Stephen R. Tate

According to our database1, Stephen R. Tate authored at least 41 papers between 1990 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2016
Randomized Searching on Rays or the Line.
Encyclopedia of Algorithms, 2016

2015
Expiration and Revocation of Keys for Attribute-based Signatures.
IACR Cryptology ePrint Archive, 2015

2014
Active learning during lecture using tablets.
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

2013
Encrypted Secret Sharing and Analysis by Plaintext Randomization.
IACR Cryptology ePrint Archive, 2013

Multi-user dynamic proofs of data possession using trusted hardware.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2011
General Secure Function Evaluation using standard trusted computing hardware.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Computer Science and Information Technology (CSIT) Identity: An Integrative Theory to Explain Gender Gap in IT.
Proceedings of the International Conference on Information Systems, 2011

2010
A Distributed Public Key Caching Scheme in Large Wireless Networks.
Proceedings of the Global Communications Conference, 2010

2009
Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols using Trusted Computing Technology.
IACR Cryptology ePrint Archive, 2009

2008
Randomized Searching on Rays or the Line.
Proceedings of the Encyclopedia of Algorithms - 2008 Edition, 2008

Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Online/Offline Signature Schemes for Devices with Limited Computing Capabilities.
Proceedings of the Topics in Cryptology, 2008

2007
A Direct Anonymous Attestation Scheme for Embedded Devices.
Proceedings of the Public Key Cryptography, 2007

An Online/Offline Signature Scheme Based on the Strong RSA Assumption.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Efficient Authenticated Key-Exchange for Devices with a Trusted Manager.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

A group signature scheme with signature claiming and variable linkability.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

Traceable Signature: Better Efficiency and Beyond.
Proceedings of the Computational Science and Its Applications, 2006

SAgent: a security framework for JADE.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

2005
ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention.
J. UCS, 2005

2004
Performance Evaluation of Data Integrity Mechanisms for Mobile Agents.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Universally Composable Secure Mobile Agent Computation.
Proceedings of the Information Security, 7th International Conference, 2004

2003
Mobile Agent Security Through Multi-Agent Cryptographic Protocols.
Proceedings of the International Conference on Internet Computing, 2003

2001
The Risk Profile Problem for Stock Portfolio Optimization
CoRR, 2001

2000
The risk profile problem for stock portfolio optimization (extended abstract).
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000

1999
On-Line Difference Maximization.
SIAM J. Discrete Math., 1999

Designing Proxies for Stock Market Indices is Computationally Hard.
Proceedings of the Tenth Annual ACM-SIAM Symposium on Discrete Algorithms, 1999

1998
Higher Compression from the Burrows-Wheeler Transform by Modified Sorting.
Proceedings of the Data Compression Conference, 1998

1997
Band Ordering in Lossless Compression of Multispectral Images.
IEEE Trans. Computers, 1997

On Dynamic Algorithms for Algebraic Problems.
J. Algorithms, 1997

1996
Searching in an Unknown Environment: An Optimal Randomized Algorithm for the Cow-Path Problem.
Inf. Comput., 1996

1995
Stable computation of the complex roots of unity.
IEEE Trans. Signal Processing, 1995

Book Reviews.
SIGACT News, 1995

1994
Dynamic Parallel Tree Contraction (Extended Abstract).
Proceedings of the 6th Annual ACM Symposium on Parallel Algorithms and Architectures, 1994

Dynamic Algebraic Algorithms.
Proceedings of the Fifth Annual ACM-SIAM Symposium on Discrete Algorithms. 23-25 January 1994, 1994

1993
Continuous Alternation: The Complexity of Pursuit in Continuous Domains.
Algorithmica, 1993

The Complexity of N-body Simulation.
Proceedings of the Automata, Languages and Programming, 20nd International Colloquium, 1993

1992
On Threshold Circuits and Polynomial Computation.
SIAM J. Comput., 1992

The Power of Combining the Techiques of Algebraic and Numerical Computing: Improved Approximate Multipoint Polynomial Evaluation and Improved Multipole Algorithms
Proceedings of the 33rd Annual Symposium on Foundations of Computer Science, 1992

1991
Online Matching with Blocked Input.
Inf. Process. Lett., 1991

1990
Optimal Size Integer Division Circuits.
SIAM J. Comput., 1990


  Loading...