default search action
Marina Blanton
Person information
- affiliation: State University of New York at Buffalo, Department of Computer Science and Engineering, NY, USA
- affiliation (former): University of Notre Dame, Department of Computer Science and Engineering, IN, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Marina Blanton, Dennis Murphy, Chen Yuan:
Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits. Proc. Priv. Enhancing Technol. 2024(1): 74-97 (2024) - [c44]Alessandro N. Baccarini, Marina Blanton, Shaofeng Zou:
Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation. CODASPY 2024: 187-198 - [c43]Marina Blanton, Dennis Murphy:
Privacy Preserving Biometric Authentication for Fingerprints and Beyond. CODASPY 2024: 367-378 - [i24]Marina Blanton, Dennis Murphy:
Privacy Preserving Biometric Authentication for Fingerprints and Beyond. IACR Cryptol. ePrint Arch. 2024: 525 (2024) - 2023
- [j20]Alessandro N. Baccarini, Marina Blanton, Chen Yuan:
Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning. Proc. Priv. Enhancing Technol. 2023(1): 608-626 (2023) - [j19]Marina Blanton, Michael T. Goodrich, Chen Yuan:
Secure and Accurate Summation of Many Floating-Point Numbers. Proc. Priv. Enhancing Technol. 2023(3): 432-445 (2023) - [i23]Amy Rathore, Marina Blanton, Marco Gaboardi, Lukasz Ziarek:
A Formal Model for Secure Multiparty Computation. CoRR abs/2306.00308 (2023) - [i22]Marina Blanton, Michael T. Goodrich, Chen Yuan:
Secure and Accurate Summation of Many Floating-Point Numbers. CoRR abs/2312.10247 (2023) - 2022
- [c42]Marina Blanton, Chen Yuan:
Binary Search in Secure Computation. NDSS 2022 - [i21]Alessandro N. Baccarini, Marina Blanton, Shaofeng Zou:
Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation. CoRR abs/2209.10457 (2022) - 2021
- [i20]Marina Blanton, Chen Yuan:
Binary Search in Secure Computation. IACR Cryptol. ePrint Arch. 2021: 1049 (2021) - 2020
- [c41]Marina Blanton, Ah Reum Kang, Chen Yuan:
Improved Building Blocks for Secure Multi-party Computation Based on Secret Sharing with Honest Majority. ACNS (1) 2020: 377-397 - [i19]Alessandro N. Baccarini, Marina Blanton, Chen Yuan:
Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning. IACR Cryptol. ePrint Arch. 2020: 1577 (2020)
2010 – 2019
- 2019
- [j18]Mohammad Hasan Samadani, Mehdi Berenjkoub, Marina Blanton:
Secure pattern matching based on bit parallelism - Non-interactive protocols for non-deterministic string matching automata evaluation. Int. J. Inf. Sec. 18(3): 371-391 (2019) - [i18]Marina Blanton, Ah Reum Kang, Chen Yuan:
Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority. IACR Cryptol. ePrint Arch. 2019: 718 (2019) - 2018
- [j17]Zihao Shan, Kui Ren, Marina Blanton, Cong Wang:
Practical Secure Computation Outsourcing: A Survey. ACM Comput. Surv. 51(2): 31:1-31:40 (2018) - [j16]Yihua Zhang, Marina Blanton, Ghada Almashaqbeh:
Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler. ACM Trans. Priv. Secur. 21(2): 6:1-6:34 (2018) - [c40]Fattaneh Bayatbabolghani, Marina Blanton:
Secure Multi-Party Computation. CCS 2018: 2157-2159 - [c39]Marina Blanton, Myoungin Jeong:
Improved Signature Schemes for Secure Multi-party Computation with Certified Inputs. ESORICS (2) 2018: 438-460 - [r6]Marina Blanton:
Authentication. Encyclopedia of Database Systems (2nd ed.) 2018 - [r5]Marina Blanton:
Hash Functions. Encyclopedia of Database Systems (2nd ed.) 2018 - [r4]Marina Blanton:
Message Authentication Codes. Encyclopedia of Database Systems (2nd ed.) 2018 - [i17]Marina Blanton, Ah Reum Kang, Subhadeep Karan, Jaroslaw Zola:
Privacy Preserving Analytics on Distributed Medical Data. CoRR abs/1806.06477 (2018) - [i16]Marina Blanton, Myoungin Jeong:
Improved Signature Schemes for Secure Multi-Party Computation with Certified Inputs. IACR Cryptol. ePrint Arch. 2018: 736 (2018) - 2017
- [j15]Marina Blanton, Fattaneh Bayatbabolghani:
Improving the Security and Efficiency of Private Genomic Computation Using Server Aid. IEEE Secur. Priv. 15(5): 20-28 (2017) - [j14]Mehrdad Aliasgari, Marina Blanton, Fattaneh Bayatbabolghani:
Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model. Int. J. Inf. Sec. 16(6): 577-601 (2017) - [c38]Yihua Zhang, Marina Blanton, Fattaneh Bayatbabolghani:
Enforcing Input Correctness via Certification in Garbled Circuit Evaluation. ESORICS (2) 2017: 552-569 - [i15]Fattaneh Bayatbabolghani, Marina Blanton, Mehrdad Aliasgari, Michael T. Goodrich:
Secure Fingerprint Alignment and Matching Protocols. CoRR abs/1702.03379 (2017) - [i14]Yihua Zhang, Marina Blanton, Fattaneh Bayatbabolghani:
Enforcing Input Correctness via Certification in Garbled Circuit Evaluation. IACR Cryptol. ePrint Arch. 2017: 569 (2017) - 2016
- [j13]Marina Blanton, Everaldo Aguiar:
Private and oblivious set and multiset operations. Int. J. Inf. Sec. 15(5): 493-518 (2016) - [j12]Marina Blanton, Fattaneh Bayatbabolghani:
Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation. Proc. Priv. Enhancing Technol. 2016(4): 144-164 (2016) - [j11]Yihua Zhang, Marina Blanton:
Efficient Dynamic Provable Possession of Remote Data via Update Trees. ACM Trans. Storage 12(2): 9:1-9:45 (2016) - [i13]Justin DeBenedetto, Marina Blanton:
Optimizing Secure Statistical Computations with PICCO. CoRR abs/1612.08678 (2016) - 2015
- [j10]Yihua Zhang, Marina Blanton, Ghada Almashaqbeh:
Secure distributed genome analysis for GWAS and sequence comparison computation. BMC Medical Informatics Decis. Mak. 15-S(5): S4 (2015) - [c37]Marina Blanton, Siddharth Saraph:
Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification. ESORICS (1) 2015: 384-406 - [i12]Yihua Zhang, Marina Blanton, Ghada Almashaqbeh:
Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler. CoRR abs/1509.01763 (2015) - [i11]Marina Blanton, Fattaneh Bayatbabolghani:
Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation. IACR Cryptol. ePrint Arch. 2015: 422 (2015) - 2014
- [c36]Yihua Zhang, Marina Blanton:
Efficient Secure and Verifiable Outsourcing of Matrix Multiplications. ISC 2014: 158-178 - [i10]Yihua Zhang, Marina Blanton:
Efficient Secure and Verifiable Outsourcing of Matrix Multiplications. IACR Cryptol. ePrint Arch. 2014: 133 (2014) - [i9]Marina Blanton, Siddharth Saraph:
Secure Fingerprint Identification of High Accuracy. IACR Cryptol. ePrint Arch. 2014: 596 (2014) - 2013
- [j9]Marina Blanton, Mehrdad Aliasgari:
Analysis of Reusability of Secure Sketches and Fuzzy Extractors. IEEE Trans. Inf. Forensics Secur. 8(9): 1433-1445 (2013) - [j8]Marina Blanton, Yihua Zhang, Keith B. Frikken:
Secure and verifiable outsourcing of large-scale biometric computations. ACM Trans. Inf. Syst. Secur. 16(3): 11 (2013) - [j7]T. Ryan Hoens, Marina Blanton, Aaron Steele, Nitesh V. Chawla:
Reliable medical recommendation systems with patient privacy. ACM Trans. Intell. Syst. Technol. 4(4): 67:1-67:31 (2013) - [c35]Yihua Zhang, Marina Blanton:
Efficient dynamic provable possession of remote data via balanced update trees. AsiaCCS 2013: 183-194 - [c34]Marina Blanton, Aaron Steele, Mehrdad Aliasgari:
Data-oblivious graph algorithms for secure computation and outsourcing. AsiaCCS 2013: 207-218 - [c33]Yihua Zhang, Aaron Steele, Marina Blanton:
PICCO: a general-purpose compiler for private distributed computation. CCS 2013: 813-826 - [c32]Mehrdad Aliasgari, Marina Blanton, Yihua Zhang, Aaron Steele:
Secure Computation on Floating Point Numbers. NDSS 2013 - [c31]Mehrdad Aliasgari, Marina Blanton:
Secure Computation of Hidden Markov Models. SECRYPT 2013: 242-253 - 2012
- [j6]Marina Blanton, Mehrdad Aliasgari:
Secure outsourced computation of iris matching. J. Comput. Secur. 20(2-3): 259-305 (2012) - [c30]Marina Blanton, Everaldo Aguiar:
Private and oblivious set and multiset operations. AsiaCCS 2012: 40-41 - [c29]Marina Blanton, Mikhail J. Atallah, Keith B. Frikken, Qutaibah M. Malluhi:
Secure and Efficient Outsourcing of Sequence Comparisons. ESORICS 2012: 505-522 - [i8]Yihua Zhang, Marina Blanton:
Efficient Dynamic Provable Possession of Remote Data via Update Trees. IACR Cryptol. ePrint Arch. 2012: 291 (2012) - [i7]Mehrdad Aliasgari, Marina Blanton, Yihua Zhang, Aaron Steele:
Secure Computation on Floating Point Numbers. IACR Cryptol. ePrint Arch. 2012: 405 (2012) - [i6]Marina Blanton, Mehrdad Aliasgari:
On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting. IACR Cryptol. ePrint Arch. 2012: 608 (2012) - 2011
- [c28]Marina Blanton, Paolo Gasti:
Secure and Efficient Protocols for Iris and Fingerprint Identification. ESORICS 2011: 190-209 - [c27]Marina Blanton, Mehrdad Aliasgari:
On the (Non-)reusability of Fuzzy Sketches and Extractors and Security in the Computational Setting. SECRYPT 2011: 68-77 - [c26]Marina Blanton:
Achieving Full Security in Privacy-Preserving Data Mining. SocialCom/PASSAT 2011: 925-934 - [c25]Marina Blanton, Yihua Zhang, Keith B. Frikken:
Secure and Verifiable Outsourcing of Large-Scale Biometric Computations. SocialCom/PASSAT 2011: 1185-1191 - [i5]Marina Blanton, Mehrdad Aliasgari:
Secure Outsourced Computation of Iris Matching. IACR Cryptol. ePrint Arch. 2011: 462 (2011) - [i4]Marina Blanton, Everaldo Aguiar:
Private and Oblivious Set and Multiset Operations. IACR Cryptol. ePrint Arch. 2011: 464 (2011) - 2010
- [c24]Marina Blanton, Mehrdad Aliasgari:
Secure Outsourcing of DNA Searching via Finite Automata. DBSec 2010: 49-64 - [c23]Marina Blanton, Keith B. Frikken:
Efficient Multi-dimensional Key Management in Broadcast Services. ESORICS 2010: 424-440 - [c22]T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla:
Reliable medical recommendation systems with patient privacy. IHI 2010: 173-182 - [c21]Troy Raeder, Marina Blanton, Nitesh V. Chawla, Keith B. Frikken:
Privacy-Preserving Network Aggregation. PAKDD (1) 2010: 198-207 - [c20]T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla:
A Private and Reliable Recommendation System for Social Networks. SocialCom/PASSAT 2010: 816-825 - [c19]Paolo Gasti, Giuseppe Ateniese, Marina Blanton:
Deniable cloud storage: sharing files via public-key deniability. WPES 2010: 31-42 - [i3]Marina Blanton, Paolo Gasti:
Secure and Efficient Protocols for Iris and Fingerprint Identification. IACR Cryptol. ePrint Arch. 2010: 627 (2010)
2000 – 2009
- 2009
- [j5]Sookeun Byun, Celestino Ruffini, Juline E. Mills, Alecia Douglas, Mamadou Niang, Svetlana Stepchenkova, Seul Ki Lee, Jihad Loutfi, JungKook Lee, Mikhail J. Atallah, Marina Blanton:
Internet Addiction: Metasynthesis of 1996-2006 Quantitative Research. Cyberpsychology Behav. Soc. Netw. 12(2): 203-207 (2009) - [j4]Mikhail J. Atallah, Marina Blanton, Nelly Fazio, Keith B. Frikken:
Dynamic and Efficient Key Management for Access Hierarchies. ACM Trans. Inf. Syst. Secur. 12(3): 18:1-18:43 (2009) - [c18]Marina Blanton, William M. P. Hudelson:
Biometric-Based Non-transferable Anonymous Credentials. ICICS 2009: 165-180 - [c17]Keith B. Frikken, Marina Blanton, Mikhail J. Atallah:
Robust Authentication Using Physically Unclonable Functions. ISC 2009: 262-277 - [r3]Marina Blanton:
Authentication. Encyclopedia of Database Systems 2009: 180 - [r2]Marina Blanton:
Hash Functions. Encyclopedia of Database Systems 2009: 1287-1288 - [r1]Marina Blanton:
Message Authentication Codes. Encyclopedia of Database Systems 2009: 1715-1716 - [i2]Mikhail J. Atallah, Marina Blanton, Michael T. Goodrich, Stanislas Polu:
Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric. CoRR abs/0904.4670 (2009) - 2008
- [j3]Alecia Douglas, Juline E. Mills, Mamadou Niang, Svetlana Stepchenkova, Sookeun Byun, Celestino Ruffini, Seul Ki Lee, Jihad Loutfi, JungKook Lee, Mikhail J. Atallah, Marina Blanton:
Internet addiction: Meta-synthesis of qualitative research for the decade 1996-2006. Comput. Hum. Behav. 24(6): 3027-3044 (2008) - [c16]Marina Blanton:
Improved Conditional E-Payments. ACNS 2008: 188-206 - [c15]Marina Blanton:
Online subscriptions with anonymous access. AsiaCCS 2008: 217-227 - [c14]Mikhail J. Atallah, Keith B. Frikken, Marina Blanton, YounSun Cho:
Private combinatorial group testing. AsiaCCS 2008: 312-320 - 2007
- [b1]Marina Blanton:
Key management in hierarchical access control systems. Purdue University, USA, 2007 - [c13]Mikhail J. Atallah, Marina Blanton, Keith B. Frikken:
Efficient techniques for realizing geo-spatial access control. AsiaCCS 2007: 82-92 - [c12]Mikhail J. Atallah, Marina Blanton, Keith B. Frikken:
Incorporating Temporal Capabilities in Existing Key Management Schemes. ESORICS 2007: 515-530 - [c11]Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton:
Secret Handshakes with Dynamic and Fuzzy Matching. NDSS 2007 - [c10]Mikhail J. Atallah, Marina Blanton, Michael T. Goodrich, Stanislas Polu:
Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric. WADS 2007: 114-126 - [i1]Mikhail J. Atallah, Marina Blanton, Keith B. Frikken:
Incorporating Temporal Capabilities in Existing Key Management Schemes. IACR Cryptol. ePrint Arch. 2007: 245 (2007) - 2006
- [j2]Marina Blanton, Mikhail J. Atallah:
Succinct representation of flexible and privacy-preserving access rights. VLDB J. 15(4): 334-354 (2006) - [c9]Mikhail J. Atallah, Marina Blanton, Keith B. Frikken, Jiangtao Li:
Efficient Correlated Action Selection. Financial Cryptography 2006: 296-310 - [c8]Mikhail J. Atallah, Marina Blanton, Keith B. Frikken:
Key management for non-tree access hierarchies. SACMAT 2006: 11-18 - 2005
- [c7]Keith B. Frikken, Mikhail J. Atallah, Marina Bykova:
Remote Revocation of Smart Cards in a Private DRM System. ACSW 2005: 169-178 - [c6]Mikhail J. Atallah, Keith B. Frikken, Marina Blanton:
Dynamic and efficient key management for access hierarchies. CCS 2005: 190-202 - [c5]Marina Blanton, Mikhail J. Atallah:
Provable bounds for portable and flexible privacy-preserving access. SACMAT 2005: 95-101 - 2004
- [c4]Mikhail J. Atallah, Marina Bykova:
Portable and Flexible Document Access Control Mechanisms. ESORICS 2004: 193-208 - [c3]Marina Bykova, Mikhail J. Atallah:
Succinct specifications of portable document access policies. SACMAT 2004: 41-50 - [c2]Mikhail J. Atallah, Marina Bykova, Jiangtao Li, Keith B. Frikken, Mercan Topkara:
Private collaborative forecasting and benchmarking. WPES 2004: 103-114 - 2002
- [c1]Marina Bykova, Shawn Ostermann:
Statistical analysis of malformed packets and their origins in the modern internet. Internet Measurement Workshop 2002: 83-88 - 2001
- [j1]Ravindra Balupari, Brett C. Tjaden, Shawn Ostermann, Marina Bykova, Aaron Mitchell:
Real-Time Network-Based Anomaly Intrusion Detection. Parallel Distributed Comput. Pract. 4(2) (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint