Export 8 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is key  [Clear All Filters]
Groce A, Katz J.  2010.  A new framework for efficient password-based authenticated key exchange. Proceedings of the 17th ACM conference on Computer and communications security. :516-525.
Brakerski Z, Kalai YT, Katz J, Vaikuntanathan V.  2010.  Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage. Foundations of Computer Science (FOCS), 2010 51st Annual IEEE Symposium on. :501-510.
Garay JA, Katz J, Koo C-Y, Ostrovsky R.  2007.  Round Complexity of Authenticated Broadcast with a Dishonest Majority. Foundations of Computer Science, 2007. FOCS '07. 48th Annual IEEE Symposium on. :658-668.
Mao Y, M. Wu.  2007.  Unicity Distance of Robust Image Hashing. Information Forensics and Security, IEEE Transactions on. 2(3):462-467.
Dangle KC, Larsen P, Shaw M, Zelkowitz MV.  2005.  Software process improvement in small organizations: a case study. Software, IEEE. 22(6):68-75.
Mao Y, Sun Y, M. Wu, Liu KJR.  2004.  Dynamic join-exit amortization and scheduling for time-efficient group key agreement. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 4:2617-2627vol.4-2617-2627vol.4.
Swaminathan A, Mao Y, M. Wu.  2004.  Image hashing resilient to geometric and filtering operations. Multimedia Signal Processing, 2004 IEEE 6th Workshop on. :355-358.
Khalili A, Katz J, Arbaugh WA.  2003.  Toward secure key distribution in truly ad-hoc networks. Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on. :342-346.