Publications
Export 1435 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is K [Clear All Filters]
2007. Chosen-ciphertext security from identity-based encryption. SIAM Journal on Computing. 36(5):1301-1328.
2007. Colluding Fingerprinted Video using the Gradient Attack. Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on. 2:II-161-II-164-II-161-II-164.
2007. Compact, low power wireless sensor network system for line crossing recognition. Circuits and Systems, 2007. ISCAS 2007. IEEE International Symposium on. :2506-2509.
2007. Component-based Data Layout for Efficient Slicing of Very Large Multidimensional Volumetric Data. Scientific and Statistical Database Management, 2007. SSBDM '07. 19th International Conference on. :8-8.
2007. Computing most probable worlds of action probabilistic logic programs: scalable estimation for 10^30,000 worlds. Annals of Mathematics and Artificial Intelligence. 51(2):295-331.
2007. Concept disambiguation for improved subject access using multiple knowledge sources. Proceedings of the Workshop on Language Technology for Cultural Heritage Data (LaTeCH 2007). :25-25.
2007. Concurrently-secure blind signatures without random oracles or setup assumptions. Theory of Cryptography. :323-341.
2007. Concurrently-secure blind signatures without random oracles or setup assumptions. Theory of Cryptography. :323-341.
2007. Creating a Robust Desktop Grid using Peer-to-Peer Services. Parallel and Distributed Processing Symposium, 2007. IPDPS 2007. IEEE International. :1-7.
2007. Creating a Robust Desktop Grid using Peer-to-Peer Services. Parallel and Distributed Processing Symposium, 2007. IPDPS 2007. IEEE International. :1-7.
2007. Cross-layer latency minimization in wireless networks with SINR constraints. Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing. :110-119.
2007. Distributed Ranked Search. High Performance Computing – HiPC 2007High Performance Computing – HiPC 2007. 4873:7-20.
2007. Efficient cryptographic protocols based on the hardness of learning parity with noise. Proceedings of the 11th IMA international conference on Cryptography and coding. :1-15.
2007. Efficient signature schemes with tight reductions to the Diffie-Hellman problems. Journal of Cryptology. 20(4):493-514.
2007. Efficient simulation of critical synchronous dataflow graphs. ACM Transactions on Design Automation of Electronic Systems (TODAES). 12(3):1-28.
2007. Evaluating a cross-cultural children’s online book community: Lessons learned for sociability, usability, and cultural exchange. Interacting with Computers. 19(4):494-511.