Stephen R. Tate
Affiliations: | University of North Texas, Denton, TX, United States |
Area:
Computer ScienceGoogle:
"Stephen Tate"Children
Sign in to add traineeBrenton K. Chapin | grad student | 2000 | University of North Texas |
He Ge | grad student | 2006 | University of North Texas |
Vandana Gunupudi | grad student | 2008 | University of North Texas |
Ping Yu | grad student | 2008 | University of North Texas |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Tate SR, Vishwanathan R. (2011) General Secure Function Evaluation using standard trusted computing hardware 2011 9th Annual International Conference On Privacy, Security and Trust, Pst 2011. 221-228 |
Gunupudi V, Tate SR. (2010) Timing-accurate TPM simulation for what-if explorations in trusted computing Proceedings of the 2010 International Symposium On Performance Evaluation of Computer and Telecommunication Systems, Spects'2010. 171-178 |
Gunupudi V, Tate SR. (2008) Generalized non-interactive oblivious transfer using count-limited objects with applications to secure mobile agents Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5143: 98-112 |
Gunupudi V, Tate SR. (2007) Random oracle instantiation in distributed protocols using trusted platform modules Proceedings - 21st International Conference On Advanced Information Networking and Applications Workshops/Symposia, Ainaw'07. 2: 463-469 |
Ge H, Tate SR. (2007) A direct anonymous attestation scheme for embedded devices Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4450: 16-30 |
Gunupudi V, Tate SR. (2006) SAgent: A security framework for JADE Proceedings of the International Conference On Autonomous Agents. 2006: 1116-1118 |
Ge H, Tate SR. (2006) Efficient authenticated key-exchange for devices with a trusted manager Proceedings - Third International Conference Oninformation Technology: New Generations, Itng 2006. 2006: 198-203 |
Gunupudi V, Tate SR. (2006) Design of the sagent security framework for jade Proceedings of the Iasted International Conference On Parallel and Distributed Computing and Systems. 90-95 |
Gunupudi V, Tate SR. (2004) Performance evaluation of data integrity mechanisms for mobile agents International Conference On Information Technology: Coding Computing, Itcc. 1: 62-69 |
Xu K, Tate SR. (2004) Universally composable secure mobile agent computation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3225: 304-317 |