| 1983 |
| 7 | EE | Kowtha Murthy,
John B. Kam,
M. S. Krishnamoorthy:
An Approximation Algorithm to the File Allocation Problem in Computer Networks.
PODS 1983: 258-266 |
| 1981 |
| 6 | EE | George I. Davida,
David L. Wells,
John B. Kam:
A Database Encryption System with Subkeys.
ACM Trans. Database Syst. 6(2): 312-328 (1981) |
| 1979 |
| 5 | | John B. Kam,
George I. Davida:
Structured Design of Substitution-Permutation Encryption Networks.
IEEE Trans. Computers 28(10): 747-753 (1979) |
| 1977 |
| 4 | EE | John B. Kam,
Jeffrey D. Ullman:
A Model of Statistical Databases and Their Security.
ACM Trans. Database Syst. 2(1): 1-10 (1977) |
| 3 | | John B. Kam,
Jeffrey D. Ullman:
Monotone Data Flow Analysis Frameworks
Acta Inf. 7: 305-317 (1977) |
| 1976 |
| 2 | EE | John B. Kam,
Jeffrey D. Ullman:
Global Data Flow Analysis and Iterative Algorithms.
J. ACM 23(1): 158-171 (1976) |
| 1975 |
| 1 | | Amelia C. Fong,
John B. Kam,
Jeffrey D. Ullman:
Application of Lattice Algebra to Loop Optimization.
POPL 1975: 1-9 |