Navigation

Publications
This material is presented to ensure timely dissemination of scholarly
and technical work. Copyright and all rights therein are retained by
authors or by other copyright holders. All persons copying this
information are expected to adhere to the terms and constraints
invoked by each author's copyright. In most cases, these works may
not be reposted without the explicit permission of the copyright
holder.
Computer Security and Cryptography
 S. R. Tate and K. Xu.
"Mobile Agent Security Through MultiAgent Cryptographic Protocols",
Proceedings of the 4th International Conference on Internet
Computing (IC 2003), pp. 462468.
 S. R. Tate and K. Xu.
"On Garbled Circuits and Constant Round Secure Function Evaluation",
CoPS Lab Technical Report 200302, 2003.

S. P. Joglekar and S. R. Tate. "ProtoMon: Embedded Monitors for
Cryptographic Protocol Intrusion Detection and Prevention,"
Journal of Universal Computer Science (JUCS), Vol. 11,
No. 1, 2005, pp. 83103.
(Preliminary version published in Proceedings of the 2004 IEEE Conference
on Information Technology: Coding and Computing (ITCC), Information
Assurance and Security Track, 2004, pp. 8188.)
 V. Gunupudi and S. R. Tate. "Performance Evaluation of Data
Integrity Mechanisms for Mobile Agents," Proceedings of the 2004
IEEE Conference on Information Technology: Coding and Computing
(ITCC), Information Assurance and Security Track, 2004,
pp. 6269.
 K. Xu and S. R. Tate. "Universally Composable Secure Mobile
Agent Computation," Proceedings of the 7th International
Conference on Information Security (ISC), 2004, pp. 304317.
 V. Gunupudi and S. R. Tate. "SAgent: A Security Framework for JADE,"
Proceedings of the 5th International Joint Conference on
Autonomous Agents and Multiagent Systems (AAMAS), 2006,
pp. 11161118.
 H. Ge and S. R. Tate.
"Efficient Authenticated KeyExchange for Devices with a Trusted
Manager," Proceedings of the 3rd IEEE International
Conference on Information Technology (ITNG)  Embedded
Cryptographic Systems track, 2006, pp. 198203.
 H. Ge and S. R. Tate.
"A Group Signature Scheme with Signature Claiming and Variable
Linkability," Proceedings of the 25th IEEE International
Performance, Computing, and Communications Conference (IPCCC),
2006, pp. 497504. [PDF available soon]
 H. Ge and S. R. Tate. "Traceable Signature: Better Efficiency and Beyond,"
Proceedings of Applied Cryptography and
Information Security (ACIS), 2006, pp. 327337.
[PDF]
 V. Gunupudi, S. R. Tate, and K. Xu. "Experimental Evaluation of Security Protocols in SAgent,"
Proceedings of the International Workshop on
Privacy and Security in Agentbased Collaborative Environments
(PSACE), 2006, pp. 6074. [PDF available soon]
 V. Gunupudi and S. R. Tate. "Exploring Data Integrity Protection in SAgent,"
Proceedings of the International Workshop on
Privacy and Security in Agentbased Collaborative Environments
(PSACE), 2006, pp. 3549. [PDF available soon]
 V. Gunupudi and S. R. Tate.
"Design of the SAgent Security Framework for JADE,"
Proceedings of the 18th Annual IASTED International
Conference on Parallel and Distributed Computing and Systems (PDCS),
2006, pp. 9095. [PDF available soon]
 H. Ge and S. R. Tate.
"A Direct Anonymous Attestation Scheme for Embedded Devices,"
Proceedings of the 10th International Conference on Theory and
Practice of PublicKey Cryptography (PKC), 2007, pp. 1630.
[PDF available soon]
 V. Gunupudi and S. R. Tate. "Random Oracle Instantiation in Distributed Protocols Using Trusted
Platform Modules," 3rd IEEE International
Symposium on Security in Networks and Distributed Systems (SSNDS),
proceedings as part of the 21st International Conference on
Advanced Information Networking and Applications Workshops,
2007, pp. 463469.
[PDF]
 P. Yu and S. R. Tate. "An Online/Offline Signature Scheme Based on the Strong RSA
Assumption," 3rd IEEE International
Symposium on Security in Networks and Distributed Systems (SSNDS),
proceedings as part of the 21st International Conference on
Advanced Information Networking and Applications Workshops,
2007, pp. 601606.
 V. Gunupudi and S. R. Tate. "Generalized Noninteractive Oblivious Transfer using CountLimited
Objects with Applications to Secure Mobile Agents," 12th
International Conference on Financial Cryptography and Data
Security, 2008, pp. 98112.
[PDF]
 P. Yu and S. R. Tate. "Online/Offline Signature Schemes for Devices with Limited Computing
Capabilities," RSA Conference 2008, Cryptographers' Track (CTRSA),
2008, pp. 301317.
 S. R. Tate and R. Vishwanathan.
"Improving CutandChoose in Verifiable Encryption and Fair Exchange
Protocols using Trusted Computing Technology," Proceedings of
the 23rd Annual IFIP WG 11.3 Working Conference on Data and
Application Security, 2009, pp. 252267.
[PDF]
[Expanded version on ePrint]
 S. R. Tate. "Digital Signatures and Electronic Signatures," Chapter in The Handbook of Technology Management, Hossein Bidgoli, ed., John Wiley & Sons, 2009.
 S. R. Tate and R. Vishwanathan.
"Performance Evaluation of TPMbased Digital Wallets,"
Proceedings of the 2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems,
2010, pp. 179186.
 V. Gunupudi and S. R. Tate.
"TimingAccurate TPM Simulation for WhatIf Explorations in Trusted Computing," to appear in the
Proceedings of the 2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems,
2010, pp. 171178.
 Y. Kong, J. Deng, and S. R. Tate.
"A Distributed Public Key Caching Scheme in Large Wireless
Networks," Proceedings of the IEEE Global Telecommunications
Conference  Communication & Information System Security (GLOBECOM
'10), 2010.
 S. R. Tate and R. Vishwanathan.
"General Secure Function
Evaluation Using Standard Trusted Computing Hardware,"
Proceedings of the 9th Annual Conference on Privacy, Security,
and Trust (PST), 2011, pp. 221228.
 S. R. Tate, R. Vishwanathan, and L. Everhart.
"Multiuser dynamic proofs of data possession using trusted
hardware," Proceedings of the 3rd ACM Conference on Data and
Application Security and Privacy (CODASPY '13), 2013,
pp. 353364.
 S. R. Tate, R. Vishwanathan, and S. Weeks.
"Encrypted Secret Sharing and Analysis by Plaintext Randomization,"
Proceedings of the 16th Information Security Conference, 2013,
pp. 4965.
 S. R. Tate and R. Vishwanathan.
"Expiration and Revocation of Keys for AttributeBased Signatures,"
Proceedings of the 29th Annual IFIP WG 11.3 Working
Conference on Data and Application Security, 2015, pp. 153169.
Online and Dynamic Algorithms
 M. Kao and S. R. Tate.
``Online Matching with Blocked Input'',
Information Processing Letters, Vol. 38, May 1991,
pp. 113116.
[PDF]
 M. Kao, J. H. Reif, and S. R. Tate. ``Searching in an
Unknown Environment: An Optimal Randomized Algorithm for the
CowPath Problem'', Information and Computation,
Vol. 133, No. 1, 1996, pp. 6280.
[PDF]
 J. H. Reif and S. R. Tate. ``Dynamic Algebraic Algorithms'',
Proceedings of the Fifth Annual ACMSIAM Symposium on Discrete
Algorithms, 1994, pp. 290301.
[ Not available. See the J. of Algorithms paper below for a
journal version which supercedes this one. ]
 J. H. Reif and S. R. Tate.
``Dynamic Parallel Tree Contraction'', Proceedings of the Symposium on
Parallel Algorithms and Architecture, 1994, pp. 114121.
[PDF]
 J. H. Reif and S. R. Tate.
``On Dynamic Algorithms for Algebraic Problems'',
Journal of Algorithms, Vol. 22, No. 2, 1997, pp. 347371.
[PDF]
 M.Y. Kao and S. R. Tate. ``OnLine Difference Maximization'',
SIAM Journal on Discrete Mathematics, Vol. 12, No. 1,
1999, pp. 7890 (abstract published in Proceedings of the Eighth
Annual ACMSIAM Symposium on Discrete Algorithms, 1997,
pp. 175182).
[PDF]
Parallel Algorithms and Circuit Complexity
 J. H. Reif and S. R. Tate.
``Optimal Size Integer Division Circuits'', SIAM Journal on
Computing, Vol. 19, No. 5, October 1990, pp. 912924.
[PDF]
 J. H. Reif and S. R. Tate. ``On Threshold Circuits and
Polynomial Computation'', SIAM Journal on Computing,
Vol. 21, No. 5, October 1992, pp. 896908.
[PDF]
 J. H. Reif and S. R. Tate. ``Optimal Size Integer Division
Circuits'', Proceedings of the 21st Annual ACM Symposium on
Theory of Computing, 1989, pp. 264270.
 S. R. Tate.
``Newton Iteration and Integer Division'', Chapter
12 in Synthesis of Parallel Algorithms, edited by John
H. Reif, pp. 539572, 1993. San Mateo, CA: Morgan Kaufmann
Publishers.
[PDF]
Robotics
 J. H. Reif and S. R. Tate. ``Continuous Alternation'',
Algorithmica, Vol. 10, 1993, pp. 151181.
[PostScript]
 J. H. Reif and S. R. Tate. ``Approximate Kinodynamic Planning
Using L_2norm Dynamic Bounds'', Computers and Mathematics with
Applications, Vol. 27, No. 5, 1994, pp. 2944.
[PDF]
Molecular Dynamics, Algebraic Algorithms, and Geometry
 V. Pan, J. H. Reif, and S. R. Tate. ``The Power of Combining the
Techniques of Algebraic and Numerical Computing: Improved Approximate
Multipoint Polynomial Evaluation and Improved Multipole Algorithms'',
Proceedings of the 33rd Annual Symposium on Foundations of
Computer Science, 1992, pp. 703713.
 J. H. Reif and S. R. Tate. ``The Complexity of Nbody Simulation'',
20th Annual International Conference on Automata, Languages, and
Programming, 1993, pp. 162176.
[PostScript]
 S. R. Tate. ``Stable Computation of the Complex Roots of
Unity'', IEEE Transactions on Signal Processing,
Vol. 43, No. 7, 1995, pp. 17091711.
[PostScript]

J. H. Reif and S. R. Tate. ``Fast Spatial Decomposition and Closest
Pair Computation for Limited Precision Input'', Algorithmica,
Vol. 28, 2000, pp. 271287.
 J. H. Reif and S. R. Tate. ``Fast Spatial Decomposition and
Closest Pair Computation for Limited Precision Input'',
Algorithmica, Vol. 28, 2000, pp. 271287.
[PostScript]
 J. H. Reif and S. R. Tate. ``NBody Simulation I: Fast
Algorithms for Potential Field Evaluation and Trummer's Problem'',
UNT Computer Science Technical Report N96002, 1996.
[PostScript]
 S. R. Tate and K. Xu. ``GeneralPurpose Spatial Decomposition
Algorithms: Experimental Results", 2nd Workshop on
Algorithm Engineering and Experimentation (ALENEX), 2000,
pp. 197216.
[PDF]
Data Compression
 S. R. Tate. ``Band Ordering in Lossless Compression of
Multispectral Images'', IEEE Transactions on Computers,
Vol. 46, No. 4, 1997, pp. 477483 (preliminary version published in
Proceedings of the Data Compression Conference, 1994,
pp. 311320).
[PostScript]
 S. R. Tate. ``Lossless Compression of Region Edge Maps'',
Duke University Computer Science Technical Report CS199209.
[PostScript]
 B. Chapin and S. Tate.
"Higher Compression from the BurrowsWheeler Transform by Modified
Sorting", abstract in Proceedings of the Data
Compression Conference, 1998.
[PDF]
Miscellaneous
 S. R. Tate. ``Arithmetic Circuit Complexity and Motion
Planning'', Ph. D. Dissertation, Duke University, 1991.
[PDF]
 S. R. Tate. ``Report on the Workshop on Data and Image
Compression Needs and Uses in the Scientific Community'', CESDIS
Technical Report TR9399.
 M.Y. Kao and S.R. Tate. ``Designing Proxies for Stock Market
Indices is Computationally Hard'',
Quantitative Finance, Vol. 1, No. 3, May 2001, pp. 361371.
(Preliminary version published in Proceedings of the ACMSIAM
Symposium on Discrete Algorithms, 1999)
[PDF]
 M.Y. Kao, A. Nolte, and S. R. Tate. ``The Risk Profile Problem for
Stock Portfolio Optimization,'' Proceedings of the
32nd Annual ACM Symposium on Theory of Computing (STOC), 2000,
pp. 228234.
[PDF]
 P. Sroufe, S. Tate, R. Dantu, E. Celikel. "Experiences during a Collegiate Cyber Defense Competition", Journal of Applied Security Research, Vol. 16, No. 3, July 2010.
 L. S. Iyer, X. Zhao, A. Chow, and S. R. Tate.
"Computer Science and Information Technology (CSIT) Identity: An
Integrative Theory to Explain Gender Gap in IT," Proceedings of
the International Conference on Information Systems (ICIS), 2011.
 B. L. Kurtz, J. B. Fenwick, R. Tashakkori, A. Esmaili, and S. R. Tate.
"Active Learning During Lecture Using Tablets,"
Proceedings of the SIGCSE Technical Symposium, 2014, pp. 121126.
[ACM Digital Library]
