Mummoorthy Murugesan
Mummoorthy Murugesan
Turn Inc
Verified email at turn.com
Title
Cited by
Cited by
Year
Algorithms and theory of computation handbook, volume 2: special topics and techniques
MJ Atallah, M Blanton
CRC press, 2009
818*2009
Uncheatable grid computing
W Du, J Jia, M Mangal, M Murugesan
24th International Conference on Distributed Computing Systems, 2004 …, 2004
1892004
Efficient privacy-preserving similar document detection
M Murugesan, W Jiang, C Clifton, L Si, J Vaidya
The VLDB Journal 19 (4), 457-475, 2010
822010
Similar document detection with limited information disclosure
W Jiang, M Murugesan, C Clifton, L Si
2008 IEEE 24th International Conference on Data Engineering, 735-743, 2008
782008
Providing privacy through plausibly deniable search
M Murugesan, C Clifton
Proceedings of the 2009 SIAM International Conference on Data Mining, 768-779, 2009
722009
t-Plausibility: Generalizing Words to Desensitize Text.
B Anandan, C Clifton, W Jiang, M Murugesan, P Pastrana-Camacho, L Si
Trans. Data Priv. 5 (3), 505-534, 2012
372012
t-plausibility: Semantic preserving text sanitization
W Jiang, M Murugesan, C Clifton, L Si
2009 International Conference on Computational Science and Engineering 3, 68-75, 2009
332009
Is privacy still an issue for data mining?
C Clifton, W Jiang, M Murugesan, ME Nergiz
Next Generation of Data Mining, 2008
122008
Plausibly deniable search
M Murugesan, C Clifton
Proceedings of the Workshop on Secure Knowledge Management (SKM 2008), 3-4, 2008
82008
Computational Geometry II.
D Lee
Algorithms and theory of computation handbook, 20-1, 1999
71999
Providing privacy through plausibly deniable search
CW Clifton, M Murugesan, CW Clifton, M Murugesan
Sparks, Nevada”, April 2009, 2009
42009
Secure content validation
M Murugesan, W Jiang
2007 IEEE 23rd International Conference on Data Engineering Workshop, 157-162, 2007
22007
k-out-of-n oblivious transfer based on homomorphic encryption and solvability of linear equations
M Murugesan, W Jiang, AE Nergiz, S Uzunbaz
Proceedings of the first ACM conference on Data and application security and …, 2011
12011
Privacy through deniable search
M Murugesan
Purdue University, 2010
12010
Homomorphic Encryption based k-out-of-n Oblivious Transfer Protocols
M Murugesan, W Jiang, E Nergiz, S Uzunbaz
12009
Discovering and Sharing Sensitive Text
C Clifton, M Murugesan, L Si, R Adams, W Jiang
2008
Secure similar document detection
W Jiang, M Murugesan, C Clifton, L Si
Proceedings of the 9th Annual Information Security Symposium, 1-1, 2008
2008
Uncheatable Master-worker Grid Computing and Its Application in Drug Discovery
M Murugesan
Syracuse University, 2004
2004
The system can't perform the operation now. Try again later.
Articles 1–18