Publications
Export 1435 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is K [Clear All Filters]
2007. Round-efficient secure computation in point-to-point networks. Advances in Cryptology-EUROCRYPT 2007. :311-328.
2007. Round-efficient secure computation in point-to-point networks. Advances in Cryptology-EUROCRYPT 2007. :311-328.
1998. Safety and security of programmable network infrastructures. IEEE Communications Magazine. 36(10):84-92.
2006. Saliency-guided Enhancement for Volume Visualization. Visualization and Computer Graphics, IEEE Transactions on. 12(5):925-932.
1998. Salient Frame Detection for Molecular Dynamics Simulations. Scientific Visualization: Interactions, Features, Metaphors. 2:160-175.
1997. Satellite DNA repeat sequence variation is low in three species of burying beetles in the genus ıt Nicrophorus (Coleoptera: Silphidae). Mol Biol Evol. 14(11):1088-1095.
2003. Scalable protocols for authenticated group key exchange. Advances in Cryptology-CRYPTO 2003. :110-125.
2009. Scene it or not? incremental multiple kernel learning for object detection Proceedings of the International Conference on Computer Vision.
2003. Searching large collections of recorded speech: A preliminary study. Proceedings of the American Society for Information Science and Technology. 40(1):330-339.
2008. Searching the world’s herbaria: A system for visual identification of plant species. Computer Vision–ECCV 2008. :116-129.
1998. A secure active network environment architecture: realization in SwitchWare. IEEE Network. 12(3):37-45.
2012. Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces. Topics in Cryptology–CT-RSA 2012. :416-432.