M
Marina Blanton
Researcher at University at Buffalo
Publications - 90
Citations - 3905
Marina Blanton is an academic researcher from University at Buffalo. The author has contributed to research in topics: Secure multi-party computation & Computer security model. The author has an hindex of 31, co-authored 86 publications receiving 3523 citations. Previous affiliations of Marina Blanton include Purdue University & University of Notre Dame.
Papers
More filters
Journal ArticleDOI
Internet Addiction: Metasynthesis of 1996–2006 Quantitative Research
Sookeun Byun,Celestino Ruffini,Juline E. Mills,Alecia C. Douglas,Mamadou Niang,Svetlana Stepchenkova,Seul Ki Lee,Jihad Loutfi,Jung-Kook Lee,Mikhail J. Atallah,Marina Blanton +10 more
TL;DR: The analysis showed that previous studies have utilized inconsistent criteria to define Internet addicts, applied recruiting methods that may cause serious sampling bias, and examined data using primarily exploratory rather than confirmatory data analysis techniques to investigate the degree of association rather than causal relationships among variables.
Journal ArticleDOI
Dynamic and Efficient Key Management for Access Hierarchies
TL;DR: The security of the scheme is based on pseudorandom functions, without reliance on the Random Oracle Model, and it is shown how to handle extensions proposed by Crampton [2003] of the standard hierarchies to “limited depth” and reverse inheritance.
Journal ArticleDOI
Internet addiction: Meta-synthesis of qualitative research for the decade 1996-2006
Alecia C. Douglas,Juline E. Mills,Mamadou Niang,Svetlana Stepchenkova,Sookeun Byun,Celestino Ruffini,Seul Ki Lee,Jihad Loutfi,Jung-Kook Lee,Mikhail J. Atallah,Marina Blanton +10 more
TL;DR: This study provides an in-depth and comprehensive analysis of internet addiction through a meta-synthesis of qualitative studies on excessive Internet use published during the period of 1996-2006.
Proceedings ArticleDOI
Secure Multi-Party Computation
TL;DR: This tutorial provides a comprehensive coverage of SMC techniques, starting from precise definitions and fundamental techniques and includes the-state-of-the-art protocols for oblivious transfer (OT) and OT extension in the presence of semi-honest and malicious users.
Proceedings ArticleDOI
Dynamic and efficient key management for access hierarchies
TL;DR: This work is the first to achieve a worst- and average-case number of bit operations for key derivation that is exponentially better than the depth of a balanced hierarchy (double-exponentially better if the hierarchy is unbalanced); this is achieved with only a constant increase in the space for the hierarchy.