Marina Blanton

Affiliations:
  • State University of New York at Buffalo, Department of Computer Science and Engineering, NY, USA
  • University of Notre Dame, Department of Computer Science and Engineering, IN, USA (former)


According to our database1, Marina Blanton authored at least 74 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits.
Proc. Priv. Enhancing Technol., January, 2024

2023
Secure and Accurate Summation of Many Floating-Point Numbers.
Proc. Priv. Enhancing Technol., July, 2023

Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning.
Proc. Priv. Enhancing Technol., January, 2023

A Formal Model for Secure Multiparty Computation.
CoRR, 2023

2022
Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation.
CoRR, 2022

2021
Binary Search in Secure Computation.
IACR Cryptol. ePrint Arch., 2021

2019
Secure pattern matching based on bit parallelism - Non-interactive protocols for non-deterministic string matching automata evaluation.
Int. J. Inf. Sec., 2019

Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority.
IACR Cryptol. ePrint Arch., 2019

2018
Message Authentication Codes.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Hash Functions.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Authentication.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler.
ACM Trans. Priv. Secur., 2018

Improved Signature Schemes for Secure Multi-Party Computation with Certified Inputs.
IACR Cryptol. ePrint Arch., 2018

Practical Secure Computation Outsourcing: A Survey.
ACM Comput. Surv., 2018

Privacy Preserving Analytics on Distributed Medical Data.
CoRR, 2018

Secure Multi-Party Computation.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model.
Int. J. Inf. Sec., 2017

Improving the Security and Efficiency of Private Genomic Computation Using Server Aid.
IEEE Secur. Priv., 2017

Enforcing Input Correctness via Certification in Garbled Circuit Evaluation.
IACR Cryptol. ePrint Arch., 2017

Secure Fingerprint Alignment and Matching Protocols.
CoRR, 2017

2016
Efficient Dynamic Provable Possession of Remote Data via Update Trees.
ACM Trans. Storage, 2016

Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation.
Proc. Priv. Enhancing Technol., 2016

Private and oblivious set and multiset operations.
Int. J. Inf. Sec., 2016

Optimizing Secure Statistical Computations with PICCO.
CoRR, 2016

2015
Secure distributed genome analysis for GWAS and sequence comparison computation.
BMC Medical Informatics Decis. Mak., December, 2015

Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Efficient Secure and Verifiable Outsourcing of Matrix Multiplications.
IACR Cryptol. ePrint Arch., 2014

Secure Fingerprint Identification of High Accuracy.
IACR Cryptol. ePrint Arch., 2014

2013
Reliable medical recommendation systems with patient privacy.
ACM Trans. Intell. Syst. Technol., 2013

Secure and verifiable outsourcing of large-scale biometric computations.
ACM Trans. Inf. Syst. Secur., 2013

Analysis of Reusability of Secure Sketches and Fuzzy Extractors.
IEEE Trans. Inf. Forensics Secur., 2013

Secure Computation of Hidden Markov Models.
Proceedings of the SECRYPT 2013, 2013

PICCO: a general-purpose compiler for private distributed computation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Efficient dynamic provable possession of remote data via balanced update trees.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Data-oblivious graph algorithms for secure computation and outsourcing.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting.
IACR Cryptol. ePrint Arch., 2012

Secure Computation on Floating Point Numbers.
IACR Cryptol. ePrint Arch., 2012

Secure and Efficient Outsourcing of Sequence Comparisons.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Secure Outsourced Computation of Iris Matching.
IACR Cryptol. ePrint Arch., 2011

Achieving Full Security in Privacy-Preserving Data Mining.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

On the (Non-)reusability of Fuzzy Sketches and Extractors and Security in the Computational Setting.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

2010
Secure and Efficient Protocols for Iris and Fingerprint Identification.
IACR Cryptol. ePrint Arch., 2010

Deniable cloud storage: sharing files via public-key deniability.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

A Private and Reliable Recommendation System for Social Networks.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Privacy-Preserving Network Aggregation.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2010

Reliable medical recommendation systems with patient privacy.
Proceedings of the ACM International Health Informatics Symposium, 2010

Efficient Multi-dimensional Key Management in Broadcast Services.
Proceedings of the Computer Security, 2010

Secure Outsourcing of DNA Searching via Finite Automata.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

2009
Message Authentication Codes.
Proceedings of the Encyclopedia of Database Systems, 2009

Hash Functions.
Proceedings of the Encyclopedia of Database Systems, 2009

Authentication.
Proceedings of the Encyclopedia of Database Systems, 2009

Dynamic and Efficient Key Management for Access Hierarchies.
ACM Trans. Inf. Syst. Secur., 2009

Internet Addiction: Metasynthesis of 1996-2006 Quantitative Research.
Cyberpsychology Behav. Soc. Netw., 2009

Robust Authentication Using Physically Unclonable Functions.
Proceedings of the Information Security, 12th International Conference, 2009

Biometric-Based Non-transferable Anonymous Credentials.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

2008
Internet addiction: Meta-synthesis of qualitative research for the decade 1996-2006.
Comput. Hum. Behav., 2008

Online subscriptions with anonymous access.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Private combinatorial group testing.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Improved Conditional E-Payments.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Incorporating Temporal Capabilities in Existing Key Management Schemes.
IACR Cryptol. ePrint Arch., 2007

Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric.
Proceedings of the Algorithms and Data Structures, 10th International Workshop, 2007

Secret Handshakes with Dynamic and Fuzzy Matching.
Proceedings of the Network and Distributed System Security Symposium, 2007

Efficient techniques for realizing geo-spatial access control.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Succinct representation of flexible and privacy-preserving access rights.
VLDB J., 2006

Key management for non-tree access hierarchies.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Efficient Correlated Action Selection.
Proceedings of the Financial Cryptography and Data Security, 2006

2005
Provable bounds for portable and flexible privacy-preserving access.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

Dynamic and efficient key management for access hierarchies.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Remote Revocation of Smart Cards in a Private DRM System.
Proceedings of the ACSW Frontiers 2005, 2005 ACSW Workshops, 2005

2004
Private collaborative forecasting and benchmarking.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

Succinct specifications of portable document access policies.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

Portable and Flexible Document Access Control Mechanisms.
Proceedings of the Computer Security, 2004

2002
Statistical analysis of malformed packets and their origins in the modern internet.
Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop, 2002

2001
Real-Time Network-Based Anomaly Intrusion Detection.
Scalable Comput. Pract. Exp., 2001


  Loading...