|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 669 occurrences of 482 keywords
|
|
|
Results
Found 5904 publication records. Showing 4791 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
183 | Caitlin Kelleher, Randy F. Pausch, Sara B. Kiesler |
Storytelling alice motivates middle school girls to learn computer programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2007 Conference on Human Factors in Computing Systems, CHI 2007, San Jose, California, USA, April 28 - May 3, 2007, pp. 1455-1464, 2007, ACM, 978-1-59593-593-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
children, programming, computer science education, programming environments, motivation, gender, Alice |
150 | Susan H. Rodger, Jenna Hayes, Gaetjens Lezin, Henry Qin, Deborah Nelson, Ruth Tucker, Mercedes Lopez, Stephen Cooper, Wanda P. Dann, Don Slater |
Engaging middle school teachers and students with alice in a diverse set of subjects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 40th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2009, Chattanooga, TN, USA, March 4-7, 2009, pp. 271-275, 2009, ACM, 978-1-60558-183-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
virtual worlds, alice, introductory computer science, middle school, k-12 education, under-represented groups |
139 | Randy Pausch |
Alice: a dying man's passion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2008, Portland, OR, USA, March 12-15, 2008, pp. 1, 2008, ACM, 978-1-59593-799-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
alice |
110 | Claude Castelluccia, Pars Mutaf |
Shake them up!: a movement-based pairing protocol for CPU-constrained devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, MobiSys 2005, Seattle, Washington, USA, June 6-8, 2005, pp. 51-64, 2005, ACM, 1-931971-31-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
107 | Jeffrey S. Pierce |
Introducing Alice to a Squeak Wonderland. ![Search on Bibsonomy](Pics/bibsonomy.png) |
C5 ![In: 2003 Conference on Creating, Connecting and Collaborating through Computing (C5 2003), 31 January 2003, Kyoto, Japan, pp. 40-43, 2003, IEEE Computer Society, 0-7695-1975-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
95 | Ryan Garlick, Ebru Celikel Cankaya |
Using alice in CS1: a quantitative experiment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2010, Bilkent, Ankara, Turkey, June 26-30, 2010, pp. 165-168, 2010, ACM, 978-1-60558-729-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
pedagogy, CS1, retention, alice, CS0 |
88 | Yael Tauman Kalai, Ran Raz |
Succinct Non-Interactive Zero-Knowledge Proofs with Preprocessing for LOGSNP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2006), 21-24 October 2006, Berkeley, California, USA, Proceedings, pp. 355-366, 2006, IEEE Computer Society, 0-7695-2720-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
88 | Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski |
Conditional Digital Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 206-215, 2005, Springer, 3-540-28224-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
85 | Karin Johnsgard, James McDonald |
Using Alice in Overview Courses to Improve Success Rates in Programming I. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSEE&T ![In: Proceedings 21st Conference on Software Engineering Education and Training, CSEET 2008, 14-17 April 2008, Charleston, South Carolina, USA, pp. 129-136, 2008, IEEE Computer Society, 978-0-7695-3144-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
85 | John Domingue, Maria Martins, Jiacheng Tan, Arthur Stutt, Helgi Petursson |
Alice: Assisting Online Shoppers through Ontologies and Novel Interface Metaphors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EKAW ![In: Knowledge Engineering and Knowledge Management. Ontologies and the Semantic Web, 13th International Conference, EKAW 2002, Siguenza, Spain, October 1-4, 2002, Proceedings, pp. 335-351, 2002, Springer, 3-540-44268-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
84 | Susan H. Rodger, Maggie Bashford, Lana Dyck, Jenna Hayes, Liz Liang, Deborah Nelson, Henry Qin |
Enhancing K-12 education with alice programming adventures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2010, Bilkent, Ankara, Turkey, June 26-30, 2010, pp. 234-238, 2010, ACM, 978-1-60558-729-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
virtual worlds, alice, introductory computer science, middle school, K-12 education |
77 | Surendra Boppana, John M. Shea |
Overlapped Carrier-Sense Multiple Access (OCSMA) in Wireless Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 8(3), pp. 369-383, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
77 | Thomas Holenstein |
Parallel repetition: simplifications and the no-signaling case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, June 11-13, 2007, pp. 411-419, 2007, ACM, 978-1-59593-631-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
probabilistically checkable proofs, parallel repetition |
77 | Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III |
Public Key Encryption That Allows PIR Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 50-67, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Public-key Encryption with special properties, Database security, Private Information Retrieval, Searching on encrypted data |
77 | Olivier Markowitch, Steve Kremer |
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings, pp. 363-378, 2001, Springer, 3-540-42662-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
77 | Michael Roe |
Authentication and Naming (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 20-23, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
77 | Gábor Tardos, Uri Zwick |
The Communication Complexity of the Universal Relation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCC ![In: Proceedings of the Twelfth Annual IEEE Conference on Computational Complexity, Ulm, Germany, June 24-27, 1997, pp. 247-259, 1997, IEEE Computer Society, 0-8186-7907-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
protocols, communication complexity |
66 | Josef Cibulka, Jan Kyncl, Viola Mészáros, Rudolf Stolar, Pavel Valtr 0001 |
Solution of Peter Winkler's Pizza Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWOCA ![In: Combinatorial Algorithms, 20th International Workshop, IWOCA 2009, Hradec nad Moravicí, Czech Republic, June 28-July 2, 2009, Revised Selected Papers, pp. 356-367, 2009, Springer, 978-3-642-10216-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
66 | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia |
Private Information: To Reveal or not to Reveal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(1), pp. 6:1-6:27, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authorization, policies, secure multi-party computation |
66 | Prahladh Harsha, Rahul Jain 0001, David A. McAllester, Jaikumar Radhakrishnan |
The Communication Complexity of Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCC ![In: 22nd Annual IEEE Conference on Computational Complexity (CCC 2007), 13-16 June 2007, San Diego, California, USA, pp. 10-23, 2007, IEEE Computer Society, 0-7695-2780-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Marco Meoni |
Interactive Parallel Analysis on the ALICE Grid with the PROOF Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCS (1) ![In: Computational Science - ICCS 2009, 9th International Conference, Baton Rouge, LA, USA, May 25-27, 2009, Proceedings, Part I, pp. 114-122, 2009, Springer, 978-3-642-01969-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
interactive parallel distributed processing, task colocation, Grid, PROOF, ALICE, resource availability, data movement |
57 | Elizabeth K. Hawthorne |
Alice grows up: transitioning from Alice 2 to Alice 3 in community college programming courses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inroads ![In: Inroads 2(1), pp. 22, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
55 | Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li 0001 |
Attribute-Based Access Control with Hidden Policies and Hidden Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 55(10), pp. 1259-1270, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Electronic commerce-security, hidden credentials, privacy, authentication, access control, trust negotiation, security and protection, management of computing and information systems |
55 | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia |
Point-Based Trust: Define How Much Privacy Is Worth. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 190-209, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
private multi-party computation, Trust management, knapsack problem |
55 | Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li 0001 |
Hidden access control policies with hidden credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004, pp. 27, 2004, ACM, 1-58113-968-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
hidden credentials, privacy, access control, secure multi-party computation, trust negotiation |
55 | Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano |
Public Key Encryption with Keyword Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 506-522, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
55 | Christian Cachin, Jan Camenisch, Joe Kilian, Joy Müller |
One-Round Secure Computation and Secure Autonomous Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 27th International Colloquium, ICALP 2000, Geneva, Switzerland, July 9-15, 2000, Proceedings, pp. 512-523, 2000, Springer, 3-540-67715-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
55 | Richard Cleve |
Controlled Gradual Disclosure Schemes for Random Bits and Their Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 573-588, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
52 | Adam Martinez, Terrance Tornberg |
Lighting and rendering Alice in Wonderland. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGGRAPH Talks ![In: International Conference on Computer Graphics and Interactive Techniques, SIGGRAPH 2010, Los Angeles, California, USA, July 26-30, 2010, Talks Proceedings, 2010, ACM, 978-1-4503-0394-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
52 | Briana Lowe Wellman, James E. Davis, Monica Anderson 0001 |
Alice and robotics in introductory CS courses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Richard Tapia Celebration of Diversity in Computing Conference ![In: Proceedings of the Richard Tapia Celebration of Diversity in Computing Conference 2009: Intellect, Initiatives, Insight, and Innovations, Portland, Oregon, USA, April 1-4, 2009, pp. 98-102, 2009, ACM, 978-1-60558-217-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
education, diversity, computer science |
51 | Sally Fincher, Stephen Cooper, Michael Kölling, John Maloney |
Comparing alice, greenfoot & scratch. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 41st ACM technical symposium on Computer science education, SIGCSE 2010, Milwaukee, Wisconsin, USA, March 10-13, 2010, pp. 192-193, 2010, ACM, 978-1-4503-0006-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
alice, scratch, ile, greenfoot |
51 | Robert H. Seidman |
Alice first: 3D interactive game programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 14th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2009, Paris, France, July 6-9, 2009, pp. 345, 2009, ACM, 978-1-60558-381-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
devlopment, java, algorithm, animation, CS1, virtual worlds, objects, 3D, alice, game programming |
51 | Linda L. Werner, Jill Denner, Michelle Bliesner, Pat Rex |
Can middle-schoolers use Storytelling Alice to make games?: results of a pilot study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDG ![In: Proceedings of the 4th International Conference on Foundations of Digital Games, FDG 2009, Orlando, Florida, USA, April 26-30, 2009, pp. 207-214, 2009, ACM, 978-1-60558-437-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Storytelling Alice, pair programming, middle-school, IT fluency |
51 | Torben Lorenzen, Abdul Sattar 0002 |
Objects first using Alice to introduce object constructs in CS1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGCSE Bull. ![In: ACM SIGCSE Bull. 40(2), pp. 62-64, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Java, object-oriented programming, objects, methods, classes, Alice |
51 | Joel C. Adams |
Alice, middle schoolers & the imaginary worlds camps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2007, Covington, Kentucky, USA, March 7-11, 2007, pp. 307-311, 2007, ACM, 1-59593-361-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
3-D animation, camp, single-sex classes, programming, computer science, objects, gender, Alice, movies, middle school |
44 | Stefan Dziembowski, Ueli M. Maurer |
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 54(6), pp. 2790-2792, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Yasuhiro Ohtaki |
Partial Disclosure of Searchable Encrypted Data with Support for Boolean Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1083-1090, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Secure logging, Partial disclosure, Searchable encryption |
44 | Jiangtao Li 0001, Ninghui Li |
OACerts: Oblivious Attribute Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 3(4), pp. 340-352, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, access controls, Security and privacy protection, cryptographic controls |
44 | Alberto Trombetta, Elisa Bertino |
Private Updates to Anonymous Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006, 3-8 April 2006, Atlanta, GA, USA, pp. 116, 2006, IEEE Computer Society, 0-7695-2570-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Privacy, anonymity, data management, secure computation |
44 | Audun Jøsang, Stephen Marsh 0001, Simon Pope |
Exploring Different Types of Trust Propagation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings, pp. 179-192, 2006, Springer, 3-540-34295-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Shai Avidan, Moshe Butman |
Blind Vision. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECCV (3) ![In: Computer Vision - ECCV 2006, 9th European Conference on Computer Vision, Graz, Austria, May 7-13, 2006, Proceedings, Part III, pp. 1-13, 2006, Springer, 3-540-33836-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Giuseppe Ateniese, Susan Hohenberger |
Proxy re-signatures: new definitions, algorithms, and applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 310-319, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
authenticating path in network, proxy re-signature, bilinear maps |
44 | Jiangtao Li 0001, Ninghui Li |
OACerts: Oblivious Attribute Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 301-317, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Jiangtao Li 0001, Ninghui Li |
Policy-hiding access control in open environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, PODC 2005, Las Vegas, NV, USA, July 17-20, 2005, pp. 29-38, 2005, ACM, 1-58113-994-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
cryptographic commitment, secure function, privacy, evaluation, access control, cryptographic protocol, automated trust negotiation, digital credentials |
44 | Thomas Holenstein, Renato Renner |
One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, pp. 478-493, 2005, Springer, 3-540-28114-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Ueli M. Maurer, Yacov Yacobi |
A Remark on a Non-interactive Public-Key Distribution System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonfüred, Hungary, May 24-28, 1992, Proceedings, pp. 458-460, 1992, Springer, 3-540-56413-6. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
44 | Ueli M. Maurer |
Protocols for Secret Key Agreement by Public Discussion Based on Common Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings, pp. 461-470, 1992, Springer, 3-540-57340-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
44 | Mihir Bellare, Lenore Cowen, Shafi Goldwasser |
On the Structure of Secret Key Exchange Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 604-605, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
43 | Joel C. Adams |
Scratching middle schoolers' creative itch. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 41st ACM technical symposium on Computer science education, SIGCSE 2010, Milwaukee, Wisconsin, USA, March 10-13, 2010, pp. 356-360, 2010, ACM, 978-1-4503-0006-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
2-d animation, summer camps, games, videos, programming, music, computer science, gender, alice, scratch, middle school |
41 | Wanda P. Dann, Stephen Cooper |
Education - Alice 3: concrete to abstract. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 52(8), pp. 27-29, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Sebastian Mödersheim |
Algebraic Properties in Alice and Bob Notation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 433-440, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Kris Powers, Stacey Ecott, Leanne M. Hirshfield |
Through the looking glass: teaching CS0 with Alice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2007, Covington, Kentucky, USA, March 7-11, 2007, pp. 213-217, 2007, ACM, 1-59593-361-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
novice programming environments |
41 | Yong Meng Teo, Xianbing Wang |
ALiCE: A Scalable Runtime Infrastructure for High Performance Grid Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC ![In: Network and Parallel Computing, IFIP International Conference, NPC 2004, Wuhan, China, October 18-20, 2004, Proceedings, pp. 101-109, 2004, Springer, 3-540-23388-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Dac Phuong Ho, Yong Meng Teo, Johan Prawira Gozali |
Solving the N-Body Problem with the ALiCE Grid System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computing Science - ASIAN 2002, Internet Computing and Modeling, Grid Computing, Peer-to-Peer Computing, and Cluster Computing, 7th Asian Computing Science Conference, Hanoi, Vietnam, December 4-6, 2002, Proceedings, pp. 87-97, 2002, Springer, 3-540-00195-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
41 | Matthew Conway, Steve Audia, Tommy Burnette, Dennis Cosgrove, Kevin Christiansen |
Alice: lessons learned from building a 3D system for novices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the CHI 2000 Conference on Human factors in computing systems, The Hague, The Netherlands, April 1-6, 2000., pp. 486-493, 2000, ACM, 1-58113-216-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
animation authoring tools, interactive 3D graphics |
41 | Heather Brown, Robert Harding, Steven Lay, Peter Robinson 0001, Dan Sheppard, Richard Watts |
Active Alice: Using Real Paper to Interact with Electronic Texts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EP ![In: Electronic Publishing, Artistic Imaging, and Digital Typography, 7th International Conference on Electronic Publishing, EP '98, Held Jointly with the 4th International Conference on Raster Imaging and Digital Typography, RIDT '98, St. Malo, France, March 30 - April 3, 1998, Proceedings, pp. 407-419, 1998, Springer, 3-540-64298-6. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
38 | Petra Loncar |
Scalable data processing model of the ALICE experiment in the cloud ; Model skalabilne obrade podataka ALICE eksperimenta u oblaku. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2023 |
RDF |
|
38 | Patcharaporn Jenviriyakul, Gantaphon Chalumporn, Tiranee Achalakul, Filippo Costa, Khajonpong Akkarajitsakul |
ALICE Connex: A volunteer computing platform for the Time-Of-Flight calibration of the ALICE experiment. An opportunistic use of CPU cycles on Android devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 94, pp. 510-523, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
38 | Yuqing Kong, Grant Schoenebeck |
Optimizing Bayesian Information Revelation Strategy in Prediction Markets: the Alice Bob Alice Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCS ![In: 9th Innovations in Theoretical Computer Science Conference, ITCS 2018, January 11-14, 2018, Cambridge, MA, USA, pp. 14:1-14:20, 2018, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 978-3-95977-060-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
38 | Donald J. Slater, Eric Brown, Wanda P. Dann |
Mapping Alice Curriculum to Standards: A BOF for the Alice Community (Abstract Only). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2017, Seattle, WA, USA, March 8-11, 2017, pp. 731, 2017, ACM, 978-1-4503-4698-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
38 | Patcharaporn Jenviriyakul, Gantaphon Chalumporn, Tiranee Achalakul, Filippo Costa, Khajonpong Akkarajitsakul |
ALICE Connex: A volunteer computing platform for ALICE experiments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BigComp ![In: 2016 International Conference on Big Data and Smart Computing, BigComp 2016, Hong Kong, China, January 18-20, 2016, pp. 300-303, 2016, IEEE Computer Society, 978-1-4673-8796-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
38 | Leonel Morales Díaz, Laura Sanely Gaytán-Lugo, Lissette Fleck |
From intuition to measure: Styles of use in Alice: Identifying patterns of use by observing participants in workshops with Alice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VL/HCC ![In: 2015 IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC 2015, Atlanta, GA, USA, October 18-22, 2015, pp. 311-312, 2015, IEEE Computer Society, 978-1-4673-7457-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
38 | Ahmad Al-Jarrah, Enrico Pontelli |
"AliCe-ViLlagE" Alice as a Collaborative Virtual Learning Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FIE ![In: IEEE Frontiers in Education Conference, FIE 2014, Proceedings, Madrid, Spain, October 22-25, 2014, pp. 1-9, 2014, IEEE Computer Society, 978-1-4799-3922-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
38 | Mark Cohen |
Uncoupling Alice: using Alice to teach advanced object-oriented design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inroads ![In: Inroads 4(3), pp. 82-88, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
38 | Robert P. Schumaker, Ying Liu, Mark Ginsburg, Hsinchun Chen |
Evaluating mass knowledge acquisition using the ALICE chatterbot: The AZ-ALICE dialog system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Hum. Comput. Stud. ![In: Int. J. Hum. Comput. Stud. 64(11), pp. 1132-1140, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Stanko Dimitrov, Rahul Sami |
Composition of markets with conflicting incentives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings 11th ACM Conference on Electronic Commerce (EC-2010), Cambridge, Massachusetts, USA, June 7-11, 2010, pp. 53-62, 2010, ACM, 978-1-60558-822-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
conflicting incentives, prediction markets, scoring rule, market scoring rule |
33 | Jian Weng 0001, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai |
Conditional proxy re-encryption secure against chosen-ciphertext attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 322-332, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
conditional proxy re-encryption, bilinear pairing, chosen-ciphertext security |
33 | Ke Yi 0001, Qin Zhang 0001 |
Multi-dimensional online tracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SODA ![In: Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2009, New York, NY, USA, January 4-6, 2009, pp. 1098-1107, 2009, SIAM, 978-0-89871-680-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Ivan Damgård, Jesper Buus Nielsen, Daniel Wichs |
Universally Composable Multiparty Computation with Partially Isolated Parties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings, pp. 315-331, 2009, Springer, 978-3-642-00456-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
public-key infrastructure, multiparty computation, universally composable security |
33 | Cheng-Kang Chu, Jian Weng 0001, Sherman S. M. Chow, Jianying Zhou 0001, Robert H. Deng |
Conditional Proxy Broadcast Re-Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 327-342, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
conditional proxy re-encryption, hierarchical identity-coupling broadcast encryption, broadcast encryption, proxy re-encryption |
33 | Alptekin Küpçü, Anna Lysyanskaya |
Brief announcement: impossibility results for optimistic fair exchange with multiple autonomous arbiters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, PODC 2009, Calgary, Alberta, Canada, August 10-12, 2009, pp. 336-337, 2009, ACM, 978-1-60558-396-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
distributed arbiters, optimistic fair exchange, trusted third party |
33 | Sanjit Chatterjee, Koray Karabina, Alfred Menezes |
A New Protocol for the Nearby Friend Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings, pp. 236-251, 2009, Springer, 978-3-642-10867-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Yevgeniy Dodis, Daniel Wichs |
Non-malleable extractors and symmetric key cryptography from weak secrets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2, 2009, pp. 601-610, 2009, ACM, 978-1-60558-506-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
bounded retrieval model, information reconcilliation, authentication, encryption, information theoretic security, randomness extractors, privacy amplification, authenticated key agreement |
33 | Yaling Zhang, Xiaofeng Wang |
Message Substitute Attack on Concurrent Signatures Protocol and its Improvement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 497-501, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Message Substitute Attack, Concurrent Signatures |
33 | Mikhail J. Atallah, Keith B. Frikken, Marina Blanton, YounSun Cho |
Private combinatorial group testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 312-320, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, secure protocol, group testing, integrity verification |
33 | Alberto Trombetta, Wei Jiang, Elisa Bertino, Lorenzo Bossi |
Privately Updating Suppression and Generalization based k-Anonymous Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pp. 1370-1372, 2008, IEEE Computer Society, 978-1-4244-1836-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Oded Regev 0001, Ben Toner |
Simulating Quantum Correlations with Finite Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), October 20-23, 2007, Providence, RI, USA, Proceedings, pp. 384-394, 2007, IEEE Computer Society, 978-0-7695-3010-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Cheng-Kang Chu, Wen-Guey Tzeng |
Identity-Based Proxy Re-encryption Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 189-202, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
standard model, identity-based encryption, Proxy re-encryption |
33 | Maged Hamada Ibrahim |
Two-Party Private Vector Dominance: The All-Or-Nothing Deal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Third International Conference on Information Technology: New Generations (ITNG 2006), 10-12 April 2006, Las Vegas, Nevada, USA, pp. 166-171, 2006, IEEE Computer Society, 0-7695-2497-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Wei Yang 0011, Liusheng Huang, Mingjun Xiao, Weiwei Jing |
Quantum ANDOS Protocol with Unconditional Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC (2) ![In: Advances in Natural Computation, Second International Conference, ICNC 2006, Xi'an, China, September 24-28, 2006. Proceedings, Part II, pp. 20-30, 2006, Springer, 3-540-45907-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang |
Anonymous Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 347-363, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Seth Gilbert, Rachid Guerraoui, Calvin C. Newport |
Of Malicious Motes and Suspicious Sensors: On the Efficiency of Malicious Interference in Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OPODIS ![In: Principles of Distributed Systems, 10th International Conference, OPODIS 2006, Bordeaux, France, December 12-15, 2006, Proceedings, pp. 215-229, 2006, Springer, 3-540-49990-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Moni Naor, Guy N. Rothblum |
Learning to impersonate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICML ![In: Machine Learning, Proceedings of the Twenty-Third International Conference (ICML 2006), Pittsburgh, Pennsylvania, USA, June 25-29, 2006, pp. 649-656, 2006, ACM, 1-59593-383-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Hal A. Kierstead, Daqing Yang |
Very Asymmetric Marking Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Order ![In: Order 22(2), pp. 93-107, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
coloring number, competitive coloring, planar graph |
33 | Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar |
Securely Utilizing External Computing Power. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 762-767, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
program encryption, circuit encryption, Boolean circuit, secure function evaluation, biometric identification |
33 | Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski |
Local View Attack on Anonymous Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, pp. 475-488, 2005, Springer, 3-540-28963-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Chi-Jen Lu |
Encryption against Storage-Bounded Adversaries from On-Line Strong Extractors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 17(1), pp. 27-42, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Everlasting security, List-decodable codes, Expander graphs, Randomness extractors, Bounded-storage model |
33 | Stephan Kolassa, Stefan Schwarz |
Two-Step Drawing from Urns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OR ![In: Operations Research, Proceedings 2004, Selected Papers of the Annual International Conference of the German Operations Research Society (GOR), Jointly Organized with the Netherlands Society for Operations Research (NGB), Tilburg, The Netherlands, September 1-3, 2004, pp. 313-318, 2004, 978-3-540-24274-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Ke Yang 0005 |
On the (Im)possibility of Non-interactive Correlation Distillation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LATIN ![In: LATIN 2004: Theoretical Informatics, 6th Latin American Symposium, Buenos Aires, Argentina, April 5-8, 2004, Proceedings, pp. 222-231, 2004, Springer, 3-540-21258-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Valery I. Korzhik, Guillermo Morales-Luna |
Hybrid authentication based on noisy channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 1(4), pp. 203-210, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Key sharing, Information-theoretically secure authentication, Hash functions, Privacy amplification |
33 | Shengli Liu 0001, Henk C. A. van Tilborg, Marten van Dijk |
A Practical Protocol for Advantage Distillation and Information Reconciliation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 30(1), pp. 39-62, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
advantage distillation, unconditional security, secret key agreement, information reconciliation |
33 | Qianhong Wu, Jianhong Zhang, Yumin Wang |
Practical t-out-n Oblivious Transfer and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings, pp. 226-237, 2003, Springer, 3-540-20150-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Yan Zong Ding, Michael O. Rabin |
Hyper-Encryption and Everlasting Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STACS ![In: STACS 2002, 19th Annual Symposium on Theoretical Aspects of Computer Science, Antibes - Juan les Pins, France, March 14-16, 2002, Proceedings, pp. 1-26, 2002, Springer, 3-540-43283-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Chi-Jen Lu |
Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 257-271, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Andris Ambainis, Adam D. Smith, Ke Yang 0005 |
Extracting Quantum Entanglement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCC ![In: Proceedings of the 17th Annual IEEE Conference on Computational Complexity, Montréal, Québec, Canada, May 21-24, 2002, pp. 103-112, 2002, IEEE Computer Society, 0-7695-1468-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Entanglement Purification, General Error Models, Purity-Testing, Quantum Cryptography |
33 | Donald Beaver |
Minimal-Latency Secure Function Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding, pp. 335-350, 2000, Springer, 3-540-67517-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
33 | Andris Ambainis, Harry Buhrman, William I. Gasarch, Bala Kalyanasundaram, Leen Torenvliet |
The Communication Complexity of Enumeration, Elimination, and Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCC ![In: Proceedings of the 15th Annual IEEE Conference on Computational Complexity, Florence, Italy, July 4-7, 2000, pp. 44-53, 2000, IEEE Computer Society, 0-7695-0674-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
33 | Reto Kohlas, Ueli M. Maurer |
Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings, pp. 86-103, 1999, Springer, 3-540-66362-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
33 | Juan A. Garay, Markus Jakobsson, Philip D. MacKenzie |
Abuse-Free Optimistic Contract Signing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, pp. 449-466, 1999, Springer, 3-540-66347-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
33 | Louis Salvail |
The Search for the Holy Grail in Quantum Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Lectures on Data Security ![In: Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998, pp. 183-216, 1998, Springer, 3-540-65757-6. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 4791 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|