The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Stephen R. Tate: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John H. Reif, Stephen R. Tate
    On Threshold Circuits and Polynomial Computation. [Citation Graph (1, 0)][DBLP]
    SIAM J. Comput., 1992, v:21, n:5, pp:896-908 [Journal]
  2. Ping Yu, Stephen R. Tate
    An Online/Offline Signature Scheme Based on the Strong RSA Assumption. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:601-606 [Conf]
  3. Vandana Gunupudi, Stephen R. Tate
    Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:463-469 [Conf]
  4. Vandana Gunupudi, Stephen R. Tate
    SAgent: a security framework for JADE. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2006, pp:1116-1118 [Conf]
  5. Brenton Chapin, Stephen R. Tate
    Higher Compression from the Burrows-Wheeler Transform by Modified Sorting. [Citation Graph (0, 0)][DBLP]
    Data Compression Conference, 1998, pp:532- [Conf]
  6. Stephen R. Tate
    Band Ordering in Lossless Compression of Multispectral Images. [Citation Graph (0, 0)][DBLP]
    Data Compression Conference, 1994, pp:311-320 [Conf]
  7. Victor Y. Pan, John H. Reif, Stephen R. Tate
    The Power of Combining the Techiques of Algebraic and Numerical Computing: Improved Approximate Multipoint Polynomial Evaluation and Improved Multipole Algorithms [Citation Graph (0, 0)][DBLP]
    FOCS, 1992, pp:703-713 [Conf]
  8. Stephen R. Tate, Ke Xu
    Mobile Agent Security Through Multi-Agent Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2003, pp:462-470 [Conf]
  9. John H. Reif, Stephen R. Tate
    The Complexity of N-body Simulation. [Citation Graph (0, 0)][DBLP]
    ICALP, 1993, pp:162-176 [Conf]
  10. He Ge, Stephen R. Tate
    Traceable Signature: Better Efficiency and Beyond. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:327-337 [Conf]
  11. Ke Xu, Stephen R. Tate
    Universally Composable Secure Mobile Agent Computation. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:304-317 [Conf]
  12. Vandana Gunupudi, Stephen R. Tate
    Performance Evaluation of Data Integrity Mechanisms for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:62-69 [Conf]
  13. Sachin P. Joglekar, Stephen R. Tate
    ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:81-0 [Conf]
  14. He Ge, Stephen R. Tate
    Efficient Authenticated Key-Exchange for Devices with a Trusted Manager. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:198-203 [Conf]
  15. Ming-Yang Kao, John H. Reif, Stephen R. Tate
    Searching in an Unknown Environment: An Optimal Randomized Algorithm for the Cow-Path Problem. [Citation Graph (0, 0)][DBLP]
    SODA, 1993, pp:441-447 [Conf]
  16. Ming-Yang Kao, Stephen R. Tate
    On-Line Difference Maximization. [Citation Graph (0, 0)][DBLP]
    SODA, 1997, pp:175-182 [Conf]
  17. Ming-Yang Kao, Stephen R. Tate
    Designing Proxies for Stock Market Indices is Computationally Hard. [Citation Graph (0, 0)][DBLP]
    SODA, 1999, pp:933-934 [Conf]
  18. John H. Reif, Stephen R. Tate
    Dynamic Algebraic Algorithms. [Citation Graph (0, 0)][DBLP]
    SODA, 1994, pp:290-301 [Conf]
  19. John H. Reif, Stephen R. Tate
    Dynamic Parallel Tree Contraction (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    SPAA, 1994, pp:114-121 [Conf]
  20. Ming-Yang Kao, Andreas Nolte, Stephen R. Tate
    The risk profile problem for stock portfolio optimization (extended abstract). [Citation Graph (0, 0)][DBLP]
    STOC, 2000, pp:228-234 [Conf]
  21. John H. Reif, Stephen R. Tate
    Optimal Size Integer Division Circuits [Citation Graph (0, 0)][DBLP]
    STOC, 1989, pp:264-273 [Conf]
  22. John H. Reif, Stephen R. Tate
    Continuous Alternation: The Complexity of Pursuit in Continuous Domains. [Citation Graph (0, 0)][DBLP]
    Algorithmica, 1993, v:10, n:2-4, pp:156-181 [Journal]
  23. Ming-Yang Kao, Stephen R. Tate
    Designing Proxies for Stock Market Indices is Computationally Hard [Citation Graph (0, 0)][DBLP]
    CoRR, 2000, v:0, n:, pp:- [Journal]
  24. Ming-Yang Kao, Andreas Nolte, Stephen R. Tate
    The Risk Profile Problem for Stock Portfolio Optimization [Citation Graph (0, 0)][DBLP]
    CoRR, 2001, v:0, n:, pp:- [Journal]
  25. Ming-Yang Kao, Stephen R. Tate
    On-Line Difference Maximization [Citation Graph (0, 0)][DBLP]
    CoRR, 2001, v:0, n:, pp:- [Journal]
  26. Ming-Yang Kao, John H. Reif, Stephen R. Tate
    Searching in an Unknown Environment: An Optimal Randomized Algorithm for the Cow-Path Problem. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1996, v:131, n:1, pp:63-79 [Journal]
  27. Ming-Yang Kao, Stephen R. Tate
    Online Matching with Blocked Input. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1991, v:38, n:3, pp:113-116 [Journal]
  28. John H. Reif, Stephen R. Tate
    On Dynamic Algorithms for Algebraic Problems. [Citation Graph (0, 0)][DBLP]
    J. Algorithms, 1997, v:22, n:2, pp:347-371 [Journal]
  29. Sachin P. Joglekar, Stephen R. Tate
    ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:1, pp:83-103 [Journal]
  30. John H. Reif, Stephen R. Tate
    Optimal Size Integer Division Circuits. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1990, v:19, n:5, pp:912-924 [Journal]
  31. Ming-Yang Kao, Stephen R. Tate
    On-Line Difference Maximization. [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 1999, v:12, n:1, pp:78-90 [Journal]
  32. Stephen R. Tate
    Band Ordering in Lossless Compression of Multispectral Images. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1997, v:46, n:4, pp:477-483 [Journal]
  33. He Ge, Stephen R. Tate
    A Direct Anonymous Attestation Scheme for Embedded Devices. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:16-30 [Conf]

  34. Online/Offline Signature Schemes for Devices with Limited Computing Capabilities. [Citation Graph (, )][DBLP]


  35. Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology. [Citation Graph (, )][DBLP]


  36. Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents. [Citation Graph (, )][DBLP]


  37. A group signature scheme with signature claiming and variable linkability. [Citation Graph (, )][DBLP]


Search in 0.012secs, Finished in 0.015secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002