|
Search the dblp DataBase
Matthew Cary:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Matthew Cary, Ramarathnam Venkatesan
A Message Authentication Code Based on Unimodular Matrix Groups. [Citation Graph (0, 0)][DBLP] CRYPTO, 2003, pp:500-512 [Conf]
- Matthew Cary, Atri Rudra, Ashish Sabharwal
On the Hardness of Embeddings Between Two Finite Metrics. [Citation Graph (0, 0)][DBLP] ICALP, 2005, pp:1412-1423 [Conf]
- Yuqun Chen, Ramarathnam Venkatesan, Matthew Cary, Ruoming Pang, Saurabh Sinha, Mariusz H. Jakubowski
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive. [Citation Graph (0, 0)][DBLP] Information Hiding, 2002, pp:400-414 [Conf]
- Matthew Cary
Toward Optimal epsilon-Approximate Nearest Neighbor Algorithms. [Citation Graph (0, 0)][DBLP] J. Algorithms, 2001, v:41, n:2, pp:417-428 [Journal]
- Matthew Cary, Atri Rudra, Ashish Sabharwal
Paper Retraction: On the Hardness of Embeddings Between Two Finite Metrics. [Citation Graph (0, 0)][DBLP] ICALP, 2007, pp:949- [Conf]
- Matthew Cary, Aparna Das, Benjamin Edelman, Ioannis Giotis, Kurtis Heimerl, Anna R. Karlin, Claire Mathieu, Michael Schwarz
Greedy bidding strategies for keyword auctions. [Citation Graph (0, 0)][DBLP] ACM Conference on Electronic Commerce, 2007, pp:262-271 [Conf]
The Long-Short-Key Primitive and Its Applications to Key Security. [Citation Graph (, )][DBLP]
Auctions for structured procurement. [Citation Graph (, )][DBLP]
Floodlight illumination of infinite wedges. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|