dblp.uni-trier.dewww.uni-trier.de

Stephen R. Tate Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
38EEStephen R. Tate, Roopa Vishwanathan: Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology. DBSec 2009: 252-267
2008
37EEPing Yu, Stephen R. Tate: Online/Offline Signature Schemes for Devices with Limited Computing Capabilities. CT-RSA 2008: 301-317
36EEVandana Gunupudi, Stephen R. Tate: Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents. Financial Cryptography 2008: 98-112
35EEStephen R. Tate: Randomized Searching on Rays or the Line. Encyclopedia of Algorithms 2008
2007
34EEVandana Gunupudi, Stephen R. Tate: Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules. AINA Workshops (1) 2007: 463-469
33EEPing Yu, Stephen R. Tate: An Online/Offline Signature Scheme Based on the Strong RSA Assumption. AINA Workshops (1) 2007: 601-606
32EEHe Ge, Stephen R. Tate: A Direct Anonymous Attestation Scheme for Embedded Devices. Public Key Cryptography 2007: 16-30
2006
31EEVandana Gunupudi, Stephen R. Tate: SAgent: a security framework for JADE. AAMAS 2006: 1116-1118
30EEHe Ge, Stephen R. Tate: Traceable Signature: Better Efficiency and Beyond. ICCSA (3) 2006: 327-337
29EEHe Ge, Stephen R. Tate: A group signature scheme with signature claiming and variable linkability. IPCCC 2006
28EEHe Ge, Stephen R. Tate: Efficient Authenticated Key-Exchange for Devices with a Trusted Manager. ITNG 2006: 198-203
2005
27EESachin P. Joglekar, Stephen R. Tate: ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention. J. UCS 11(1): 83-103 (2005)
2004
26EEKe Xu, Stephen R. Tate: Universally Composable Secure Mobile Agent Computation. ISC 2004: 304-317
25EEVandana Gunupudi, Stephen R. Tate: Performance Evaluation of Data Integrity Mechanisms for Mobile Agents. ITCC (1) 2004: 62-69
24EESachin P. Joglekar, Stephen R. Tate: ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention. ITCC (1) 2004: 81-
2003
23 Stephen R. Tate, Ke Xu: Mobile Agent Security Through Multi-Agent Cryptographic Protocols. International Conference on Internet Computing 2003: 462-470
2001
22EEMing-Yang Kao, Andreas Nolte, Stephen R. Tate: The Risk Profile Problem for Stock Portfolio Optimization CoRR cs.CE/0107007: (2001)
21EEMing-Yang Kao, Stephen R. Tate: On-Line Difference Maximization CoRR cs.DS/0101024: (2001)
2000
20EEMing-Yang Kao, Andreas Nolte, Stephen R. Tate: The risk profile problem for stock portfolio optimization (extended abstract). STOC 2000: 228-234
19EEMing-Yang Kao, Stephen R. Tate: Designing Proxies for Stock Market Indices is Computationally Hard CoRR cs.CE/0011016: (2000)
1999
18EEMing-Yang Kao, Stephen R. Tate: Designing Proxies for Stock Market Indices is Computationally Hard. SODA 1999: 933-934
17EEMing-Yang Kao, Stephen R. Tate: On-Line Difference Maximization. SIAM J. Discrete Math. 12(1): 78-90 (1999)
1998
16EEBrenton Chapin, Stephen R. Tate: Higher Compression from the Burrows-Wheeler Transform by Modified Sorting. Data Compression Conference 1998: 532
1997
15 Ming-Yang Kao, Stephen R. Tate: On-Line Difference Maximization. SODA 1997: 175-182
14 Stephen R. Tate: Band Ordering in Lossless Compression of Multispectral Images. IEEE Trans. Computers 46(4): 477-483 (1997)
13 John H. Reif, Stephen R. Tate: On Dynamic Algorithms for Algebraic Problems. J. Algorithms 22(2): 347-371 (1997)
1996
12 Ming-Yang Kao, John H. Reif, Stephen R. Tate: Searching in an Unknown Environment: An Optimal Randomized Algorithm for the Cow-Path Problem. Inf. Comput. 131(1): 63-79 (1996)
1994
11 Stephen R. Tate: Band Ordering in Lossless Compression of Multispectral Images. Data Compression Conference 1994: 311-320
10 John H. Reif, Stephen R. Tate: Dynamic Algebraic Algorithms. SODA 1994: 290-301
9EEJohn H. Reif, Stephen R. Tate: Dynamic Parallel Tree Contraction (Extended Abstract). SPAA 1994: 114-121
1993
8EEJohn H. Reif, Stephen R. Tate: The Complexity of N-body Simulation. ICALP 1993: 162-176
7 Ming-Yang Kao, John H. Reif, Stephen R. Tate: Searching in an Unknown Environment: An Optimal Randomized Algorithm for the Cow-Path Problem. SODA 1993: 441-447
6 John H. Reif, Stephen R. Tate: Continuous Alternation: The Complexity of Pursuit in Continuous Domains. Algorithmica 10(2-4): 156-181 (1993)
1992
5 Victor Y. Pan, John H. Reif, Stephen R. Tate: The Power of Combining the Techiques of Algebraic and Numerical Computing: Improved Approximate Multipoint Polynomial Evaluation and Improved Multipole Algorithms FOCS 1992: 703-713
4 John H. Reif, Stephen R. Tate: On Threshold Circuits and Polynomial Computation. SIAM J. Comput. 21(5): 896-908 (1992)
1991
3 Ming-Yang Kao, Stephen R. Tate: Online Matching with Blocked Input. Inf. Process. Lett. 38(3): 113-116 (1991)
1990
2 John H. Reif, Stephen R. Tate: Optimal Size Integer Division Circuits. SIAM J. Comput. 19(5): 912-924 (1990)
1989
1 John H. Reif, Stephen R. Tate: Optimal Size Integer Division Circuits STOC 1989: 264-273

Coauthor Index

1Brenton Chapin [16]
2He Ge [28] [29] [30] [32]
3Vandana Gunupudi [25] [31] [34] [36]
4Sachin P. Joglekar [24] [27]
5Ming-Yang Kao [3] [7] [12] [15] [17] [18] [19] [20] [21] [22]
6Andreas Nolte [20] [22]
7Victor Y. Pan [5]
8John H. Reif [1] [2] [4] [5] [6] [7] [8] [9] [10] [12] [13]
9Roopa Vishwanathan [38]
10Ke Xu [23] [26]
11Ping Yu [33] [37]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)