Marina Blanton
Orcid: 0009-0008-9934-2700Affiliations:
- State University of New York at Buffalo, Department of Computer Science and Engineering, NY, USA
- University of Notre Dame, Department of Computer Science and Engineering, IN, USA (former)
According to our database1,
Marina Blanton
authored at least 76 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on cse.nd.edu
On csauthors.net:
Bibliography
2024
Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits.
Proc. Priv. Enhancing Technol., January, 2024
IACR Cryptol. ePrint Arch., 2024
Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
2023
Proc. Priv. Enhancing Technol., July, 2023
Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning.
Proc. Priv. Enhancing Technol., January, 2023
2021
2019
Secure pattern matching based on bit parallelism - Non-interactive protocols for non-deterministic string matching automata evaluation.
Int. J. Inf. Sec., 2019
Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority.
IACR Cryptol. ePrint Arch., 2019
2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler.
ACM Trans. Priv. Secur., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model.
Int. J. Inf. Sec., 2017
Improving the Security and Efficiency of Private Genomic Computation Using Server Aid.
IEEE Secur. Priv., 2017
IACR Cryptol. ePrint Arch., 2017
2016
ACM Trans. Storage, 2016
Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation.
Proc. Priv. Enhancing Technol., 2016
2015
BMC Medical Informatics Decis. Mak., December, 2015
Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification.
Proceedings of the Computer Security - ESORICS 2015, 2015
2014
IACR Cryptol. ePrint Arch., 2014
2013
ACM Trans. Intell. Syst. Technol., 2013
ACM Trans. Inf. Syst. Secur., 2013
IEEE Trans. Inf. Forensics Secur., 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
On the (Non-)reusability of Fuzzy Sketches and Extractors and Security in the Computational Setting.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2010
Proceedings of the ACM International Health Informatics Symposium, 2010
Proceedings of the Computer Security, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
2009
Proceedings of the Encyclopedia of Database Systems, 2009
ACM Trans. Inf. Syst. Secur., 2009
Cyberpsychology Behav. Soc. Netw., 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
2008
Comput. Hum. Behav., 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric.
Proceedings of the Algorithms and Data Structures, 10th International Workshop, 2007
Proceedings of the Network and Distributed System Security Symposium, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
2006
VLDB J., 2006
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Proceedings of the Financial Cryptography and Data Security, 2006
2005
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
Proceedings of the ACSW Frontiers 2005, 2005 ACSW Workshops, 2005
2004
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004
Proceedings of the Computer Security, 2004
2002
Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop, 2002
2001
Parallel Distributed Comput. Pract., 2001