Stephen R. Tate
According to our database^{1},
Stephen R. Tate
authored at least 41 papers
between 1990 and 2016.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Homepage:

at www.uncg.edu
On csauthors.net:
Bibliography
2016
Randomized Searching on Rays or the Line.
Encyclopedia of Algorithms, 2016
2015
Expiration and Revocation of Keys for Attributebased Signatures.
IACR Cryptology ePrint Archive, 2015
2014
Active learning during lecture using tablets.
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014
2013
Encrypted Secret Sharing and Analysis by Plaintext Randomization.
IACR Cryptology ePrint Archive, 2013
Multiuser dynamic proofs of data possession using trusted hardware.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
2011
General Secure Function Evaluation using standard trusted computing hardware.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
Computer Science and Information Technology (CSIT) Identity: An Integrative Theory to Explain Gender Gap in IT.
Proceedings of the International Conference on Information Systems, 2011
2010
A Distributed Public Key Caching Scheme in Large Wireless Networks.
Proceedings of the Global Communications Conference, 2010
2009
Improving CutandChoose in Verifiable Encryption and Fair Exchange Protocols using Trusted Computing Technology.
IACR Cryptology ePrint Archive, 2009
2008
Randomized Searching on Rays or the Line.
Proceedings of the Encyclopedia of Algorithms  2008 Edition, 2008
Generalized NonInteractive Oblivious Transfer Using CountLimited Objects with Applications to Secure Mobile Agents.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Online/Offline Signature Schemes for Devices with Limited Computing Capabilities.
Proceedings of the Topics in Cryptology, 2008
2007
A Direct Anonymous Attestation Scheme for Embedded Devices.
Proceedings of the Public Key Cryptography, 2007
An Online/Offline Signature Scheme Based on the Strong RSA Assumption.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Efficient Authenticated KeyExchange for Devices with a Trusted Manager.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006
A group signature scheme with signature claiming and variable linkability.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
Traceable Signature: Better Efficiency and Beyond.
Proceedings of the Computational Science and Its Applications, 2006
SAgent: a security framework for JADE.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006
2005
ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention.
J. UCS, 2005
2004
Performance Evaluation of Data Integrity Mechanisms for Mobile Agents.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Universally Composable Secure Mobile Agent Computation.
Proceedings of the Information Security, 7th International Conference, 2004
2003
Mobile Agent Security Through MultiAgent Cryptographic Protocols.
Proceedings of the International Conference on Internet Computing, 2003
2001
The Risk Profile Problem for Stock Portfolio Optimization
CoRR, 2001
2000
The risk profile problem for stock portfolio optimization (extended abstract).
Proceedings of the ThirtySecond Annual ACM Symposium on Theory of Computing, 2000
1999
OnLine Difference Maximization.
SIAM J. Discrete Math., 1999
Designing Proxies for Stock Market Indices is Computationally Hard.
Proceedings of the Tenth Annual ACMSIAM Symposium on Discrete Algorithms, 1999
1998
Higher Compression from the BurrowsWheeler Transform by Modified Sorting.
Proceedings of the Data Compression Conference, 1998
1997
Band Ordering in Lossless Compression of Multispectral Images.
IEEE Trans. Computers, 1997
On Dynamic Algorithms for Algebraic Problems.
J. Algorithms, 1997
1996
Searching in an Unknown Environment: An Optimal Randomized Algorithm for the CowPath Problem.
Inf. Comput., 1996
1995
Stable computation of the complex roots of unity.
IEEE Trans. Signal Processing, 1995
Book Reviews.
SIGACT News, 1995
1994
Dynamic Parallel Tree Contraction (Extended Abstract).
Proceedings of the 6th Annual ACM Symposium on Parallel Algorithms and Architectures, 1994
Dynamic Algebraic Algorithms.
Proceedings of the Fifth Annual ACMSIAM Symposium on Discrete Algorithms. 2325 January 1994, 1994
1993
Continuous Alternation: The Complexity of Pursuit in Continuous Domains.
Algorithmica, 1993
The Complexity of Nbody Simulation.
Proceedings of the Automata, Languages and Programming, 20nd International Colloquium, 1993
1992
On Threshold Circuits and Polynomial Computation.
SIAM J. Comput., 1992
The Power of Combining the Techiques of Algebraic and Numerical Computing: Improved Approximate Multipoint Polynomial Evaluation and Improved Multipole Algorithms
Proceedings of the 33rd Annual Symposium on Foundations of Computer Science, 1992
1991
Online Matching with Blocked Input.
Inf. Process. Lett., 1991
1990
Optimal Size Integer Division Circuits.
SIAM J. Comput., 1990