Stephen R. Tate

According to our database1, Stephen R. Tate authored at least 41 papers between 1990 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 





Randomized Searching on Rays or the Line.
Encyclopedia of Algorithms, 2016

Expiration and Revocation of Keys for Attribute-based Signatures.
IACR Cryptology ePrint Archive, 2015

Active learning during lecture using tablets.
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

Encrypted Secret Sharing and Analysis by Plaintext Randomization.
IACR Cryptology ePrint Archive, 2013

Multi-user dynamic proofs of data possession using trusted hardware.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

General Secure Function Evaluation using standard trusted computing hardware.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Computer Science and Information Technology (CSIT) Identity: An Integrative Theory to Explain Gender Gap in IT.
Proceedings of the International Conference on Information Systems, 2011

A Distributed Public Key Caching Scheme in Large Wireless Networks.
Proceedings of the Global Communications Conference, 2010

Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols using Trusted Computing Technology.
IACR Cryptology ePrint Archive, 2009

Randomized Searching on Rays or the Line.
Proceedings of the Encyclopedia of Algorithms - 2008 Edition, 2008

Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Online/Offline Signature Schemes for Devices with Limited Computing Capabilities.
Proceedings of the Topics in Cryptology, 2008

A Direct Anonymous Attestation Scheme for Embedded Devices.
Proceedings of the Public Key Cryptography, 2007

An Online/Offline Signature Scheme Based on the Strong RSA Assumption.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Efficient Authenticated Key-Exchange for Devices with a Trusted Manager.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

A group signature scheme with signature claiming and variable linkability.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

Traceable Signature: Better Efficiency and Beyond.
Proceedings of the Computational Science and Its Applications, 2006

SAgent: a security framework for JADE.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention.
J. UCS, 2005

Performance Evaluation of Data Integrity Mechanisms for Mobile Agents.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Universally Composable Secure Mobile Agent Computation.
Proceedings of the Information Security, 7th International Conference, 2004

Mobile Agent Security Through Multi-Agent Cryptographic Protocols.
Proceedings of the International Conference on Internet Computing, 2003

The Risk Profile Problem for Stock Portfolio Optimization
CoRR, 2001

The risk profile problem for stock portfolio optimization (extended abstract).
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000

On-Line Difference Maximization.
SIAM J. Discrete Math., 1999

Designing Proxies for Stock Market Indices is Computationally Hard.
Proceedings of the Tenth Annual ACM-SIAM Symposium on Discrete Algorithms, 1999

Higher Compression from the Burrows-Wheeler Transform by Modified Sorting.
Proceedings of the Data Compression Conference, 1998

Band Ordering in Lossless Compression of Multispectral Images.
IEEE Trans. Computers, 1997

On Dynamic Algorithms for Algebraic Problems.
J. Algorithms, 1997

Searching in an Unknown Environment: An Optimal Randomized Algorithm for the Cow-Path Problem.
Inf. Comput., 1996

Stable computation of the complex roots of unity.
IEEE Trans. Signal Processing, 1995

Book Reviews.
SIGACT News, 1995

Dynamic Parallel Tree Contraction (Extended Abstract).
Proceedings of the 6th Annual ACM Symposium on Parallel Algorithms and Architectures, 1994

Dynamic Algebraic Algorithms.
Proceedings of the Fifth Annual ACM-SIAM Symposium on Discrete Algorithms. 23-25 January 1994, 1994

Continuous Alternation: The Complexity of Pursuit in Continuous Domains.
Algorithmica, 1993

The Complexity of N-body Simulation.
Proceedings of the Automata, Languages and Programming, 20nd International Colloquium, 1993

On Threshold Circuits and Polynomial Computation.
SIAM J. Comput., 1992

The Power of Combining the Techiques of Algebraic and Numerical Computing: Improved Approximate Multipoint Polynomial Evaluation and Improved Multipole Algorithms
Proceedings of the 33rd Annual Symposium on Foundations of Computer Science, 1992

Online Matching with Blocked Input.
Inf. Process. Lett., 1991

Optimal Size Integer Division Circuits.
SIAM J. Comput., 1990