Marina Blanton's Publications

Pre-print

M. Blanton and F. Bayatbabolghani, Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation, Cryptology ePrint Archive Report 2015/422, 2015.

Y. Zhang, M. Blanton, and G. Almashaqbeh, Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler, arXiv Report 1509.01763, 2015.

Books

M. Atallah and M. Blanton (Editors), Algorithms and Theory of Computation Handbook. Volume I: General Concepts and Techniques, Chapman & Hall/CRC, 2009.

M. Atallah and M. Blanton (Editors), Algorithms and Theory of Computation Handbook. Volume II: Special Topics and Techniques, Chapman & Hall/CRC, 2009.

In Books

M. Blanton and P. Gasti, Secure and Efficient Iris and Fingerprint Identification, Chapter 9 in Biometric Security, D. Ngo, A. Teoh, and J. Hu (Editors), Cambridge Scholars Publishing, Jan. 2015.

E. Aguiar, Y. Zhang, and M. Blanton, An Overview of Issues and Recent Developments in Cloud Computing and Storage Security, Chapter in High Performance Cloud Auditing and Applications, B.-Y. Choi, K. Han, and S. Song (Editors), Springer, 2014.

M. Blanton, Authentication, Regular Entry in Encyclopedia of Database Systems, L. Liu and T. Ozsu (Editors), 2009.

M. Blanton, Hash Functions, Short Entry in Encyclopedia of Database Systems, L. Liu and T. Ozsu (Editors), 2009.

M. Blanton, Message Authentication Codes, Short Entry in Encyclopedia of Database Systems, L. Liu and T. Ozsu (Editors), 2009.

In Journals

M. Blanton and F. Bayatbabolghani, Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation, Proceedings on Privacy Enhancing Technologies (PoPETs), No. 4, 21 pages, 2016. Also in Privacy Enhancing Technologies Symposium (PETS), July 2016.

M. Blanton and E. Aguiar, Private and Oblivious Set and Multiset Operations, International Journal of Information Security, 2016.

Y. Zhang and M. Blanton, Efficient Dynamic Provable Possession of Remote Data via Update Trees, ACM Transactions on Storage (TOS), Vol. 12, No. 2, Article 9, 45 pages, Feb. 2016.

Y. Zhang, M. Blanton, and G. Almashaqbeh, Secure Distributed Genome Analysis for GWAS and Sequence Comparison Computation, special issue of BMC Medical Informatics and Decision Making Journal, Vol. 15, Suppl. 5, Art. S5, Dec. 2015.

M. Blanton, Y. Zhang, and K. Frikken, Secure and Verifiable Outsourcing of Large-Scale Biometric Computations, ACM Transactions on Information and System Security (TISSEC), Vol. 16, No. 3, Nov. 2013.

M. Blanton and M. Aliasgari, Analysis of Reusability of Secure Sketches and Fuzzy Extractors, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 8, No. 9, pp. 1433-1445, Sep. 2013.

T. R. Hoens, M. Blanton, A. Steele, and N. Chawla, Reliable Medical Recommendation Systems with Patient Privacy, ACM Transactions on Intelligent Systems and Technology (TIST), Special Issue on Intelligent Systems for Health Informatics, Vol. 4, No. 4, 31 pages, 2013.

M. Blanton and M. Aliasgari, Secure Outsourced Computation of Iris Matching, Journal of Computer Security, Vol. 20, No. 2-3, pp. 259-305, 2012.

V. Deshpande, L. Schwarz, M. Atallah, M. Blanton, and K. Frikken, Outsourcing Manufacturing: Secure Price-Masking Mechanisms for Purchasing Component Parts, Production and Operations Management (POMS), Vol. 20, No. 2, Mar. 2011.

S. Byun, C. Ruffini, J. Mills, A. Douglas, M. Niang, S. Stepchenkova, S. Lee, J. Loutfi, J.-K. Lee, M. Atallah, and M. Blanton, Internet Addiction: Metasynthesis of 1996-2006 Quantitative Research, CyberPsychology & Behavior, Vol. 12, No. 2, Apr. 2009.

M. Atallah, M. Blanton, N. Fazio, and K. Frikken, Dynamic and Efficient Key Management for Access Hierarchies, ACM Transactions on Information and System Security (TISSEC), Vol. 12, No. 3, Jan. 2009. (supersedes AFB05 and ABF06)

A. Douglas, J. Mills, M. Niang, S. Stepchenkova, S. Byun, C. Ruffini, S. Lee, J. Loutfi, J.-K. Lee, M. Atallah, and M. Blanton, Internet Addiction: Meta-Synthesis of Qualitative Research for the Decade 1996-2006, Computer in Human Behavior, Vol. 24, No. 6, Sep. 2008.

M. Blanton and M. Atallah, Succinct Representation of Flexible and Privacy-Preserving Access Rights, Special Issue (Privacy-Preserving Data Management) of the International Journal on Very Large Data Bases (VLDBJ), Vol. 15, No. 4, Nov. 2006. (supersedes AB04 and BA05)

R. Balupari, B. Tjaden, S. Ostermann, M. Bykova, and A. Mitchell, Real-Time Network-Based Anomaly Intrusion Detection, Special Issue (Real Time Security) of the Journal of Parallel and Distributed Computing Practices, Vol. 4, No. 2, Jun. 2001.

In Conference Proceedings

M. Blanton and S. Saraph, Secure and Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification, European Symposium on Research in Computer Security (ESORICS'15), Sep. 2015. ePrint version.

Y. Zhang and M. Blanton, Efficient Secure and Verifiable Outsourcing of Matrix Multiplications, Information Security Conference (ISC'14), Oct. 2014.

Y. Zhang, A. Steele, and M. Blanton, PICCO: A General-Purpose Compiler for Private Distributed Computation, ACM Conference on Computer and Communications Security (CCS'13), Nov. 2013.

M. Aliasgari and M. Blanton, Secure Computation of Hidden Markov Models, International Conference on Security and Cryptography (SECRYPT'13), Jul. 2013.

Y. Zhang and M. Blanton, Efficient Dynamic Provable Possession of Remote Data via Balanced Update Trees, ACM Symposium on Information, Computer and Communications Security (ASIACCS'13), May 2013.

M. Blanton, A. Steele, and M. Aliasgari, Data-Oblivious Graph Algorithms for Secure Computation and Outsourcing, ACM Symposium on Information, Computer and Communications Security (ASIACCS'13), May 2013.

M. Aliasgari, M. Blanton, Y. Zhang, and A. Steele, Secure Computation on Floating Point Numbers, Network and Distributed System Security Symposuim (NDSS'13), Feb. 2013.

M. Blanton, M. Atallah, K. Frikken, and Q. Malluhi, Secure and Efficient Outsourcing of Sequence Comparisons, European Symposium on Research in Computer Security (ESORICS'12), Sep. 2012.

M. Blanton and E. Aguiar, Private and Oblivious Set and Multiset Operations, ACM Symposium on Information, Computer and Communications Security (ASIACCS'12), May 2012.

M. Blanton, Y. Zhang, and K. Frikken, Secure and Verifiable Outsourcing of Large-Scale Biometric Computations, IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT'11), Oct. 2011.

M. Blanton, Achieving Full Security in Privacy-Preserving Data Mining, IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT'11), Oct. 2011.

M. Blanton and P. Gasti, Secure and Efficient Protocols for Iris and Fingerprint Identification, European Symposium on Research in Computer Security (ESORICS'11), Sep. 2011.

M. Blanton and M. Aliasgari, On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security in the Computational Setting, International Conference on Security and Cryptography (SECRYPT'11), Jul. 2011.

T. R. Hoens, M. Blanton, and N. Chawla, Reliable Medical Recommendation Systems with Patient Privacy, ACM International Health Informatics Symposium (IHI'10), Nov. 2010.

P. Gasti, G. Ateniese, and M. Blanton, Deniable Cloud Storage: Sharing Files via Public-Key Deniability, ACM Workshop on Privacy in the Electronic Society (WPES'10), Oct. 2010.

M. Blanton and K. Frikken, Efficient Multi-Dimensional Key Management in Broadcast Services, European Symposium on Research in Computer Security (ESORICS'10), Sep. 2010.

T. R. Hoens, M. Blanton, and N. Chawla, A Private and Reliable Recommendation System for Social Networks, IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT'10), Aug. 2010.

M. Blanton and M. Aliasgari, Secure Outsourcing of DNA Searching via Finite Automata, Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'10), Jun. 2010.

T. Raeder, M. Blanton, N. Chawla, and K. Frikken, Privacy-Preserving Network Aggregation, Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD'10), Jun. 2010.

M. Blanton and W. Hudelson, Biometric-Based Non-Transferable Anonymous Credentials, International Conference on Information and Communications Security (ICICS'09), Dec. 2009.

K. Frikken, M. Blanton, and M. Atallah, Robust Authentication Using Physically Unclonable Functions, Information Security Conference (ISC'09), Sep. 2009.

M. Blanton, Improved Conditional E-Payments, Applied Cryptography and Network Security (ACNS'08), Jun. 2008.

M. Atallah, K. Frikken, M. Blanton, and Y. Cho, Private Combinatorial Group Testing, ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), Mar. 2008.

M. Blanton, Online Subscriptions with Anonymous Access, ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), Mar. 2008.

M. Atallah, M. Blanton, and K. Frikken, Incorporating Temporal Capabilities in Existing Key Management Schemes, European Symposium on Research in Computer Security (ESORICS'07), Sep. 2007. Full version.

M. Atallah, M. Blanton, M. Goodrich, and S. Polu, Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric, Workshop on Algorithms and Data Structures (WADS'07), Aug. 2007.

M. Atallah, M. Blanton, and K. Frikken, Efficient Techniques for Realizing Geo-Spatial Access Control, ACM Symposium on Information, Computer and Communications Security (ASIACCS'07), Mar. 2007. Slides available.

G. Ateniese, M. Blanton, and J. Kirsch, Secret Handshakes with Dynamic and Fuzzy Matching , Network and Distributed System Security Symposuim (NDSS'07), Feb. 2007. Slides available.

M. Atallah, M. Blanton, V. Deshpande, K. Frikken, J. Li, and L. Schwarz, Secure Collaborative Planning, Forecasting, and Replenishment (SCPFR), Multi-Echelon/Public Applications of Supply Chain Management Conference, Jun. 2006.

M. Atallah, M. Blanton, and K. Frikken, Key Management for Non-Tree Access Hierarchies, ACM Symposium on Access Control Models and Technologies (SACMAT'06), Jun. 2006. (superseded by ABFF09)

M. Atallah, M. Blanton, K. Frikken, and J. Li, Efficient Correlated Action Selection, Financial Cryptography and Data Security (FC'06), Feb. 2006. Slides available.

M. Atallah, K. Frikken, and M. Blanton, Dynamic and Efficient Key Management for Access Hierarchies, ACM Conference on Computer and Communications Security (CCS'05), Nov. 2005. Slides available. (superseded by ABFF09)

M. Atallah, M. Blanton, V. Deshpande, K. Frikken, J. Li, and L. Schwarz, Secure Collaborative Planning, Forecasting, and Replenishment (SCPFR), Manufacturing and Service Operation Management (M&SOM), Jun. 2005.

M. Blanton and M. Atallah, Provable Bounds for Portable and Flexible Privacy-Preserving Access Rights, ACM Symposium on Access Control Models and Technologies (SACMAT'05), Jun. 2005. (superseded by BA06)

K. Frikken, M. Atallah, and M. Bykova, Remote Revocation of Smart Cards in a Private DRM System, Australasian Information Security Workshop (AISW'05), Digital Rights Management, Jan. 2005.

M. Atallah, M. Bykova, J. Li, K. Frikken, and M. Topkara, Private Collaborative Forecasting and Benchmarking, ACM Workshop on Privacy in the Electronic Society (WPES'04), Oct. 2004. Slides available.

M. Atallah and M. Bykova, Portable and Flexible Document Access Control Mechanisms, European Symposium on Research in Computer Security (ESORICS'04), Sep. 2004. Slides available. (superseded by BA06)

M. Bykova and M. Atallah, Succinct Specifications of Portable Document Access Policies, ACM Symposium on Access Control Models and Technologies (SACMAT'04), Jun. 2004. Slides available.

M. Bykova and S. Ostermann, Statistical Analysis of Malformed Packets and Their Origins in the Modern Internet, ACM Internet Measurent Workshop (IMW 2002), Nov. 2002. Slides available.

M. Bykova, S. Ostermann, and B. Tjaden, Detecting Network Intrusions via a Statistical Analysis of Network Packet Characteristics, IEEE Southeastern Symposium on System Theory (SSST 2001), Mar. 2001. Slides available.

Theses

M. Blanton, Key Management in Hierarchical Access Control Systems, PhD Thesis, Purdue University, Aug. 2007.

M. Bykova, Statistical Analysis of Malformed Packets and Their Origins in the Modern Internet, Master's Thesis, Ohio University, Mar. 2002. Slides available.

Selected Technical Reports

M. Blanton and M. Aliasgari, Secure Computation of Biometric Matching, CSE Technical Report TR 2009-03, University of Notre Dame, Apr. 2009.

N. Chawla, T. Raeder, M. Blanton, and K. Frikken, Modeling the Product Space as a Network, NET Institute Working Paper No. 08-18, SSRN, Oct. 2008.

M. Atallah, M. Blanton, and K. Frikken, Incorporating Temporal Capabilities in Existing Key Management Schemes, Cryptology ePrint Archive Report 2007/245, IACR, Jun. 2007.

M. Blanton, Empirical Evaluation of Secure Two-Party Computation Models, CERIAS Technical Report TR 2005-58, Purdue University, Aug. 2005.

M. Bykova, What Should a Good Security Model Be? CERIAS Technical Report TR 2004-38, Purdue University, Sep. 2004.