Publications

Export 748 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Title is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Arbaugh WA, Davin JR, Farber DJ, Smith JM.  1998.  Security for virtual private intranets. Computer. 31(9):48-55.
Mao Y, M. Wu.  2004.  Security evaluation for communication-friendly encryption of multimedia. Image Processing, 2004. ICIP '04. 2004 International Conference on. 1:569-572Vol.1-569-572Vol.1.
Lu W, Varna AL, Wu M.  2010.  Security analysis for privacy preserving search of multimedia. Image Processing (ICIP). :26-29.
Ramachandran A, Mundada Y, Tariq MB, Feamster N.  2008.  Securing enterprise networks using traffic tainting. Special Interest Group on Data Communication.
Dachman-Soled D, Kalai YTauman.  2012.  Securing Circuits against Constant-Rate Tampering. Advances in Cryptology – CRYPTO 2012. :533-551.
Lu W, Varna A, M. Wu.  2011.  Secure video processing: Problems and challenges. Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. :5856-5859.
Katz J, Malka L.  2010.  Secure text processing with applications to private DNA matching. Proceedings of the 17th ACM conference on Computer and communications security. :485-492.
Yuan Y, Arbaugh WA.  2003.  A secure service discovery protocol for MANET. 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 1:502-506Vol.1-502-506Vol.1.
Katz J.  2004.  Secure routing in ad hoc networks. Workshop on Security of ad hoc and Sensor Networks: Proceedings of the 2 nd ACM workshop on Security of ad hoc and sensor networks.
Ray A, Sengupta B, Cleaveland R.  2005.  Secure requirements elicitation through triggered message sequence charts. Distributed Computing and Internet Technology. :273-282.
Boyen X, Dodis Y, Katz J, Ostrovsky R, Smith A.  2005.  Secure remote authentication using biometric data. Advances in Cryptology–EUROCRYPT 2005. :147-163.
Alexander DS, Arbaugh WA, Keromytis AD, Muir S, Smith JM.  2000.  Secure quality of service handling: SQoSH. IEEE Communications Magazine. 38(4):106-112.
Hicks MW, Keromytis AD, Smith JM.  2002.  A secure PLAN (extended version). DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :224-237.
Hicks MW, Keromytis AD, Smith JM.  2003.  A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews. 33(3):413-426.
Gennaro R, Katz J, Krawczyk H, Rabin T.  2010.  Secure network coding over the integers. Public Key Cryptography–PKC 2010. :142-160.
Choi S, Hwang KW, Katz J, Malkin T, Rubenstein D.  2012.  Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces. Topics in Cryptology–CT-RSA 2012. :416-432.
Bhattacharjee B, Rodrigues R, Kouznetsov P.  2007.  Secure lookup without (constrained) flooding. WRAITS 2007.
Lu W, Varna AL, Swaminathan A, M. Wu.  2009.  Secure image retrieval through feature protection. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1533-1536.
M. Wu, Mui L, Mohtashemi M, Szolovits P.  2001.  Secure Health Information Sharing System: SHARE. Proceedings of the AMIA SymposiumProc AMIA Symp. :1060-1060.
Dachman-Soled D, Malkin T, Raykova M, Yung M.  2011.  Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
Baden R, Bender A, Levin D, Sherwood R, Spring N, Bhattacharjee B.  2007.  A Secure DHT via the Pigeonhole Principle. Technical Reports of the Computer Science Department, CS-TR-4884.
Gordon D, Katz J, Kolesnikov V, Malkin T, Raykova M, Vahlis Y.  2011.  Secure computation with sublinear amortized work.
Pillai J, Patel VM, Chellappa R, Ratha N.  2010.  Secure and robust iris recognition using random projections and sparse representations. Pattern Analysis and Machine Intelligence, IEEE Transactions on. (99):1-1.
Arbaugh WA, Farber DJ, Smith JM.  1997.  A secure and reliable bootstrap architecture. , 1997 IEEE Symposium on Security and Privacy, 1997. Proceedings. :65-71.
Bonatti PA, Kraus S, V.S. Subrahmanian.  2003.  Secure agents. Annals of Mathematics and Artificial Intelligence. 37(1):169-235.

Pages