Uncheatable grid computing W Du, J Jia, M Mangal, M Murugesan 24th International Conference on Distributed Computing Systems, 2004 …, 2004 | 217 | 2004 |
Efficient privacy-preserving similar document detection M Murugesan, W Jiang, C Clifton, L Si, J Vaidya The VLDB Journal 19 (4), 457-475, 2010 | 106 | 2010 |
Providing privacy through plausibly deniable search M Murugesan, C Clifton Proceedings of the 2009 SIAM International Conference on Data Mining, 768-779, 2009 | 94 | 2009 |
Similar document detection with limited information disclosure W Jiang, M Murugesan, C Clifton, L Si 2008 IEEE 24th International Conference on Data Engineering, 735-743, 2008 | 85 | 2008 |
t-Plausibility: Generalizing words to desensitize text. B Anandan, C Clifton, W Jiang, M Murugesan, P Pastrana-Camacho, L Si Trans. Data Priv. 5 (3), 505-534, 2012 | 81 | 2012 |
t-plausibility: Semantic preserving text sanitization W Jiang, M Murugesan, C Clifton, L Si 2009 International Conference on Computational Science and Engineering 3, 68-75, 2009 | 42 | 2009 |
Is privacy still an issue for data mining? C Clifton, W Jiang, M Murugesan, ME Nergiz Next Generation of Data Mining, 383-400, 2008 | 13 | 2008 |
Plausibly deniable search M Murugesan, C Clifton Proceedings of the Workshop on Secure Knowledge Management (SKM 2008), 3-4, 2008 | 9 | 2008 |
Providing privacy through plausibly deniable search CW Clifton, M Murugesan, CW Clifton, M Murugesan Sparks, Nevada”, April 2009, 2009 | 4 | 2009 |
k-out-of-n oblivious transfer based on homomorphic encryption and solvability of linear equations M Murugesan, W Jiang, AE Nergiz, S Uzunbaz Proceedings of the first ACM conference on Data and application security and …, 2011 | 2 | 2011 |
Secure content validation M Murugesan, W Jiang 2007 IEEE 23rd International Conference on Data Engineering Workshop, 157-162, 2007 | 2 | 2007 |
Privacy through deniable search M Murugesan Purdue University, 2010 | 1 | 2010 |
Uncheatable grid computing W Du, M Murugesan, J Jia Algorithms and Theory of Computation Handbook, Second Edition, Volume 2 …, 2009 | 1 | 2009 |
Homomorphic Encryption based k-out-of-n Oblivious Transfer Protocols M Murugesan, W Jiang, E Nergiz, S Uzunbaz | 1 | 2009 |
Discovering and Sharing Sensitive Text C Clifton, M Murugesan, L Si, R Adams, W Jiang | | 2008 |
Secure similar document detection W Jiang, M Murugesan, C Clifton, L Si Proceedings of the 9th Annual Information Security Symposium, 1-1, 2008 | | 2008 |
Uncheatable Master-worker Grid Computing and Its Application in Drug Discovery M Murugesan Syracuse University, 2004 | | 2004 |