![](https://dblp.dagstuhl.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Mikhail J. Atallah
Person information
- affiliation: Purdue University, West Lafayette, USA
Refine list
![note](https://dblp.dagstuhl.de/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j111]Hasini Gunasinghe
, Mikhail J. Atallah
, Elisa Bertino
:
PEBASI: A Privacy preserving, Efficient Biometric Authentication Scheme based on Irises. ACM Trans. Priv. Secur. 27(3): 25:1-25:31 (2024) - 2023
- [j110]Karim A. ElSayed, Adam Dachowicz, Mikhail J. Atallah, Jitesh H. Panchal:
Information Embedding for Secure Manufacturing: Challenges and Research Opportunities. J. Comput. Inf. Sci. Eng. 23(6) (2023) - 2021
- [j109]Javad Darivandpour, Duc Viet Le, Mikhail J. Atallah:
Secure two-party input-size reduction: Challenges, solutions and applications. Inf. Sci. 567: 256-277 (2021) - 2020
- [j108]Adam Dachowicz, Mikhail J. Atallah, Jitesh H. Panchal:
Extraction and Analysis of Spatial Correlation Micrograph Features for Traceability in Manufacturing. J. Comput. Inf. Sci. Eng. 20(5) (2020)
2010 – 2019
- 2019
- [j107]Siva Chaitanya Chaduvula
, Mikhail J. Atallah, Jitesh H. Panchal:
sFEA: A Secure Finite Element Analysis Technique. J. Comput. Inf. Sci. Eng. 19(3) (2019) - [j106]Mohamed Nassar
, Qutaibah M. Malluhi
, Mikhail J. Atallah, Abdullatif Shikfa
:
Securing Aggregate Queries for DNA Databases. IEEE Trans. Cloud Comput. 7(3): 827-837 (2019) - 2018
- [j105]Adam Dachowicz, Siva Chaitanya Chaduvula
, Mikhail J. Atallah, Ilias Bilionis
, Jitesh H. Panchal:
Strategic information revelation in collaborative design. Adv. Eng. Informatics 36: 242-253 (2018) - [j104]Javad Darivandpour, Mikhail J. Atallah:
Efficient and secure pattern matching with wildcards using lightweight cryptography. Comput. Secur. 77: 666-674 (2018) - [j103]Siva Chaitanya Chaduvula
, Mikhail J. Atallah, Jitesh H. Panchal:
Secure Codesign: Achieving Optimality Without Revealing. J. Comput. Inf. Sci. Eng. 18(2) (2018) - [j102]Siva Chaitanya Chaduvula
, Adam Dachowicz, Mikhail J. Atallah, Jitesh H. Panchal:
Security in Cyber-Enabled Design and Manufacturing: A Survey. J. Comput. Inf. Sci. Eng. 18(4) (2018) - 2017
- [j101]Peng Zhang, Mikhail J. Atallah:
On approximate pattern matching with thresholds. Inf. Process. Lett. 123: 21-26 (2017) - [j100]Shumiao Wang, Siddharth Bhandari, Siva Chaitanya Chaduvula
, Mikhail J. Atallah, Jitesh H. Panchal, Karthik Ramani:
Secure Collaboration in Engineering Systems Design. J. Comput. Inf. Sci. Eng. 17(4) (2017) - [c133]Fariborz Farahmand, Joshua Ripple, Mikhail J. Atallah, Robin L. Dillon-Merrill:
Security and privacy risks in electronic communications: A user's assessment. UEMCON 2017: 412-417 - 2016
- [j99]Mehdi Bentounsi, Salima Benbernou, Mikhail J. Atallah:
Security-aware Business Process as a Service by hiding provenance. Comput. Stand. Interfaces 44: 220-233 (2016) - [j98]Christopher N. Gutierrez, Mohammed H. Almeshekah, Eugene H. Spafford, Mikhail J. Atallah, Jeffrey Avery:
Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords. ACM Trans. Priv. Secur. 19(3): 9:1-9:30 (2016) - [j97]MingJie Tang, Ruby Y. Tahboub, Walid G. Aref, Mikhail J. Atallah, Qutaibah M. Malluhi, Mourad Ouzzani, Yasin N. Silva:
Similarity Group-by Operators for Multi-Dimensional Relational Data. IEEE Trans. Knowl. Data Eng. 28(2): 510-523 (2016) - [c132]MingJie Tang, Ruby Y. Tahboub, Walid G. Aref, Mikhail J. Atallah, Qutaibah M. Malluhi, Mourad Ouzzani, Yasin N. Silva:
Similarity Group-By operators for multi-dimensional relational data. ICDE 2016: 1448-1449 - 2015
- [c131]Mohammed H. Almeshekah, Christopher N. Gutierrez
, Mikhail J. Atallah, Eugene H. Spafford:
ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage. ACSAC 2015: 311-320 - [c130]Mohammed H. Almeshekah, Mikhail J. Atallah, Eugene H. Spafford:
Enhancing Passwords Security Using Deceptive Covert Communication. SEC 2015: 159-173 - 2014
- [j96]Keith B. Frikken, Shumiao Wang, Mikhail J. Atallah:
A Scheme for Collaboratively Processing Nearest Neighbor Queries in Oblivious Storage. EAI Endorsed Trans. Collab. Comput. 1(2): e3 (2014) - [i4]MingJie Tang, Ruby Y. Tahboub, Walid G. Aref, Mikhail J. Atallah, Qutaibah M. Malluhi, Mourad Ouzzani, Yasin N. Silva:
Similarity Group-by Operators for Multi-dimensional Relational Data. CoRR abs/1412.4842 (2014) - 2013
- [j95]Mikhail J. Atallah, Elena Grigorescu, Yi Wu:
A lower-variance randomized algorithm for approximate string matching. Inf. Process. Lett. 113(18): 690-692 (2013) - [j94]Fariborz Farahmand, Mikhail J. Atallah, Eugene H. Spafford
:
Incentive Alignment and Risk Perception: An Information Security Application. IEEE Trans. Engineering Management 60(2): 238-246 (2013) - [c129]Shumiao Wang, Mohamed Nassar
, Mikhail J. Atallah, Qutaibah M. Malluhi:
Secure and Private Outsourcing of Shape-Based Feature Extraction. ICICS 2013: 90-99 - [c128]Mohammed H. Almeshekah, Mikhail J. Atallah, Eugene H. Spafford
:
Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication. Security Protocols Workshop 2013: 189-195 - 2012
- [j93]Mohamed Yakout, Mikhail J. Atallah, Ahmed K. Elmagarmid:
Efficient and Practical Approach for Private Record Linkage. ACM J. Data Inf. Qual. 3(3): 5:1-5:28 (2012) - [j92]Kai Christian Bader, Mikhail J. Atallah, Christian Grothoff
:
Efficient relaxed search in hierarchically clustered sequence datasets. ACM J. Exp. Algorithmics 17(1) (2012) - [c127]Mehdi Bentounsi, Salima Benbernou, Cheikh S. Deme, Mikhail J. Atallah:
Anonyfrag: an anonymization-based approach for privacy-preserving BPaaS. Cloud-I 2012: 9 - [c126]Ashish Kundu, Mikhail J. Atallah, Elisa Bertino:
Leakage-free redactable signatures. CODASPY 2012: 307-316 - [c125]Marina Blanton
, Mikhail J. Atallah, Keith B. Frikken, Qutaibah M. Malluhi:
Secure and Efficient Outsourcing of Sequence Comparisons. ESORICS 2012: 505-522 - [c124]Mehdi Bentounsi, Salima Benbernou, Mikhail J. Atallah:
Privacy-Preserving Business Process Outsourcing. ICWS 2012: 662-663 - [c123]Mikhail J. Atallah, Keith B. Frikken, Shumiao Wang:
Private Outsourcing of Matrix Multiplication over Closed Semi-rings. SECRYPT 2012: 136-144 - [i3]Ashish Kundu, Mikhail J. Atallah, Elisa Bertino:
Efficient Leakage-free Authentication of Trees, Graphs and Forests. IACR Cryptol. ePrint Arch. 2012: 36 (2012) - 2011
- [j91]Mikhail J. Atallah, Timothy W. Duket:
Pattern matching in the Hamming distance with thresholds. Inf. Process. Lett. 111(14): 674-677 (2011) - [j90]Hao Yuan, Mikhail J. Atallah:
Running Max/Min Filters Using 1+o(1) Comparisons per Sample. IEEE Trans. Pattern Anal. Mach. Intell. 33(12): 2544-2548 (2011) - [j89]Paolo Falcarin
, Christian S. Collberg, Mikhail J. Atallah, Mariusz H. Jakubowski:
Guest Editors' Introduction: Software Protection. IEEE Softw. 28(2): 24-27 (2011) - [j88]Yuqing Sun
, Qihua Wang, Ninghui Li, Elisa Bertino, Mikhail J. Atallah:
On the Complexity of Authorization in RBAC under Qualification and Security Constraints. IEEE Trans. Dependable Secur. Comput. 8(6): 883-897 (2011) - [j87]Mikhail J. Atallah, Yinian Qi, Hao Yuan:
Asymptotically efficient algorithms for skyline probabilities of uncertain data. ACM Trans. Database Syst. 36(2): 12:1-12:28 (2011) - [c122]Keith B. Frikken, Hao Yuan, Mikhail J. Atallah:
Secure Authenticated Comparisons. ACNS 2011: 514-531 - [e4]Mikhail J. Atallah, Xiang-Yang Li, Binhai Zhu:
Frontiers in Algorithmics and Algorithmic Aspects in Information and Management - Joint International Conference, FAW-AAIM 2011, Jinhua, China, May 28-31, 2011. Proceedings. Lecture Notes in Computer Science 6681, Springer 2011, ISBN 978-3-642-21203-1 [contents] - 2010
- [c121]Emil Stefanov, Mikhail J. Atallah:
Duress detection for authentication attacks against multiple administrators. Insider Threats@CCS 2010: 37-46 - [c120]Mikhail J. Atallah, Keith B. Frikken:
Securely outsourcing linear algebra computations. AsiaCCS 2010: 48-59 - [c119]Yinian Qi, Mikhail J. Atallah:
Identifying Interesting Instances for Probabilistic Skylines. DEXA (2) 2010: 300-314 - [c118]Mikhail J. Atallah:
Computational Geometry for Uncertain Data - (Abstract of Keynote Talk). FAW 2010: 6 - [c117]Hao Yuan, Mikhail J. Atallah:
Data Structures for Range Minimum Queries in Multidimensional Arrays. SODA 2010: 150-160 - [e3]Mikhail J. Atallah, Nicholas J. Hopper:
Privacy Enhancing Technologies, 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings. Lecture Notes in Computer Science 6205, Springer 2010, ISBN 978-3-642-14526-1 [contents]
2000 – 2009
- 2009
- [j86]Sookeun Byun
, Celestino Ruffini, Juline E. Mills, Alecia Douglas, Mamadou Niang, Svetlana Stepchenkova
, Seul Ki Lee
, Jihad Loutfi, JungKook Lee, Mikhail J. Atallah, Marina Blanton
:
Internet Addiction: Metasynthesis of 1996-2006 Quantitative Research. Cyberpsychology Behav. Soc. Netw. 12(2): 203-207 (2009) - [j85]Daniel G. Aliaga, Mikhail J. Atallah:
Genuinity Signatures: Designing Signatures for Verifying 3D Object Genuinity. Comput. Graph. Forum 28(2): 437-446 (2009) - [j84]Christian Grothoff, Krista Grothoff, Ryan Stutsman, Ludmila Alkhutova, Mikhail J. Atallah:
Translation-based steganography. J. Comput. Secur. 17(3): 269-303 (2009) - [j83]Mikhail J. Atallah, Marina Blanton
, Nelly Fazio, Keith B. Frikken:
Dynamic and Efficient Key Management for Access Hierarchies. ACM Trans. Inf. Syst. Secur. 12(3): 18:1-18:43 (2009) - [c116]Hao Yuan, Mikhail J. Atallah:
Efficient and secure distribution of massive geo-spatial data. GIS 2009: 440-443 - [c115]Mohamed Yakout, Mikhail J. Atallah, Ahmed K. Elmagarmid:
Efficient Private Record Linkage. ICDE 2009: 1283-1286 - [c114]Hao Yuan, Mikhail J. Atallah:
Efficient data structures for range-aggregate queries on trees. ICDT 2009: 111-120 - [c113]Keith B. Frikken, Marina Blanton
, Mikhail J. Atallah:
Robust Authentication Using Physically Unclonable Functions. ISC 2009: 262-277 - [c112]Mikhail J. Atallah, Yinian Qi:
Computing all skyline probabilities for uncertain data. PODS 2009: 279-287 - [e2]Ian Goldberg, Mikhail J. Atallah:
Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings. Lecture Notes in Computer Science 5672, Springer 2009, ISBN 978-3-642-03167-0 [contents] - [i2]Mikhail J. Atallah, Marina Blanton, Michael T. Goodrich, Stanislas Polu
:
Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric. CoRR abs/0904.4670 (2009) - 2008
- [j82]Alecia Douglas, Juline E. Mills, Mamadou Niang, Svetlana Stepchenkova
, Sookeun Byun
, Celestino Ruffini, Seul Ki Lee
, Jihad Loutfi, JungKook Lee, Mikhail J. Atallah, Marina Blanton
:
Internet addiction: Meta-synthesis of qualitative research for the decade 1996-2006. Comput. Hum. Behav. 24(6): 3027-3044 (2008) - [j81]Mikhail J. Atallah, Greg N. Frederickson, Ashish Kundu:
A tree-covering problem arising in integrity of tree-structured data. Inf. Process. Lett. 109(1): 79-82 (2008) - [j80]Danfeng Yao
, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia:
Private Information: To Reveal or not to Reveal. ACM Trans. Inf. Syst. Secur. 12(1): 6:1-6:27 (2008) - [c111]Mikhail J. Atallah, Eric Bryant, John T. Korb
, John R. Rice:
Binding software to specific native hardware in a VM environment: the puf challenge and opportunity. VMSec 2008: 45-48 - [c110]Mikhail J. Atallah, Keith B. Frikken, Marina Blanton
, YounSun Cho:
Private combinatorial group testing. AsiaCCS 2008: 312-320 - [c109]Hao Yuan, Mikhail J. Atallah:
Efficient Distributed Third-Party Data Authentication for Tree Hierarchies. ICDCS 2008: 184-193 - [c108]Yinian Qi, Mikhail J. Atallah:
Efficient Privacy-Preserving k-Nearest Neighbor Search. ICDCS 2008: 311-319 - [c107]Mikhail J. Atallah, YounSun Cho, Ashish Kundu:
Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors. ICDE 2008: 696-704 - [c106]Fariborz Farahmand, Mikhail J. Atallah, Benn R. Konsynski:
Incentives and Perceptions of Information Security Risks. ICIS 2008: 25 - [c105]David Benjamin, Mikhail J. Atallah:
Private and Cheating-Free Outsourcing of Algebraic Computations. PST 2008: 240-245 - 2007
- [c104]Mikhail J. Atallah, Marina Blanton
, Keith B. Frikken:
Efficient techniques for realizing geo-spatial access control. AsiaCCS 2007: 82-92 - [c103]Mikhail J. Atallah, Marina Blanton
, Keith B. Frikken:
Incorporating Temporal Capabilities in Existing Key Management Schemes. ESORICS 2007: 515-530 - [c102]Umut Topkara, Mikhail J. Atallah, Mercan Topkara:
Passwords decay, words endure: secure and re-usable multiple password mnemonics. SAC 2007: 292-299 - [c101]Mercan Topkara, Umut Topkara, Mikhail J. Atallah:
Information hiding through errors: a confusing approach. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65050V - [c100]Umut Topkara, Mercan Topkara, Mikhail J. Atallah:
Passwords for Everyone: Secure Mnemonic-based Accessible Authentication. USENIX ATC 2007: 369-374 - [c99]Mikhail J. Atallah, Marina Blanton
, Michael T. Goodrich, Stanislas Polu:
Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric. WADS 2007: 114-126 - [i1]Mikhail J. Atallah, Marina Blanton
, Keith B. Frikken:
Incorporating Temporal Capabilities in Existing Key Management Schemes. IACR Cryptol. ePrint Arch. 2007: 245 (2007) - 2006
- [j79]Sundararaman Jeyaraman, Mikhail J. Atallah:
An empirical study of automatic event reconstruction systems. Digit. Investig. 3(Supplement): 108-115 (2006) - [j78]Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li:
Attribute-Based Access Control with Hidden Policies and Hidden Credentials. IEEE Trans. Computers 55(10): 1259-1270 (2006) - [j77]Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
:
Rights Protection for Discrete Numeric Streams. IEEE Trans. Knowl. Data Eng. 18(5): 699-714 (2006) - [j76]Marina Blanton
, Mikhail J. Atallah:
Succinct representation of flexible and privacy-preserving access rights. VLDB J. 15(4): 334-354 (2006) - [c98]Mikhail J. Atallah:
Security Issues in Collaborative Computing. COCOON 2006: 2 - [c97]Jiangtao Li, Mikhail J. Atallah:
Secure and Private Collaborative Linear Programming. CollaborateCom 2006 - [c96]Mikhail J. Atallah, Marina Blanton
, Keith B. Frikken, Jiangtao Li:
Efficient Correlated Action Selection. Financial Cryptography 2006: 296-310 - [c95]Danfeng Yao
, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia:
Point-Based Trust: Define How Much Privacy Is Worth. ICICS 2006: 190-209 - [c94]Umut Topkara, Mercan Topkara, Mikhail J. Atallah:
The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions. MM&Sec 2006: 164-174 - [c93]Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah:
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles. NDSS 2006 - [c92]Ryan Stutsman, Christian Grothoff, Mikhail J. Atallah, Krista Grothoff:
Lost in just the translation. SAC 2006: 338-345 - [c91]Mikhail J. Atallah, Marina Blanton
, Keith B. Frikken:
Key management for non-tree access hierarchies. SACMAT 2006: 11-18 - [c90]Mercan Topkara, Giuseppe Riccardi, Dilek Hakkani-Tür, Mikhail J. Atallah:
Natural language watermarking: Challenges in building a practical system. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60720A - 2005
- [j75]Mikhail J. Atallah, Jiangtao Li:
Secure outsourcing of sequence comparisons . Int. J. Inf. Sec. 4(4): 277-287 (2005) - [j74]Ioannis Ioannidis, Ananth Grama, Mikhail J. Atallah:
Adaptive data structures for IP lookups. ACM J. Exp. Algorithmics 10 (2005) - [j73]Robert Gwadera, Mikhail J. Atallah, Wojciech Szpankowski:
Reliable detection of episodes in event sequences. Knowl. Inf. Syst. 7(4): 415-437 (2005) - [j72]Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
:
Rights Protection for Categorical Data. IEEE Trans. Knowl. Data Eng. 17(7): 912-926 (2005) - [j71]Ahsan Habib, Dongyan Xu, Mikhail J. Atallah, Bharat K. Bhargava, John Chuang
:
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming. IEEE Trans. Knowl. Data Eng. 17(7): 1010-1014 (2005) - [c89]Michael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia:
Indexing Information for Data Forensics. ACNS 2005: 206-221 - [c88]Mikhail J. Atallah:
A Survey of Watermarking Techniques for Non-Media Digital Objects (Invited Talk). ACSW 2005: 73 - [c87]Keith B. Frikken, Mikhail J. Atallah, Marina Bykova
:
Remote Revocation of Smart Cards in a Private DRM System. ACSW 2005: 169-178 - [c86]Mikhail J. Atallah, Keith B. Frikken, Marina Blanton
:
Dynamic and efficient key management for access hierarchies. CCS 2005: 190-202 - [c85]Keith B. Frikken, Mikhail J. Atallah:
Achieving Fairness in Private Contract Negotiation. Financial Cryptography 2005: 270-284 - [c84]Mikhail J. Atallah, Keith B. Frikken, Michael T. Goodrich, Roberto Tamassia:
Secure Biometric Authentication for Weak Computational Devices. Financial Cryptography 2005: 357-371 - [c83]Mikhail J. Atallah:
Data Confidentiality in Collaborative Computing. HiPC 2005: 1 - [c82]Christian Grothoff, Krista Grothoff, Ludmila Alkhutova, Ryan Stutsman, Mikhail J. Atallah:
Translation-Based Steganography. Information Hiding 2005: 219-233 - [c81]Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, Cristina Nita-Rotaru:
ViWiD : Visible Watermarking Based Defense Against Phishing. IWDW 2005: 470-483 - [c80]Marina Blanton
, Mikhail J. Atallah:
Provable bounds for portable and flexible privacy-preserving access. SACMAT 2005: 95-101 - [c79]Robert Gwadera, Mikhail J. Atallah, Wojciech Szpankowski:
Markov Models for Identification of Significant Episodes. SDM 2005: 404-414 - [c78]Keith B. Frikken, Mikhail J. Atallah, Chen Zhang:
Privacy-preserving credit checking. EC 2005: 147-154 - 2004
- [j70]Mikhail J. Atallah, Stefano Lonardi
:
Augmenting LZ-77 with authentication and integrity assurance capabilities. Concurr. Pract. Exp. 16(11): 1063-1076 (2004) - [j69]Mikhail J. Atallah, Sunil Prabhakar, Keith B. Frikken, Radu Sion:
Digital Rights Protection. IEEE Data Eng. Bull. 27(1): 19-25 (2004) - [j68]Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
:
Rights Protection for Relational Data. IEEE Trans. Knowl. Data Eng. 16(12): 1509-1525 (2004) - [c77]Mikhail J. Atallah, Marina Bykova
:
Portable and Flexible Document Access Control Mechanisms. ESORICS 2004: 193-208 - [c76]Florian Kerschbaum, Mikhail J. Atallah, David M'Raïhi, John R. Rice:
Private Fingerprint Verification without Local Storage. ICBA 2004: 387-394 - [c75]Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
:
wmdb.: Rights Protection for Numeric Relational Data. ICDE 2004: 863 - [c74]Mikhail J. Atallah, Robert Gwadera, Wojciech Szpankowski:
Detection of Significant Sets of Episodes in Event Sequences. ICDM 2004: 3-10 - [c73]Mikhail J. Atallah, Keith B. Frikken:
Privacy-Preserving Location-Dependent Query Processing. ICPS 2004: 9-17 - [c72]Mercan Topkara, Umut Topkara, Mikhail J. Atallah, Cüneyt M. Taskiran, Eugene T. Lin, Edward J. Delp:
A hierarchical protocol for increasing the stealthiness of steganographic methods. MM&Sec 2004: 16-24 - [c71]Mikhail J. Atallah, Jiangtao Li:
Secure Outsourcing of Sequence Comparisons. Privacy Enhancing Technologies 2004: 63-78 - [c70]Marina Bykova
, Mikhail J. Atallah:
Succinct specifications of portable document access policies. SACMAT 2004: 41-50 - [c69]Radu Sion, Mikhail J. Atallah:
Attacking digital watermarks. Security, Steganography, and Watermarking of Multimedia Contents 2004: 848-858 - [c68]Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
:
Resilient Rights Protection for Sensor Streams. VLDB 2004: 732-743 - [c67]Keith B. Frikken, Mikhail J. Atallah:
Privacy preserving route planning. WPES 2004: