow
Mikhail Atallah
Mikhail Atallah
Distinguished Professor of Computer Science
Verified email at cs.purdue.edu - Homepage
Title
Cited by
Cited by
Year
Internet addiction: Metasynthesis of 1996–2006 quantitative research
S Byun, C Ruffini, JE Mills, AC Douglas, M Niang, S Stepchenkova, ...
Cyberpsychology & behavior 12 (2), 203-207, 2009
7332009
Algorithms and Theory of Computation Handbook, Volume 1: General Concepts and Techniques
MJ Atallah, M Blanton
Chapman & Hall/CRC, 2017
677*2017
Algorithms and theory of computation handbook, volume 2: special topics and techniques
MJ Atallah, M Blanton
CRC press, 2009
6752009
Algorithms and Theory of Computation Handbook, Volume 1: General Concepts and Techniques
M Atallah, M Blanton
CRC press, 2009
675*2009
Secure multi-party computation problems and their applications: a review and open problems
W Du, MJ Atallah
Proceedings of the 2001 workshop on New security paradigms, 13-22, 2001
6692001
Disclosure limitation of sensitive rules
M Atallah, E Bertino, A Elmagarmid, M Ibrahim, V Verykios
Workshop on Knowledge and Data Engineering Exchange, 45-52, 1999
6141999
Internet addiction: Meta-synthesis of qualitative research for the decade 1996–2006
AC Douglas, JE Mills, M Niang, S Stepchenkova, S Byun, C Ruffini, ...
Computers in human behavior 24 (6), 3027-3044, 2008
6132008
Dynamic and efficient key management for access hierarchies
MJ Atallah, M Blanton, N Fazio, KB Frikken
ACM Transactions on Information and System Security (TISSEC) 12 (3), 1-43, 2009
6112009
Rights protection for relational data
R Sion, M Atallah, S Prabhakar
Proceedings of the 2003 ACM SIGMOD international conference on Management of …, 2003
4662003
Secure multi-party computational geometry
MJ Atallah, W Du
Algorithms and Data Structures: 7th International Workshop, WADS 2001 …, 2001
4442001
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
404*2006
Privacy-preserving cooperative statistical analysis
W Du, MJ Atallah
Seventeenth Annual Computer Security Applications Conference, 102-110, 2001
3972001
Protecting software code by guards
H Chang, MJ Atallah
Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM …, 2002
3762002
Securely outsourcing linear algebra computations
MJ Atallah, KB Frikken
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
3672010
Secure outsourcing of scientific computations
MJ Atallah, KN Pantazopoulos, JR Rice, EE Spafford
Advances in computers 54, 215-272, 2002
3582002
Cascading divide-and-conquer: A technique for designing parallel algorithms
MJ Atallah, R Cole, MT Goodrich
SIAM Journal on Computing 18 (3), 499-532, 1989
3121989
Natural language watermarking: Design, analysis, and a proof-of-concept implementation
MJ Atallah, V Raskin, M Crogan, C Hempelmann, F Kerschbaum, ...
Information Hiding: 4th International Workshop, IH 2001 Pittsburgh, PA, USA …, 2001
3032001
On symmetry detection
MJ Atallah
3031984
Privacy-Preserving Cooperative Scientific Computations.
W Du, MJ Atallah
csfw 1, 273, 2001
2882001
Natural language watermarking and tamperproofing
MJ Atallah, V Raskin, CF Hempelmann, M Karahan, R Sion, U Topkara, ...
Information Hiding: 5th International Workshop, IH 2002 Noordwijkerhout, The …, 2003
2702003
The system can't perform the operation now. Try again later.
Articles 1–20