Follow
Mummoorthy Murugesan
Mummoorthy Murugesan
Turn Inc
Verified email at turn.com
Title
Cited by
Cited by
Year
Uncheatable grid computing
W Du, J Jia, M Mangal, M Murugesan
24th International Conference on Distributed Computing Systems, 2004 …, 2004
2172004
Efficient privacy-preserving similar document detection
M Murugesan, W Jiang, C Clifton, L Si, J Vaidya
The VLDB Journal 19 (4), 457-475, 2010
1062010
Providing privacy through plausibly deniable search
M Murugesan, C Clifton
Proceedings of the 2009 SIAM International Conference on Data Mining, 768-779, 2009
942009
Similar document detection with limited information disclosure
W Jiang, M Murugesan, C Clifton, L Si
2008 IEEE 24th International Conference on Data Engineering, 735-743, 2008
852008
t-Plausibility: Generalizing words to desensitize text.
B Anandan, C Clifton, W Jiang, M Murugesan, P Pastrana-Camacho, L Si
Trans. Data Priv. 5 (3), 505-534, 2012
812012
t-plausibility: Semantic preserving text sanitization
W Jiang, M Murugesan, C Clifton, L Si
2009 International Conference on Computational Science and Engineering 3, 68-75, 2009
422009
Is privacy still an issue for data mining?
C Clifton, W Jiang, M Murugesan, ME Nergiz
Next Generation of Data Mining, 383-400, 2008
132008
Plausibly deniable search
M Murugesan, C Clifton
Proceedings of the Workshop on Secure Knowledge Management (SKM 2008), 3-4, 2008
92008
Providing privacy through plausibly deniable search
CW Clifton, M Murugesan, CW Clifton, M Murugesan
Sparks, Nevada”, April 2009, 2009
42009
k-out-of-n oblivious transfer based on homomorphic encryption and solvability of linear equations
M Murugesan, W Jiang, AE Nergiz, S Uzunbaz
Proceedings of the first ACM conference on Data and application security and …, 2011
22011
Secure content validation
M Murugesan, W Jiang
2007 IEEE 23rd International Conference on Data Engineering Workshop, 157-162, 2007
22007
Privacy through deniable search
M Murugesan
Purdue University, 2010
12010
Uncheatable grid computing
W Du, M Murugesan, J Jia
Algorithms and Theory of Computation Handbook, Second Edition, Volume 2 …, 2009
12009
Homomorphic Encryption based k-out-of-n Oblivious Transfer Protocols
M Murugesan, W Jiang, E Nergiz, S Uzunbaz
12009
Discovering and Sharing Sensitive Text
C Clifton, M Murugesan, L Si, R Adams, W Jiang
2008
Secure similar document detection
W Jiang, M Murugesan, C Clifton, L Si
Proceedings of the 9th Annual Information Security Symposium, 1-1, 2008
2008
Uncheatable Master-worker Grid Computing and Its Application in Drug Discovery
M Murugesan
Syracuse University, 2004
2004
The system can't perform the operation now. Try again later.
Articles 1–17