Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
K
Katz J.  2008.  Which languages have 4-round zero-knowledge proofs? Theory of Cryptography. :73-88.
Katz J.  2008.  Bridging game theory and cryptography: recent results and future directions. Proceedings of the 5th conference on Theory of cryptography. :251-272.
Katz J, Smith A.  2006.  Analyzing the HB and HB+ protocols in the “large error” case. IACR ePrint report. 326:2006-2006.
Katz J.  2004.  Secure routing in ad hoc networks. Workshop on Security of ad hoc and Sensor Networks: Proceedings of the 2 nd ACM workshop on Security of ad hoc and sensor networks.
Katz B, Felshin S, Yuret D, Ibrahim A, Jimmy Lin, Marton G, Jerome McFarland A, Temelkuran B.  2002.  Omnibase: Uniform access to heterogeneous data for question answering. Natural Language Processing and Information Systems. :230-234.
Katz J, Lindell Y.  2008.  Introduction to Modern Cryptography.
Katz J, Yerukhimovich A.  2009.  On black-box constructions of predicate encryption from trapdoor permutations. Advances in Cryptology–ASIACRYPT 2009. :197-213.
Katz J.  2007.  Review of "Probability and Computing: Randomized Algorithms and Probabilitic Analysis by Michael Mitzenmacher and Eli Upfal", Cambridge University Press, 2005. SIGACT News. 38(3):20-22.
Katz J, Yung M.  2007.  Scalable protocols for authenticated group key exchange. Journal of Cryptology. 20(1):85-113.
Katz J.  2003.  Efficient and non-malleable proofs of plaintext knowledge and applications. Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques. :211-228.
Katz J, Ostrovsky R, Yung M.  2001.  Efficient password-authenticated key exchange using human-memorable passwords. Advances in Cryptology—EUROCRYPT 2001. :475-494.
Katz J, Trevisan L.  2000.  On the efficiency of local decoding procedures for error-correcting codes. Proceedings of the thirty-second annual ACM symposium on Theory of computing. :80-86.
Katz J.  2007.  Universally composable multi-party computation using tamper-proof hardware. Advances in Cryptology-EUROCRYPT 2007. :115-128.
Kashyap S, Khuller S.  2006.  Algorithms for non-uniform size data placement on parallel disks. Journal of Algorithms. 60(2):144-167.
Kashyap A, Bhattacharjee B, La R, Shayman M, Tabatabaee V.  2006.  CAM04-6: Single-Path Routing of Time-varying Traffic. Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE. :1-6.
Kashyap A, Khuller S, Shayman M.  2006.  Relay Placement for Higher Order Connectivity in Wireless Sensor Networks. INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings. :1-12.
Karunanidhi A, Doermann D, Parekh N, Rautio V.  2002.  Video analysis applications for pervasive environments. 1st International Conference on Mobile and Ubiquitous Multimedia. :48-55.
Karr AF, Porter A.  2005.  Distributed performance testing using statistical modeling. Proceedings of the 1st international workshop on Advances in model-based testing. :1-7.
Karr A, Porter A, Votta L.  1996.  An empirical exploration of code evolution. International Workshop on Empirical Studies of Software Maintenance.
Karnik M, Gupta SK, Magrab EB.  2004.  Geometric Containment Analysis for Rotational Parts.
Karnik M, Gupta SK, Magrab EB.  2005.  Geometric algorithms for containment analysis of rotational parts. Computer-Aided Design. 37(2):213-230.
Karlson AK, Bederson BB.  2007.  Thumbspace: Generalized one-handed input for touchscreen-based mobile devices. Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction. :324-338.
Karlson AK, Bederson BB.  2008.  One-handed touchscreen input for legacy applications. Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :1399-1408.
Karl LR, Pettey M, Shneiderman B.  1993.  Speech versus mouse commands for word processing: an empirical evaluation. International Journal of Man-Machine Studies. 39(4):667-687.
Karagol-Ayan B, Doermann D, Weinberg A.  2006.  Morphology Induction from Limited Noisy Data Using Approximate String Matching. Proceedings of the Eighth Meeting of the ACL Special Interest Group in Computational Phonology (SIGPHON 2006). :60-68.

Pages