The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for ALICE with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1977 (16) 1978-1981 (20) 1982-1984 (17) 1985-1986 (16) 1987-1988 (31) 1989-1990 (22) 1991 (18) 1992 (17) 1993 (20) 1994 (17) 1995 (21) 1996 (26) 1997 (33) 1998 (34) 1999 (35) 2000 (44) 2001 (54) 2002 (67) 2003 (57) 2004 (88) 2005 (103) 2006 (101) 2007 (110) 2008 (109) 2009 (131) 2010 (131) 2011 (133) 2012 (160) 2013 (192) 2014 (166) 2015 (195) 2016 (185) 2017 (203) 2018 (226) 2019 (319) 2020 (358) 2021 (400) 2022 (405) 2023 (425) 2024 (86)
Publication types (Num. hits)
article(2249) book(6) data(3) incollection(24) inproceedings(2437) phdthesis(52) proceedings(20)
Venues (Conferences, Journals, ...)
CoRR(507) Sensors(48) NeuroImage(42) SIGCSE(38) EMBC(36) Remote. Sens.(36) DAC(35) IACR Cryptol. ePrint Arch.(35) Bioinform.(34) CogSci(31) INTERSPEECH(28) PLoS Comput. Biol.(27) CHI(26) IGARSS(25) Nucleic Acids Res.(24) CRYPTO(23) More (+10 of total 1738)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 669 occurrences of 482 keywords

Results
Found 5904 publication records. Showing 4791 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
183Caitlin Kelleher, Randy F. Pausch, Sara B. Kiesler Storytelling alice motivates middle school girls to learn computer programming. Search on Bibsonomy CHI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF children, programming, computer science education, programming environments, motivation, gender, Alice
150Susan H. Rodger, Jenna Hayes, Gaetjens Lezin, Henry Qin, Deborah Nelson, Ruth Tucker, Mercedes Lopez, Stephen Cooper, Wanda P. Dann, Don Slater Engaging middle school teachers and students with alice in a diverse set of subjects. Search on Bibsonomy SIGCSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF virtual worlds, alice, introductory computer science, middle school, k-12 education, under-represented groups
139Randy Pausch Alice: a dying man's passion. Search on Bibsonomy SIGCSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF alice
110Claude Castelluccia, Pars Mutaf Shake them up!: a movement-based pairing protocol for CPU-constrained devices. Search on Bibsonomy MobiSys The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
107Jeffrey S. Pierce Introducing Alice to a Squeak Wonderland. Search on Bibsonomy C5 The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
95Ryan Garlick, Ebru Celikel Cankaya Using alice in CS1: a quantitative experiment. Search on Bibsonomy ITiCSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF pedagogy, CS1, retention, alice, CS0
88Yael Tauman Kalai, Ran Raz Succinct Non-Interactive Zero-Knowledge Proofs with Preprocessing for LOGSNP. Search on Bibsonomy FOCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
88Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski Conditional Digital Signatures. Search on Bibsonomy TrustBus The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
85Karin Johnsgard, James McDonald Using Alice in Overview Courses to Improve Success Rates in Programming I. Search on Bibsonomy CSEE&T The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
85John Domingue, Maria Martins, Jiacheng Tan, Arthur Stutt, Helgi Petursson Alice: Assisting Online Shoppers through Ontologies and Novel Interface Metaphors. Search on Bibsonomy EKAW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
84Susan H. Rodger, Maggie Bashford, Lana Dyck, Jenna Hayes, Liz Liang, Deborah Nelson, Henry Qin Enhancing K-12 education with alice programming adventures. Search on Bibsonomy ITiCSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF virtual worlds, alice, introductory computer science, middle school, K-12 education
77Surendra Boppana, John M. Shea Overlapped Carrier-Sense Multiple Access (OCSMA) in Wireless Ad Hoc Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
77Thomas Holenstein Parallel repetition: simplifications and the no-signaling case. Search on Bibsonomy STOC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF probabilistically checkable proofs, parallel repetition
77Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III Public Key Encryption That Allows PIR Queries. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Public-key Encryption with special properties, Database security, Private Information Retrieval, Searching on encrypted data
77Olivier Markowitch, Steve Kremer An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
77Michael Roe Authentication and Naming (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
77Gábor Tardos, Uri Zwick The Communication Complexity of the Universal Relation. Search on Bibsonomy CCC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF protocols, communication complexity
66Josef Cibulka, Jan Kyncl, Viola Mészáros, Rudolf Stolar, Pavel Valtr 0001 Solution of Peter Winkler's Pizza Problem. Search on Bibsonomy IWOCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
66Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia Private Information: To Reveal or not to Reveal. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authorization, policies, secure multi-party computation
66Prahladh Harsha, Rahul Jain 0001, David A. McAllester, Jaikumar Radhakrishnan The Communication Complexity of Correlation. Search on Bibsonomy CCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
62Marco Meoni Interactive Parallel Analysis on the ALICE Grid with the PROOF Framework. Search on Bibsonomy ICCS (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF interactive parallel distributed processing, task colocation, Grid, PROOF, ALICE, resource availability, data movement
57Elizabeth K. Hawthorne Alice grows up: transitioning from Alice 2 to Alice 3 in community college programming courses. Search on Bibsonomy Inroads The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
55Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li 0001 Attribute-Based Access Control with Hidden Policies and Hidden Credentials. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Electronic commerce-security, hidden credentials, privacy, authentication, access control, trust negotiation, security and protection, management of computing and information systems
55Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia Point-Based Trust: Define How Much Privacy Is Worth. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF private multi-party computation, Trust management, knapsack problem
55Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li 0001 Hidden access control policies with hidden credentials. Search on Bibsonomy WPES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF hidden credentials, privacy, access control, secure multi-party computation, trust negotiation
55Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano Public Key Encryption with Keyword Search. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
55Christian Cachin, Jan Camenisch, Joe Kilian, Joy Müller One-Round Secure Computation and Secure Autonomous Mobile Agents. Search on Bibsonomy ICALP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
55Richard Cleve Controlled Gradual Disclosure Schemes for Random Bits and Their Applications. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
52Adam Martinez, Terrance Tornberg Lighting and rendering Alice in Wonderland. Search on Bibsonomy SIGGRAPH Talks The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
52Briana Lowe Wellman, James E. Davis, Monica Anderson 0001 Alice and robotics in introductory CS courses. Search on Bibsonomy Richard Tapia Celebration of Diversity in Computing Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF education, diversity, computer science
51Sally Fincher, Stephen Cooper, Michael Kölling, John Maloney Comparing alice, greenfoot & scratch. Search on Bibsonomy SIGCSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF alice, scratch, ile, greenfoot
51Robert H. Seidman Alice first: 3D interactive game programming. Search on Bibsonomy ITiCSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF devlopment, java, algorithm, animation, CS1, virtual worlds, objects, 3D, alice, game programming
51Linda L. Werner, Jill Denner, Michelle Bliesner, Pat Rex Can middle-schoolers use Storytelling Alice to make games?: results of a pilot study. Search on Bibsonomy FDG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Storytelling Alice, pair programming, middle-school, IT fluency
51Torben Lorenzen, Abdul Sattar 0002 Objects first using Alice to introduce object constructs in CS1. Search on Bibsonomy ACM SIGCSE Bull. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Java, object-oriented programming, objects, methods, classes, Alice
51Joel C. Adams Alice, middle schoolers & the imaginary worlds camps. Search on Bibsonomy SIGCSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF 3-D animation, camp, single-sex classes, programming, computer science, objects, gender, Alice, movies, middle school
44Stefan Dziembowski, Ueli M. Maurer The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Yasuhiro Ohtaki Partial Disclosure of Searchable Encrypted Data with Support for Boolean Queries. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure logging, Partial disclosure, Searchable encryption
44Jiangtao Li 0001, Ninghui Li OACerts: Oblivious Attribute Certificates. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, access controls, Security and privacy protection, cryptographic controls
44Alberto Trombetta, Elisa Bertino Private Updates to Anonymous Databases. Search on Bibsonomy ICDE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Privacy, anonymity, data management, secure computation
44Audun Jøsang, Stephen Marsh 0001, Simon Pope Exploring Different Types of Trust Propagation. Search on Bibsonomy iTrust The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Shai Avidan, Moshe Butman Blind Vision. Search on Bibsonomy ECCV (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Giuseppe Ateniese, Susan Hohenberger Proxy re-signatures: new definitions, algorithms, and applications. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authenticating path in network, proxy re-signature, bilinear maps
44Jiangtao Li 0001, Ninghui Li OACerts: Oblivious Attribute Certificates. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Jiangtao Li 0001, Ninghui Li Policy-hiding access control in open environment. Search on Bibsonomy PODC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptographic commitment, secure function, privacy, evaluation, access control, cryptographic protocol, automated trust negotiation, digital credentials
44Thomas Holenstein, Renato Renner One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Ueli M. Maurer, Yacov Yacobi A Remark on a Non-interactive Public-Key Distribution System. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
44Ueli M. Maurer Protocols for Secret Key Agreement by Public Discussion Based on Common Information. Search on Bibsonomy CRYPTO The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
44Mihir Bellare, Lenore Cowen, Shafi Goldwasser On the Structure of Secret Key Exchange Protocols. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
43Joel C. Adams Scratching middle schoolers' creative itch. Search on Bibsonomy SIGCSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF 2-d animation, summer camps, games, videos, programming, music, computer science, gender, alice, scratch, middle school
41Wanda P. Dann, Stephen Cooper Education - Alice 3: concrete to abstract. Search on Bibsonomy Commun. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
41Sebastian Mödersheim Algebraic Properties in Alice and Bob Notation. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
41Kris Powers, Stacey Ecott, Leanne M. Hirshfield Through the looking glass: teaching CS0 with Alice. Search on Bibsonomy SIGCSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF novice programming environments
41Yong Meng Teo, Xianbing Wang ALiCE: A Scalable Runtime Infrastructure for High Performance Grid Computing. Search on Bibsonomy NPC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Dac Phuong Ho, Yong Meng Teo, Johan Prawira Gozali Solving the N-Body Problem with the ALiCE Grid System. Search on Bibsonomy ASIAN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41Matthew Conway, Steve Audia, Tommy Burnette, Dennis Cosgrove, Kevin Christiansen Alice: lessons learned from building a 3D system for novices. Search on Bibsonomy CHI The full citation details ... 2000 DBLP  DOI  BibTeX  RDF animation authoring tools, interactive 3D graphics
41Heather Brown, Robert Harding, Steven Lay, Peter Robinson 0001, Dan Sheppard, Richard Watts Active Alice: Using Real Paper to Interact with Electronic Texts. Search on Bibsonomy EP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
38Petra Loncar Scalable data processing model of the ALICE experiment in the cloud ; Model skalabilne obrade podataka ALICE eksperimenta u oblaku. Search on Bibsonomy 2023   RDF
38Patcharaporn Jenviriyakul, Gantaphon Chalumporn, Tiranee Achalakul, Filippo Costa, Khajonpong Akkarajitsakul ALICE Connex: A volunteer computing platform for the Time-Of-Flight calibration of the ALICE experiment. An opportunistic use of CPU cycles on Android devices. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Yuqing Kong, Grant Schoenebeck Optimizing Bayesian Information Revelation Strategy in Prediction Markets: the Alice Bob Alice Case. Search on Bibsonomy ITCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Donald J. Slater, Eric Brown, Wanda P. Dann Mapping Alice Curriculum to Standards: A BOF for the Alice Community (Abstract Only). Search on Bibsonomy SIGCSE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Patcharaporn Jenviriyakul, Gantaphon Chalumporn, Tiranee Achalakul, Filippo Costa, Khajonpong Akkarajitsakul ALICE Connex: A volunteer computing platform for ALICE experiments. Search on Bibsonomy BigComp The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Leonel Morales Díaz, Laura Sanely Gaytán-Lugo, Lissette Fleck From intuition to measure: Styles of use in Alice: Identifying patterns of use by observing participants in workshops with Alice. Search on Bibsonomy VL/HCC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Ahmad Al-Jarrah, Enrico Pontelli "AliCe-ViLlagE" Alice as a Collaborative Virtual Learning Environment. Search on Bibsonomy FIE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Mark Cohen Uncoupling Alice: using Alice to teach advanced object-oriented design. Search on Bibsonomy Inroads The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Robert P. Schumaker, Ying Liu, Mark Ginsburg, Hsinchun Chen Evaluating mass knowledge acquisition using the ALICE chatterbot: The AZ-ALICE dialog system. Search on Bibsonomy Int. J. Hum. Comput. Stud. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Stanko Dimitrov, Rahul Sami Composition of markets with conflicting incentives. Search on Bibsonomy EC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF conflicting incentives, prediction markets, scoring rule, market scoring rule
33Jian Weng 0001, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai Conditional proxy re-encryption secure against chosen-ciphertext attack. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF conditional proxy re-encryption, bilinear pairing, chosen-ciphertext security
33Ke Yi 0001, Qin Zhang 0001 Multi-dimensional online tracking. Search on Bibsonomy SODA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Ivan Damgård, Jesper Buus Nielsen, Daniel Wichs Universally Composable Multiparty Computation with Partially Isolated Parties. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF public-key infrastructure, multiparty computation, universally composable security
33Cheng-Kang Chu, Jian Weng 0001, Sherman S. M. Chow, Jianying Zhou 0001, Robert H. Deng Conditional Proxy Broadcast Re-Encryption. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF conditional proxy re-encryption, hierarchical identity-coupling broadcast encryption, broadcast encryption, proxy re-encryption
33Alptekin Küpçü, Anna Lysyanskaya Brief announcement: impossibility results for optimistic fair exchange with multiple autonomous arbiters. Search on Bibsonomy PODC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF distributed arbiters, optimistic fair exchange, trusted third party
33Sanjit Chatterjee, Koray Karabina, Alfred Menezes A New Protocol for the Nearby Friend Problem. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Yevgeniy Dodis, Daniel Wichs Non-malleable extractors and symmetric key cryptography from weak secrets. Search on Bibsonomy STOC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bounded retrieval model, information reconcilliation, authentication, encryption, information theoretic security, randomness extractors, privacy amplification, authenticated key agreement
33Yaling Zhang, Xiaofeng Wang Message Substitute Attack on Concurrent Signatures Protocol and its Improvement. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Message Substitute Attack, Concurrent Signatures
33Mikhail J. Atallah, Keith B. Frikken, Marina Blanton, YounSun Cho Private combinatorial group testing. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privacy, secure protocol, group testing, integrity verification
33Alberto Trombetta, Wei Jiang, Elisa Bertino, Lorenzo Bossi Privately Updating Suppression and Generalization based k-Anonymous Databases. Search on Bibsonomy ICDE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Oded Regev 0001, Ben Toner Simulating Quantum Correlations with Finite Communication. Search on Bibsonomy FOCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Cheng-Kang Chu, Wen-Guey Tzeng Identity-Based Proxy Re-encryption Without Random Oracles. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF standard model, identity-based encryption, Proxy re-encryption
33Maged Hamada Ibrahim Two-Party Private Vector Dominance: The All-Or-Nothing Deal. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Wei Yang 0011, Liusheng Huang, Mingjun Xiao, Weiwei Jing Quantum ANDOS Protocol with Unconditional Security. Search on Bibsonomy ICNC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang Anonymous Signature Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Seth Gilbert, Rachid Guerraoui, Calvin C. Newport Of Malicious Motes and Suspicious Sensors: On the Efficiency of Malicious Interference in Wireless Networks. Search on Bibsonomy OPODIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Moni Naor, Guy N. Rothblum Learning to impersonate. Search on Bibsonomy ICML The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Hal A. Kierstead, Daqing Yang Very Asymmetric Marking Games. Search on Bibsonomy Order The full citation details ... 2005 DBLP  DOI  BibTeX  RDF coloring number, competitive coloring, planar graph
33Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar Securely Utilizing External Computing Power. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF program encryption, circuit encryption, Boolean circuit, secure function evaluation, biometric identification
33Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski Local View Attack on Anonymous Communication. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Chi-Jen Lu Encryption against Storage-Bounded Adversaries from On-Line Strong Extractors. Search on Bibsonomy J. Cryptol. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Everlasting security, List-decodable codes, Expander graphs, Randomness extractors, Bounded-storage model
33Stephan Kolassa, Stefan Schwarz Two-Step Drawing from Urns. Search on Bibsonomy OR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
33Ke Yang 0005 On the (Im)possibility of Non-interactive Correlation Distillation. Search on Bibsonomy LATIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
33Valery I. Korzhik, Guillermo Morales-Luna Hybrid authentication based on noisy channels. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key sharing, Information-theoretically secure authentication, Hash functions, Privacy amplification
33Shengli Liu 0001, Henk C. A. van Tilborg, Marten van Dijk A Practical Protocol for Advantage Distillation and Information Reconciliation. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF advantage distillation, unconditional security, secret key agreement, information reconciliation
33Qianhong Wu, Jianhong Zhang, Yumin Wang Practical t-out-n Oblivious Transfer and Its Applications. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Yan Zong Ding, Michael O. Rabin Hyper-Encryption and Everlasting Security. Search on Bibsonomy STACS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
33Chi-Jen Lu Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
33Andris Ambainis, Adam D. Smith, Ke Yang 0005 Extracting Quantum Entanglement. Search on Bibsonomy CCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Entanglement Purification, General Error Models, Purity-Testing, Quantum Cryptography
33Donald Beaver Minimal-Latency Secure Function Evaluation. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
33Andris Ambainis, Harry Buhrman, William I. Gasarch, Bala Kalyanasundaram, Leen Torenvliet The Communication Complexity of Enumeration, Elimination, and Selection. Search on Bibsonomy CCC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
33Reto Kohlas, Ueli M. Maurer Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys. Search on Bibsonomy Financial Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
33Juan A. Garay, Markus Jakobsson, Philip D. MacKenzie Abuse-Free Optimistic Contract Signing. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
33Louis Salvail The Search for the Holy Grail in Quantum Cryptography. Search on Bibsonomy Lectures on Data Security The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 4791 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license