Mikhail J. Atallah
Affiliations: Purdue University, West Lafayette, USA
According to our database^{1},
Mikhail J. Atallah
authored at least 228 papers
between 1981 and 2023.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2006, "For contributions to parallel and distributed computation.".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:

on dl.acm.org
On csauthors.net:
Bibliography
2023
Information Embedding for Secure Manufacturing: Challenges and Research Opportunities.
J. Comput. Inf. Sci. Eng., December, 2023
2021
Inf. Sci., 2021
2020
Extraction and Analysis of Spatial Correlation Micrograph Features for Traceability in Manufacturing.
J. Comput. Inf. Sci. Eng., 2020
2019
IEEE Trans. Cloud Comput., 2019
J. Comput. Inf. Sci. Eng., 2019
2018
J. Comput. Inf. Sci. Eng., 2018
J. Comput. Inf. Sci. Eng., 2018
Efficient and secure pattern matching with wildcards using lightweight cryptography.
Comput. Secur., 2018
Adv. Eng. Informatics, 2018
2017
J. Comput. Inf. Sci. Eng., 2017
Inf. Process. Lett., 2017
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017
2016
IEEE Trans. Knowl. Data Eng., 2016
ACM Trans. Priv. Secur., 2016
Comput. Stand. Interfaces, 2016
2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
A Scheme for Collaboratively Processing Nearest Neighbor Queries in Oblivious Storage.
EAI Endorsed Trans. Collab. Comput., 2014
2013
IEEE Trans. Engineering Management, 2013
Inf. Process. Lett., 2013
Back Channels Can Be Useful!  Layering Authentication Channels to Provide Covert Communication.
Proceedings of the Security Protocols XXI, 2013
Proceedings of the Information and Communications Security  15th International Conference, 2013
2012
ACM J. Exp. Algorithmics, 2012
ACM J. Data Inf. Qual., 2012
IACR Cryptol. ePrint Arch., 2012
Private Outsourcing of Matrix Multiplication over Closed Semirings.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012
Proceedings of the Computer Security  ESORICS 2012, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Proceedings of the 1st International Workshop on Cloud Intelligence (colocated with VLDB 2012), 2012
2011
ACM Trans. Database Syst., 2011
On the Complexity of Authorization in RBAC under Qualification and Security Constraints.
IEEE Trans. Dependable Secur. Comput., 2011
IEEE Softw., 2011
IEEE Trans. Pattern Anal. Mach. Intell., 2011
Inf. Process. Lett., 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Proceedings of the TwentyFirst Annual ACMSIAM Symposium on Discrete Algorithms, 2010
Proceedings of the Frontiers in Algorithmics, 4th International Workshop, 2010
Proceedings of the Database and Expert Systems Applications, 21th International Conference, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
2009
ACM Trans. Inf. Syst. Secur., 2009
J. Comput. Secur., 2009
Comput. Graph. Forum, 2009
Cyberpsychology Behav. Soc. Netw., 2009
Proceedings of the TwentyEigth ACM SIGMODSIGACTSIGART Symposium on Principles of Database Systems, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Database Theory, 2009
Proceedings of the 25th International Conference on Data Engineering, 2009
Proceedings of the 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2009
2008
ACM Trans. Inf. Syst. Secur., 2008
Inf. Process. Lett., 2008
Internet addiction: Metasynthesis of qualitative research for the decade 19962006.
Comput. Hum. Behav., 2008
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008
Proceedings of the International Conference on Information Systems, 2008
Efficient Data Authentication in an Environment of Untrusted ThirdParty Distributors.
Proceedings of the 24th International Conference on Data Engineering, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Binding software to specific native hardware in a VM environment: the puf challenge and opportunity.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008
2007
IACR Cryptol. ePrint Arch., 2007
DiscrepancySensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2d Nearest Neighbors in Any Minkowski Metric.
Proceedings of the Algorithms and Data Structures, 10th International Workshop, 2007
Proceedings of the 2007 USENIX Annual Technical Conference, 2007
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
2006
VLDB J., 2006
IEEE Trans. Knowl. Data Eng., 2006
IEEE Trans. Computers, 2006
Digit. Investig., 2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the Network and Distributed System Security Symposium, 2006
The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions.
Proceedings of the 8th workshop on Multimedia & Security, 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006
Proceedings of the Computing and Combinatorics, 12th Annual International Conference, 2006
2005
IEEE Trans. Knowl. Data Eng., 2005
A TreeBased Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming.
IEEE Trans. Knowl. Data Eng., 2005
Knowl. Inf. Syst., 2005
ACM J. Exp. Algorithmics, 2005
Int. J. Inf. Sec., 2005
Proceedings of the Proceedings 6th ACM Conference on Electronic Commerce (EC2005), 2005
Proceedings of the 2005 SIAM International Conference on Data Mining, 2005
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
Proceedings of the High Performance Computing, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
Proceedings of the ACSW Frontiers 2005, 2005 ACSW Workshops, 2005
Proceedings of the ACSW Frontiers 2005, 2005 ACSW Workshops, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
Proceedings of the Practical Handbook of Internet Computing., 2004
IEEE Trans. Knowl. Data Eng., 2004
IEEE Data Eng. Bull., 2004
Concurr. Pract. Exp., 2004
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004
Proceedings of the (e)Proceedings of the Thirtieth International Conference on Very Large Data Bases, VLDB 2004, Toronto, Canada, August 31, 2004
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004
A hierarchical protocol for increasing the stealthiness of steganographic methods.
Proceedings of the 6th workshop on Multimedia & Security, 2004
Proceedings of the IEEE/ACS International Conference on Pervasive Services (ICPS'04), 2004
Proceedings of the 4th IEEE International Conference on Data Mining (ICDM 2004), 2004
Proceedings of the 20th International Conference on Data Engineering, 2004
Proceedings of the Biometric Authentication, First International Conference, 2004
Proceedings of the Computer Security, 2004
2003
Inf. Sci., 2003
Algorithmica, 2003
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003
Proceedings of the Algorithms and Data Structures, 8th International Workshop, 2003
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003
Proceedings of the Digital Watermarking, Second International Workshop, 2003
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003
2002
Inf. Comput., 2002
Proceedings of the Principles of Data Mining and Knowledge Discovery, 2002
Proceedings of the Digital Watermarking, First International Workshop, 2002
Proceedings of the Information Hiding, 5th International Workshop, 2002
A Secure Protocol for Computing DotProducts in Clustered and Distributed Environments.
Proceedings of the 31st International Conference on Parallel Processing (ICPP 2002), 2002
Multiple and Partial Periodicity Mining in Time Series Databases.
Proceedings of the 15th European Conference on Artificial Intelligence, 2002
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002
Proceedings of the A Roadmap for Computational Linguistics@COLING 2002, Taipei, Taiwan, August 24, 2002
2001
Proceedings of the ECommerce Security and Privacy, 2001
Faster image template matching in the sum of the absolute value of differences measure.
IEEE Trans. Image Process., 2001
IEEE Trans. Computers, 2001
On Connecting Red and Blue Rectilinear Polygonal Obstacles with Nonintersecting Monotone Rectilinear Paths.
Int. J. Comput. Geom. Appl., 2001
Algorithmica, 2001
Adv. Comput., 2001
Proceedings of the Algorithms and Data Structures, 7th International Workshop, 2001
Secure multiparty computation problems and their applications: a review and open problems.
Proceedings of the New Security Paradigms Workshop 2001, 2001
Natural Language Watermarking: Design, Analysis, and a ProofofConcept Implementation.
Proceedings of the Information Hiding, 4th International Workshop, 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW14 2001), 2001
Proceedings of the Security and Privacy in Digital Rights Management, 2001
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
2000
Parallel Algorithms for Maximum Matching in Complements of Interval Graphs and Related Problems.
Algorithmica, 2000
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000
Natural language processing for information assurance and security: an overview and implementations.
Proceedings of the 2000 Workshop on New Security Paradigms, 2000
Proceedings of the Handbook of Computational Geometry, 2000
1999
Parallel Algorithms for Longest Increasing Chains in the Plane and Related Problems.
Parallel Process. Lett., 1999
IEEE Trans. Pattern Anal. Mach. Intell., 1999
Int. J. Comput. Geom. Appl., 1999
Proceedings of the Security and Watermarking of Multimedia Contents, 1999
1998
IEEE Trans. Computers, 1998
Proceedings of the Computing and Combinatorics, 4th Annual International Conference, 1998
1997
Proceedings of the Algorithms and Computation, 8th International Symposium, 1997
Parallel computations of Levenshtein distances.
Proceedings of the Pattern Matching Algorithms, 1997
1996
Proceedings of the 5th Workshop on Enabling Technologies, 1996
Proceedings of the Algorithms and Computation, 7th International Symposium, 1996
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996
Proceedings of the 6th Data Compression Conference (DCC '96), Snowbird, Utah, USA, March 31, 1996
1995
IEEE Trans. Computers, 1995
Int. J. Comput. Geom. Appl., 1995
Comput. Geom., 1995
An Optimal Algorithm for Shortest Paths on Weighted Interval and CircularArc Graphs, with Applications.
Algorithmica, 1995
Proceedings of IPPS '95, 1995
1994
J. Parallel Distributed Comput., 1994
J. Parallel Distributed Comput., 1994
J. ACM, 1994
Proceedings of the Graph Drawing, DIMACS International Workshop, 1994
Proceedings of the Tenth Annual Symposium on Computational Geometry, 1994
1993
Inf. Comput., November, 1993
Random Struct. Algorithms, 1993
Int. J. Comput. Geom. Appl., 1993
New Clique and Independent Set Algorithms for Circle Graphs (Discrete Applied Mathematics 36 (1992) 124).
Discret. Appl. Math., 1993
Comput. Geom., 1993
Algorithmica, 1993
Proceedings of the Algorithms and Data Structures, Third Workshop, 1993
1992
Proc. IEEE, 1992
Models and Algorithms for Coscheduling ComputeIntensive Tasks on a Network of Workstations.
J. Parallel Distributed Comput., 1992
J. Algorithms, 1992
Discret. Appl. Math., 1992
Discret. Appl. Math., 1992
Algorithmica, 1992
Editor's Foreword: Special Issue on the Sixth Annual Symposium on Computational Geometry.
Algorithmica, 1992
Pattern Matching With Mismatches: A Probabilistic Analysis and a Randomized Algorithm (Extended Abstract).
Proceedings of the Combinatorial Pattern Matching, Third Annual Symposium, 1992
1991
Pattern Recognit., 1991
An Optimal Parallel Algorithm for the Visibility of a Simple Polygon from a Point.
J. ACM, 1991
Concurr. Pract. Exp., 1991
Comput. Geom., 1991
Algorithmica, 1991
Multisearch Techniques for Implementing Data Structures on a MeshConnected Computer (Preliminary Version).
Proceedings of the 3rd Annual ACM Symposium on Parallel Algorithms and Architectures, 1991
Coscheduling computeintensive tasks on a network of workstations: model and algorithms.
Proceedings of the 10th International Conference on Distributed Computing Systems (ICDCS 1991), 1991
1990
SIAM J. Comput., 1990
J. Parallel Distributed Comput., 1990
An InputSize/OutputSize TradeOff in the TimeComplexity of Rectilinear Hidden Surface Removal (Preliminary Version).
Proceedings of the Automata, Languages and Programming, 17th International Colloquium, 1990
1989
SIAM J. Comput., 1989
Inf. Process. Lett., 1989
Algorithmica, 1989
Proceedings of the Algorithms and Data Structures, 1989
Proceedings of the ACM Symposium on Parallel Algorithms and Architectures, 1989
Proceedings of the Fifth Annual Symposium on Computational Geometry, 1989
1988
IEEE Trans. Computers, 1988
Efficient Solutions to Some Transportation Problems with Applications to Minimizing Robot Arm Travel.
SIAM J. Comput., 1988
J. ACM, 1988
Inf. Process. Lett., 1988
Discret. Appl. Math., 1988
Algorithmica, 1988
1987
J. Algorithms, 1987
Inf. Process. Lett., 1987
1986
IEEE Trans. Computers, 1986
J. Parallel Distributed Comput., 1986
J. Algorithms, 1986
Inf. Control., 1986
Discret. Appl. Math., 1986
Discret. Appl. Math., 1986
Optimal Simulations between MeshConnected Arrays of Processors (Preliminary Version)
Proceedings of the 18th Annual ACM Symposium on Theory of Computing, 1986
Proceedings of the Second Annual ACM SIGACT/SIGGRAPH Symposium on Computational Geometry, 1986
1985
IEEE Trans. Computers, 1985
IEEE Trans. Computers, 1985
J. Comput. Syst. Sci., 1985
Efficient Parallel Solutions to Geometric Problems.
Proceedings of the International Conference on Parallel Processing, 1985
Proceedings of the 26th Annual Symposium on Foundations of Computer Science, 1985
1984
J. Comput. Syst. Sci., 1984
J. ACM, 1984
Inf. Process. Lett., 1984
Int. J. Parallel Program., 1984
1983
Inf. Process. Lett., 1983
Proceedings of the 24th Annual Symposium on Foundations of Computer Science, 1983
1982
SIAM J. Comput., 1982
Proceedings of the 14th Annual ACM Symposium on Theory of Computing, 1982
1981
Inf. Process. Lett., 1981