Publications

Export 1435 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
Journal Articles
Katz J, Koo CY.  2007.  Round-efficient secure computation in point-to-point networks. Advances in Cryptology-EUROCRYPT 2007. :311-328.
Katz J, Koo CY.  2007.  Round-efficient secure computation in point-to-point networks. Advances in Cryptology-EUROCRYPT 2007. :311-328.
Katz J, Vaikuntanathan V.  2011.  Round-optimal password-based authenticated key exchange. Theory of Cryptography. :293-310.
Katz J, Ostrovsky R.  2004.  Round-optimal secure two-party computation. Advances in Cryptology–CRYPTO 2004. :3-34.
Froehlich J, Krumm J.  2008.  Route prediction from trip observations. SAE SP. 2193
Banerjee S, Agarwal S, Kamel K, Kochut A, Kommareddy C, Nadeem T, Thakkar P, Trinh B, Youssef A, Youssef M et al..  2002.  Rover: scalable location-aware computing. Computer. 35(10):46-53.
Banerjee S, Agarwal S, Kamel K, Kochut A, Kommareddy C, Nadeem T, Thakkar P, Trinh B, Youssef A, Youssef M et al..  2002.  Rover: scalable location-aware computing. Computer. 35(10):46-53.
Banerjee S, Agarwal S, Kamel K, Kochut A, Kommareddy C, Nadeem T, Thakkar P, Trinh B, Youssef A, Youssef M et al..  2002.  Rover: scalable location-aware computing. Computer. 35(10):46-53.
Alexander S, Arbaugh WA, Keromytis AD, Smith JM.  1998.  Safety and security of programmable network infrastructures. IEEE Communications Magazine. 36(10):84-92.
Kim Y, Varshney A.  2006.  Saliency-guided Enhancement for Volume Visualization. Visualization and Computer Graphics, IEEE Transactions on. 12(5):925-932.
Lee CH, Kim Y, Varshney A.  2009.  Saliency-guided lighting. IEICE TRANSACTIONS on Information and Systems. 2:369-73.
Kim Y, Patro R, Ip CY, O’Leary DP, Anishkin A, Sukharev S, Varshney A.  1998.  Salient Frame Detection for Molecular Dynamics Simulations. Scientific Visualization: Interactions, Features, Metaphors. 2:160-175.
King LM, Cummings MP.  1997.  Satellite DNA repeat sequence variation is low in three species of burying beetles in the genus ıt Nicrophorus (Coleoptera: Silphidae). Mol Biol Evol. 14(11):1088-1095.
Banerjee S, Bhattacharjee B, Kommareddy C.  2002.  Scalable application layer multicast. SIGCOMM Comput. Commun. Rev.. 32(4):205-217.
Katz J, Yung M.  2007.  Scalable protocols for authenticated group key exchange. Journal of Cryptology. 20(1):85-113.
Katz J, Yung M.  2003.  Scalable protocols for authenticated group key exchange. Advances in Cryptology-CRYPTO 2003. :110-125.
Kembhavi A, Siddiquie B, Miezianko R, McCloskey S, Davis LS, Schwartz WR, Harwood D, Gupta A, Farrell R, Luo Y et al..  2009.  Scene it or not? incremental multiple kernel learning for object detection Proceedings of the International Conference on Computer Vision.
Funkhouser T, Min P, Kazhdan M, Chen J, Halderman A, Dobkin D, Jacobs DW.  2003.  A search engine for 3D models. ACM Trans. Graph.. 22(1):83-105.
Kim J, Oard D, Soergel D.  2003.  Searching large collections of recorded speech: A preliminary study. Proceedings of the American Society for Information Science and Technology. 40(1):330-339.
Belhumeur P, Chen D, Feiner S, Jacobs DW, Kress W, Ling H, Lopez I, Ramamoorthi R, Sheorey S, White S.  2008.  Searching the world’s herbaria: A system for visual identification of plant species. Computer Vision–ECCV 2008. :116-129.
Alexander DS, Arbaugh WA, Keromytis AD, Smith JM.  1998.  A secure active network environment architecture: realization in SwitchWare. IEEE Network. 12(3):37-45.
Bonatti PA, Kraus S, V.S. Subrahmanian.  2003.  Secure agents. Annals of Mathematics and Artificial Intelligence. 37(1):169-235.
Bhattacharjee B, Rodrigues R, Kouznetsov P.  2007.  Secure lookup without (constrained) flooding. WRAITS 2007.
Choi S, Hwang KW, Katz J, Malkin T, Rubenstein D.  2012.  Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces. Topics in Cryptology–CT-RSA 2012. :416-432.
Gennaro R, Katz J, Krawczyk H, Rabin T.  2010.  Secure network coding over the integers. Public Key Cryptography–PKC 2010. :142-160.

Pages