Publications

Export 481 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
K
Kedilaya S, Plishker W, Purkovic A, Johnson B, Bhattacharyya SS.  2011.  Model-based precision analysis and optimization for digital signal processors. Proceedings of the European Signal Processing Conference. :506-510.
Keceli F, Tzannes A, Caragea GC, Barua R, Vishkin U.  2011.  Toolchain for Programming, Simulating and Studying the XMT Many-Core Architecture. Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium on. :1282-1291.
Kearsley G, Shneiderman B.  1998.  Engagement Theory: A Framework for Technology-Based Teaching and Learning.. Educational TechnologyEducational Technology. 38(5):20-23.
Kawahara AY, Ohshima I, Kawakita A, Regier JC, Mitter C, Cummings MP, Davis DR, Wagner DL, De Prinis J, Lopez-Vaamonde C.  2011.  Increased gene sampling provides stronger support for higher-level groups within gracillariid leaf mining moths and relatives (Lepidoptera: Gracillariidae). BMC Evol Biol. 11:182
Kavetsky R, Gupta SK.  2010.  Developing Autonomy for Unmanned Surface Vehicles by Using Virtual Environments.
Kauniskangas H, Sauvola J, Pietikainen M, Doermann D.  1997.  Content-based Image Retrieval Using Composite Features. Proceedings of the 1997 Scandinavian Conference on Image Analysis. :35-42.
Katz J, Yung M.  2001.  Unforgeable encryption and chosen ciphertext secure modes of operation. Fast Software Encryption. :25-36.
Katz B, Felshin S, Yuret D, Ibrahim A, Jimmy Lin, Marton G, Jerome McFarland A, Temelkuran B.  2002.  Omnibase: Uniform access to heterogeneous data for question answering. Natural Language Processing and Information Systems. :230-234.
Katz J.  2006.  Review of "A Computational Introduction to Number Theory and Algebra by Victor Shoup", Cambridge University Press, 2005. SIGACT News. 37(1):12-13.
Katz J, Koo CY.  2005.  On constructing universal one-way hash functions from arbitrary one-way functions. Journal of Cryptology.
Katz J.  2002.  A forward-secure public-key encryption scheme.
Katz J.  2007.  Efficient cryptographic protocols based on the hardness of learning parity with noise. Proceedings of the 11th IMA international conference on Cryptography and coding. :1-15.
Katz J.  2007.  Universally composable multi-party computation using tamper-proof hardware. Advances in Cryptology-EUROCRYPT 2007. :115-128.
Katz J, Trevisan L.  2000.  On the efficiency of local decoding procedures for error-correcting codes. Proceedings of the thirty-second annual ACM symposium on Theory of computing. :80-86.
Katz J, Ostrovsky R, Yung M.  2001.  Efficient password-authenticated key exchange using human-memorable passwords. Advances in Cryptology—EUROCRYPT 2001. :475-494.
Katz J.  2004.  Binary tree encryption: Constructions and applications. Information Security and Cryptology-ICISC 2003. :1-11.
Katz B, Jimmy Lin, Felshin S.  2001.  Gathering knowledge for a question answering system from heterogeneous information sources. Proceedings of the workshop on Human Language Technology and Knowledge Management - Volume 2001. :9:1–9:8-9:1–9:8.
Katz J.  2008.  Which languages have 4-round zero-knowledge proofs? Theory of Cryptography. :73-88.
Katz J, Ostrovsky R, Yung M.  2009.  Efficient and secure authenticated key exchange using weak passwords. Journal of the ACM (JACM). 57(1):3:1–3:39-3:1–3:39.
Katz J, Lindell Y.  2008.  Introduction to Modern Cryptography.
Katz J, Ostrovsky R, Smith A.  2003.  Round efficiency of multi-party computation with a dishonest majority. Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques. :578-595.
Katz J, Yerukhimovich A.  2009.  On black-box constructions of predicate encryption from trapdoor permutations. Advances in Cryptology–ASIACRYPT 2009. :197-213.
Katz J.  2005.  Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A.. SIGACT News. 36(2):14-19.
Katz J, Shin JS, Smith A.  2010.  Parallel and concurrent security of the HB and HB+ protocols. Journal of cryptology. 23(3):402-421.
Katz J.  2004.  Secure routing in ad hoc networks. Workshop on Security of ad hoc and Sensor Networks: Proceedings of the 2 nd ACM workshop on Security of ad hoc and sensor networks.

Pages