Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
K
Katz J, Maurer U, Tackmann B, Zikas V.  2011.  Universally composable synchronous computation.
Katz J, Yung M.  2002.  Threshold cryptosystems based on factoring. Advances in Cryptology—ASIACRYPT 2002. :139-147.
Katz J, Lindell Y.  2008.  Handling expected polynomial-time strategies in simulation-based security proofs. Journal of Cryptology. 21(3):303-349.
Katz J.  1989.  Rational Common Ground in the Sociology of Knowledge. Philosophy of the social sciences. 19(3):257-271.
Katz J, Koo CY, Kumaresan R.  2008.  Improving the round complexity of vss in point-to-point networks. Automata, Languages and Programming. :499-510.
Katz J, Vaikuntanathan V.  2011.  Round-optimal password-based authenticated key exchange. Theory of Cryptography. :293-310.
Katz J, Ostrovsky R, Rabin M.  2005.  Identity-based zero-knowledge. Security in Communication Networks. :180-192.
Katz J, Ostrovsky R.  2004.  Round-optimal secure two-party computation. Advances in Cryptology–CRYPTO 2004. :3-34.
Katz J, Shin JS, Smith A.  2010.  Parallel and concurrent security of the HB and HB+ protocols. Journal of cryptology. 23(3):402-421.
Katz B, Jimmy Lin, Felshin S.  2001.  Gathering knowledge for a question answering system from heterogeneous information sources. Proceedings of the workshop on Human Language Technology and Knowledge Management - Volume 2001. :9:1–9:8-9:1–9:8.
Katz J, Ostrovsky R, Yung M.  2009.  Efficient and secure authenticated key exchange using weak passwords. Journal of the ACM (JACM). 57(1):3:1–3:39-3:1–3:39.
Katz J.  2005.  Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A.. SIGACT News. 36(2):14-19.
Katz J.  2002.  Efficient Cryptographic Protocols Preventing “Man-in-the-Middle” Attacks.
Kashyap A, Khuller S, Shayman M.  2006.  Relay Placement for Higher Order Connectivity in Wireless Sensor Networks. INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings. :1-12.
Kashyap A, Bhattacharjee B, La R, Shayman M, Tabatabaee V.  2006.  CAM04-6: Single-Path Routing of Time-varying Traffic. Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE. :1-6.
Kashyap S, Khuller S.  2006.  Algorithms for non-uniform size data placement on parallel disks. Journal of Algorithms. 60(2):144-167.
Karunanidhi A, Doermann D, Parekh N, Rautio V.  2002.  Video analysis applications for pervasive environments. 1st International Conference on Mobile and Ubiquitous Multimedia. :48-55.
Karr AF, Porter A.  2005.  Distributed performance testing using statistical modeling. Proceedings of the 1st international workshop on Advances in model-based testing. :1-7.
Karr A, Porter A, Votta L.  1996.  An empirical exploration of code evolution. International Workshop on Empirical Studies of Software Maintenance.
Karnik M, Gupta SK, Magrab EB.  2005.  Geometric algorithms for containment analysis of rotational parts. Computer-Aided Design. 37(2):213-230.
Karnik M, Gupta SK, Magrab EB.  2004.  Geometric Containment Analysis for Rotational Parts.
Karlson AK, Bederson BB.  2007.  Thumbspace: Generalized one-handed input for touchscreen-based mobile devices. Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction. :324-338.
Karlson AK, Bederson BB.  2008.  One-handed touchscreen input for legacy applications. Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :1399-1408.
Karl LR, Pettey M, Shneiderman B.  1993.  Speech versus mouse commands for word processing: an empirical evaluation. International Journal of Man-Machine Studies. 39(4):667-687.
Karagol-Ayan B, Doermann D, Dorr BJ.  2003.  Use of OCR for Rapid Construction of Bilingual Lexicons. LAMP-TR-104,CFAR-TR-986,CS-TR-4510,UMIACS-TR-2003-78

Pages