Publications
Export 7148 results:
[ Author] Title Type Year Filters: Efficient-model-checking-buchi-tableau-automata%E2%8B%86 is [Clear All Filters]
2011. Complete Fairness in Secure Two-Party Computation. Journal of the ACM. 58(6):24:1–24:37-24:1–24:37.
2009. Complete fairness in multi-party computation without an honest majority. Theory of Cryptography. :19-35.
2010. A group signature scheme from lattice assumptions. Advances in Cryptology-ASIACRYPT 2010. :395-412.
2005. Data hiding in curves with application to fingerprinting maps. Signal Processing, IEEE Transactions on. 53(10):3988-4005.
2007. Improving Embedding Payload in Binary Imageswith "Super-Pixels". Image Processing, 2007. ICIP 2007. IEEE International Conference on. 3:III-277-III-280-III-277-III-280.
2004. Data hiding in curves for collusion-resistant digital fingerprinting. Image Processing, 2004. ICIP '04. 2004 International Conference on. 1:51-54Vol.1-51-54Vol.1.
2007. Robust scanner identification based on noise features. Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX. 6505:0S–0T-0S–0T.
2007. Noise Features for Image Tampering Detection and Steganalysis. Image Processing, 2007. ICIP 2007. IEEE International Conference on. 6:VI-97-VI-100-VI-97-VI-100.
2005. Robust digital fingerprinting for curves. Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'05). 2:529-532.
2009. Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images. Information Forensics and Security, IEEE Transactions on. 4(3):476-491.
2006. Manufacturing of multi-material compliant mechanisms using multi-material molding. The International Journal of Advanced Manufacturing Technology. 30(11):1049-1075.
2011. NetVisia: Heat Map & Matrix Visualization of Dynamic Social Network Statistics & Content. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :19-26.
2011. Evaluating visual and statistical exploration of scientific literature networks. 2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). :217-224.
2008. Universally composable multi-party computation with an unreliable common reference string. Theory of Cryptography. :142-154.
2009. Streaming for large scale NLP: Language modeling. Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics. :512-520.
2007. Biased data reduce efficiency and effectiveness of conservation reserve networks. Ecology Letters. 10(5):364-374.
2000. A logic for characterizing multiple bounded agents. Autonomous Agents and Multi-Agent Systems. 3(4):351-387.