Mikhail Atallah

Results: 22



#Item
1Computer access control / Computer security / Security / Phishing / Password / Multi-factor authentication / Authentication / Transaction authentication number / Passwd / One-time password / Security token

Covert Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication? Mohammed H. Almeshekah, Mikhail J. Atallah, and Eugene H. Spafford Purdue University CERIAS 656 Oval Drive, West Lafaye

Add to Reading List

Source URL: spaf.cerias.purdue.edu

Language: English - Date: 2013-03-04 21:29:09
2

Translation-Based Steganography Christian Grotho Krista Grotho Ludmila Alkhutova Ryan Stutsman Mikhail Atallah CERIAS, Purdue University {christian,krista}@grothoff.org, {lalkhuto,rstutsma}@purdue.edu,

Add to Reading List

Source URL: rstutsman.github.io

Language: English - Date: 2016-01-06 11:53:39
    3

    Translation-Based Steganography Christian Grotho Krista Grotho Ludmila Alkhutova Ryan Stutsman Mikhail Atallah CERIAS, Purdue University {christian,krista}@grothoff.org, {lalkhuto,rstutsma}@purdue.edu,

    Add to Reading List

    Source URL: rstutsman.github.io

    Language: English - Date: 2016-01-06 11:53:39
      4

      Dynamic and Efficient Key Management for Access Hierarchies ∗ Mikhail J. Atallah, Keith B. Frikken, and Marina Blanton Department of Computer Science

      Add to Reading List

      Source URL: www.cse.nd.edu

      Language: English - Date: 2007-08-02 16:59:37
        5

        Efficient Techniques for Realizing Geo-Spatial Access Control Mikhail J. Atallah∗ Marina Blanton†

        Add to Reading List

        Source URL: www.cse.nd.edu

        Language: English - Date: 2007-08-02 16:59:36
          6

          Private Combinatorial Group Testing Mikhail J. Atallah∗ Keith B. Frikken Marina Blanton

          Add to Reading List

          Source URL: www.cse.nd.edu

          Language: English - Date: 2008-01-21 10:54:48
            7

            Achieving Fairness in Private Contract Negotiation ? Keith Frikken and Mikhail Atallah CERIAS and Department of Computer Sciences Purdue University

            Add to Reading List

            Source URL: fc05.ifca.ai

            Language: English - Date: 2005-01-13 10:36:00
              8

              ViWiD : Visible Watermarking based Defense against Phishing Mercan Topkara Ashish Kamra Mikhail J. Atallah Cristina Nita-Rotaru Center for Education and Research in Information Assurance Computer Sciences Department Purd

              Add to Reading List

              Source URL: homes.cerias.purdue.edu

              Language: English - Date: 2005-06-21 14:27:47
                9

                Succinct Specifications of Portable Document Access Policies ∗ Marina Bykova, Mikhail Atallah CERIAS and Computer Sciences Department

                Add to Reading List

                Source URL: www.cse.nd.edu

                Language: English - Date: 2007-08-02 16:59:41
                  10

                  Remote Revocation of Smart Cards in a Private DRM System∗ Keith Frikken Mikhail Atallah Marina Bykova

                  Add to Reading List

                  Source URL: www.cse.nd.edu

                  Language: English - Date: 2007-08-02 16:59:36
                    UPDATE