Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
125 | Randall W. Lichota, Grace L. Hammonds, Stephen H. Brackin |
Verifying The Correctness Of Cryptographic Protocols Using "Convince". ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 117-128, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Convince, theorem proving component, commercial computer aided software engineering tool, StP/OMT, textual notations, Higher Order Logic theorem prover, protocols, cryptographic protocols, authentication protocols, front-end, belief logic, correctness verification, automated support |
47 | Ching Yu Ng, Willy Susilo, Yi Mu 0001 |
Designated group credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 59-65, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
designated, signature, bilinear pairings, credential |
47 | Willy Susilo, Yi Mu 0001 |
Non-interactive Deniable Ring Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 386-401, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Ring signature schemes, non-interactive, ring-to-ring authentication, deniable |
47 | David Chaum, Sandra Roijakkers |
Unconditionally Secure Digital Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings, pp. 206-214, 1990, Springer, 3-540-54508-5. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
47 | Gilles Brassard, Claude Crépeau |
Zero-Knowledge Simulation of Boolean Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings, pp. 223-233, 1986, Springer. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
35 | Américo Nobre G. F. Amorim, Jairo S. Dornelas |
P2P Users: Important dimensions for changing to legal online music stores. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E ![In: Project E-Society: Building Bricks, 6TH IFIP International Conference on e-Commerce, e-Business, and e-Government (I3E 2006), October 11-13, 2006, Turku, Finland, pp. 228-239, 2006, Springer, 978-0-387-39226-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Aaquib Tabrez |
Effective Human-Machine Teaming through Communicative Autonomous Agents that Explain, Coach, and Convince. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2023, London, United Kingdom, 29 May 2023 - 2 June 2023, pp. 3008-3010, 2023, ACM, 978-1-4503-9432-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
30 | Hannaneh Barahouei Pasandi, Tamer Nadeem |
CONVINCE: Collaborative Cross-Camera Video Analytics at the Edge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2002.03797, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
30 | Hannaneh Barahouei Pasandi, Tamer Nadeem |
CONVINCE: Collaborative Cross-Camera Video Analytics at the Edge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: 2020 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2020, Austin, TX, USA, March 23-27, 2020, pp. 1-5, 2020, IEEE, 978-1-7281-4716-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
30 | Ethan Perez, Siddharth Karamcheti, Rob Fergus, Jason Weston, Douwe Kiela, Kyunghyun Cho |
Finding Generalizable Evidence by Learning to Convince Q&A Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1909.05863, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
30 | Ethan Perez, Siddharth Karamcheti, Rob Fergus, Jason Weston, Douwe Kiela, Kyunghyun Cho |
Finding Generalizable Evidence by Learning to Convince Q&A Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMNLP/IJCNLP (1) ![In: Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, EMNLP-IJCNLP 2019, Hong Kong, China, November 3-7, 2019, pp. 2402-2411, 2019, Association for Computational Linguistics, 978-1-950737-90-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
30 | Vitobha Munigala, Srikanth Tamilselvam, Anush Sankaran |
"Let me convince you to buy my product ... ": A Case Study of an Automated Persuasive System for Fashion Products. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1709.08366, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
30 | Juraj Hromkovic, Regula Lacher |
How to convince teachers to teach computer science even if informatics was never a part of their own studies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bull. EATCS ![In: Bull. EATCS 123, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
30 | Isaac Persing, Vincent Ng 0001 |
Why Can't You Convince Me? Modeling Weaknesses in Unpersuasive Arguments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCAI ![In: Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, IJCAI 2017, Melbourne, Australia, August 19-25, 2017, pp. 4082-4088, 2017, ijcai.org, 978-0-9992411-0-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
30 | Raoul Monnier, Adrian Popescu 0002, Rickard Ljung |
CONVINcE: Towards Power-Optimized Video Distribution Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIN ![In: 2016 conference on Innovations in Clouds, Internet and Networks, ICIN 2016, Paris, France, March 1-3, 2016., 2016, IFIP, 978-3-901882-81-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
30 | Bowen Zheng, Chung-Wei Lin, Huafeng Yu, Hengyi Liang, Qi Zhu 0002 |
CONVINCE: a cross-layer modeling, exploration and validation framework for next-generation connected vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAD ![In: Proceedings of the 35th International Conference on Computer-Aided Design, ICCAD 2016, Austin, TX, USA, November 7-10, 2016, pp. 37, 2016, ACM, 978-1-4503-4466-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Elmar Lins, Kaja J. Fietkiewicz, Eva Lutz |
How to Convince the Crowd: An Impression Management Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 49th Hawaii International Conference on System Sciences, HICSS 2016, Koloa, HI, USA, January 5-8, 2016, pp. 3505-3514, 2016, IEEE Computer Society, 978-0-7695-5670-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Radoslaw Michalski, Przemyslaw Kazienko, Jaroslaw Jankowski |
Convince a Dozen More and Succeed - The Influence in Multi-layered Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SITIS ![In: Ninth International Conference on Signal-Image Technology & Internet-Based Systems, SITIS 2013, Kyoto, Japan, December 2-5, 2013, pp. 499-505, 2013, IEEE Computer Society, 978-1-4799-3211-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
30 | Srihari Nelakuditi, Chase Gray, Romit Roy Choudhury |
Snap judgement of publication quality: how to convince a dean that you are a good researcher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGMOBILE Mob. Comput. Commun. Rev. ![In: ACM SIGMOBILE Mob. Comput. Commun. Rev. 15(2), pp. 20-23, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
30 | Hans Muller, Christiaan Maasdorp |
The data, information, and knowledge hierarchy and its ability to convince. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RCIS ![In: Proceedings of the Fifth IEEE International Conference on Research Challenges in Information Science, RCIS 2011, Gosier, Guadeloupe, France, 19-21 May, 2011, pp. 1-6, 2011, IEEE, 978-1-4244-8670-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
30 | Andreas Eckhardt, Tim Weitzel, Wolfgang König, Josef Buschbacher |
How to Convince People Who Don't Like IT to Use IT: A Case Study on E-Recruiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMCIS ![In: Reaching New Heights. 13th Americas Conference on Information Systems, AMCIS 2007, Keystone, Colorado, USA, August 9-12, 2007, pp. 262, 2007, Association for Information Systems. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
30 | B. Bossard, Jean-Marie Renard, P. Capelle, P. Paradis, Marie-Catherine Beuscart |
How to convince your manager to invest in an HIS preimplementation methodology for appraisal of material, process and human costs and benefits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMIA ![In: AMIA 2000, American Medical Informatics Association Annual Symposium, Los Angeles, CA, USA, November 4-8, 2000, 2000, AMIA. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
30 | Shu-Heng Chen, Tzu-Wen Kuo |
Are Efficient Markets Really Efficient?: Can Financial Econometric Tests Convince Maching Learning People? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IC-AI ![In: Proceedings of the International Conference on Artificial Intelligence, IC-AI '99, June 28 - July 1, 1999, Las Vegas, Nevada, USA, Volume 2, pp. 444-450, 1999, CSREA Press, 1-892512-17-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
30 | Patricia K. Schank, Michael Andrew Ranney |
Improved reasoning with Convince Me. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI 95 Conference Companion ![In: Human Factors in Computing Systems, CHI '95 Conference Companion: Mosaic of Creativity, Denver, Colorado, USA, May 7-11, 1995., pp. 276-277, 1995, ACM, 0-89791-755-3. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
30 | H. J. M. Rutten |
Evaluation of Broadband Based Multimedia Applications - how to convince the business. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Broadband Islands ![In: Broadband Islands '94, Connecting with the End-User, Proceedings of the 3rd Intermational Conference on Broadband Islands, Hamburg, Germany, 7-9 June, 1994, pp. 343-348, 1994, North-Holland, 0-444-81905-3. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP BibTeX RDF |
|
30 | Jin H. Kim, Judea Pearl |
Convince: A Conversational Inference Consolidation Engine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. ![In: IEEE Trans. Syst. Man Cybern. 17(2), pp. 120-132, 1987. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
23 | Pairat Thorncharoensri, Willy Susilo, Yi Mu 0001 |
Universal Designated Verifier Signatures with Threshold-Signers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan, October 28-30, 2009, Proceedings, pp. 89-109, 2009, Springer, 978-3-642-04845-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Ching-Lueh Chang, Yuh-Dauh Lyuu |
Spreading Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COCOON ![In: Computing and Combinatorics, 14th Annual International Conference, COCOON 2008, Dalian, China, June 27-29, 2008, Proceedings, pp. 587-599, 2008, Springer, 978-3-540-69732-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Gus Gutoski, John Watrous |
Quantum Interactive Proofs with Competing Provers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STACS ![In: STACS 2005, 22nd Annual Symposium on Theoretical Aspects of Computer Science, Stuttgart, Germany, February 24-26, 2005, Proceedings, pp. 605-616, 2005, Springer, 3-540-24998-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Gus Gutoski |
Upper Bounds for Quantum Interactive Proofs with Competing Provers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCC ![In: 20th Annual IEEE Conference on Computational Complexity (CCC 2005), 11-15 June 2005, San Jose, CA, USA, pp. 334-343, 2005, IEEE Computer Society, 0-7695-2364-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Willy Susilo, Yi Mu 0001 |
Deniable Ring Authentication Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 149-163, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Xiaofeng Chen 0001, Fangguo Zhang, Kwangjo Kim |
Limited Verifier Signature from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 135-148, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Paul E. Dunne, Peter McBurney |
Optimal utterances in dialogue protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: The Second International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS 2003, July 14-18, 2003, Melbourne, Victoria, Australia, Proceedings, pp. 608-615, 2003, ACM, 1-58113-683-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
argumentation and persuasion, dialogue protocols, locution selection, computational complexity, agent communication languages |
23 | Moni Naor |
Deniable Ring Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 481-498, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Birgit Pfitzmann, Ahmad-Reza Sadeghi |
Anonymous Fingerprinting with Direct Non-repudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 401-414, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
digital coin, anonymity, fingerprinting, restrictiveness |
23 | Josh Cohen Benaloh |
Cryptographic Capsules: A Disjunctive Primative for Interactive Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings, pp. 213-222, 1986, Springer. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
23 | David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf, René Peralta 0001 |
Demonstrating Possession of a Discrete Logarithm Without Revealing It. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings, pp. 200-212, 1986, Springer. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
12 | Ronen Gradwohl, Moni Naor, Benny Pinkas, Guy N. Rothblum |
Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theory Comput. Syst. ![In: Theory Comput. Syst. 44(2), pp. 245-268, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Cryptography, Zero-knowledge proofs, Puzzles |
12 | Yevgeniy Dodis, Jonathan Katz, Adam D. Smith, Shabsi Walfish |
Composability and On-Line Deniability of Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings, pp. 146-162, 2009, Springer, 978-3-642-00456-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Marta Indulska, Peter F. Green, Jan Recker, Michael Rosemann |
Business Process Modeling: Perceived Benefits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ER ![In: Conceptual Modeling - ER 2009, 28th International Conference on Conceptual Modeling, Gramado, Brazil, November 9-12, 2009. Proceedings, pp. 458-471, 2009, Springer, 978-3-642-04839-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
modeling advantages, Delphi study, Business process modeling, benefits |
12 | Julien Cathalo, Benoît Libert, Moti Yung |
Group Encryption: Non-interactive Realization in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 179-196, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Group encryption, anonymity, provable security |
12 | Magalie Ochs, Helmut Prendinger |
Emotional gaming: win by emotion expression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Advances in Computer Entertainment Technology ![In: Proceedings of the International Conference on Advances in Computer Entertainment Technology, ACE 2009, Athens, Greece, October 29-31, 2009, pp. 324-327, 2009, ACM, 978-1-60558-864-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan |
Identity Based Aggregate Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings, pp. 378-397, 2009, Springer, 978-3-642-10627-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Aggregate Signcryption, Provable Security, Bilinear Pairings, Random Oracle Model, Identity Based Cryptography |
12 | David Galindo |
Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 389-398, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
non-interactive proofs, standard model, public key encryption, identity-based encryption |
12 | Manoj Prabhakaran 0001, Rui Xue 0001 |
Statistically Hiding Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 100-116, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Hans Peter Jepsen, Danilo Beuche |
Running a software product line: standing still is going backwards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPLC ![In: Software Product Lines, 13th International Conference, SPLC 2009, San Francisco, California, USA, August 24-28, 2009, Proceedings, pp. 101-110, 2009, ACM. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
12 | Peter Y. A. Ryan |
How Many Election Officials Does It Take to Change an Election? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARSPA-WITS ![In: Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers, pp. 211-221, 2009, Springer, 978-3-642-03458-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Yitong Wang, Xiaojun Feng |
A Potential-Based Node Selection Strategy for Influence Maximization in a Social Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADMA ![In: Advanced Data Mining and Applications, 5th International Conference, ADMA 2009, Beijing, China, August 17-19, 2009. Proceedings, pp. 350-361, 2009, Springer, 978-3-642-03347-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
social network, greedy algorithm, viral marketing, information diffusion, influence maximization |
12 | Markus Schweighofer |
Describing convex semialgebraic sets by linear matrix inequalities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSAC ![In: Symbolic and Algebraic Computation, International Symposium, ISSAC 2009, Seoul, Republic of Korea, July 29-31, 2009, Proceedings, pp. 385-386, 2009, ACM, 978-1-60558-609-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
determinantal representation, moment relaxation, polynomial inequality, quadratic module, semialgebraic set, spectrahedron, semidefinite programming, linear matrix inequality, convex set, sums of squares, preordering |
12 | Balachandra Reddy Kandukuri, Ramakrishna Paturi V., Atanu Rakshit |
Cloud Security Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2009 IEEE International Conference on Services Computing (SCC 2009), 21-25 September 2009, Bangalore, India, pp. 517-520, 2009, IEEE Computer Society, 978-0-7695-3811-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Stuart Reges |
Marketing the programming languages course. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGPLAN Notices ![In: ACM SIGPLAN Notices 43(11), pp. 104-107, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Philippe Golle, Frank McSherry, Ilya Mironov |
Data Collection with Self-Enforcing Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(2), pp. 9:1-9:24, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, data collection |
12 | Huan Wang 0004, Liang-Tien Chia, Song Liu 0001 |
Image retrieval ++ - web image retrieval with an enhanced multi-modality ontology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 39(2), pp. 189-215, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Spearman’s rank correlation coefficient, Ontology, Web image retrieval |
12 | Luther Martin |
Key-Management Infrastructure for Protecting Stored Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 41(6), pp. 103-104, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Norman Jacobson, Suzanne K. Schaefer |
Pair programming in CS1: overcoming objections to its adoption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGCSE Bull. ![In: ACM SIGCSE Bull. 40(2), pp. 93-96, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
lab exams, on-computer exams, CS1, pair programming |
12 | Tao Feng, Fenghua Li, Jianfeng Ma 0001, Sang-Jae Moon |
A new approach for UC security concurrent deniable authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 51(4), pp. 352-367, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
concurrent deniable authentication, verifiably smooth projective hashing, the decisional composite residuosity assumption, information security, universally composable |
12 | Shou-De Lin, Hans Chalupsky |
Discovering and Explaining Abnormal Nodes in Semantic Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 20(8), pp. 1039-1052, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu 0001 |
Publicly Verifiable Privacy-Preserving Group Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 72-83, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Group decryption, Anonymity, Bilinear pairing, Group-oriented cryptography |
12 | Wei Zhao, Changlu Lin, Dingfeng Ye |
Provably Secure Convertible Nominative Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 23-40, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Nominative signature, Digital signature, Selectively, Universally, Convertible |
12 | Pierre Baldi, Cristina Videira Lopes, Erik Linstead, Sushil Krishna Bajracharya |
A theory of aspects as latent topics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA ![In: Proceedings of the 23rd Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2008, October 19-23, 2008, Nashville, TN, USA, pp. 543-562, 2008, ACM, 978-1-60558-215-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
aspect-oriented programming, topic models, scattering, tangling |
12 | Yasuhiro Ohtaki |
Partial Disclosure of Searchable Encrypted Data with Support for Boolean Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1083-1090, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Secure logging, Partial disclosure, Searchable encryption |
12 | Atsushi Koide, Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
A Restricted Undeniable Designated Verifier Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 1375-1380, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Qiong Huang 0001, Guomin Yang, Duncan S. Wong, Willy Susilo |
Ambiguous Optimistic Fair Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings, pp. 74-89, 2008, Springer, 978-3-540-89254-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara |
Anonymous Fingerprinting for Predelivery of Contents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers, pp. 134-151, 2008, Springer, 978-3-642-00729-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Gilles Audemard, Laurent Simon |
Experimenting with Small Changes in Conflict-Driven Clause Learning Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CP ![In: Principles and Practice of Constraint Programming, 14th International Conference, CP 2008, Sydney, Australia, September 14-18, 2008. Proceedings, pp. 630-634, 2008, Springer, 978-3-540-85957-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Na Wang 0001, Xia Li 0006, Xuehui Luo |
Semi-supervised kernel-based fuzzy C-means with pairwise constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2008, part of the IEEE World Congress on Computational Intelligence, WCCI 2008, Hong Kong, China, June 1-6, 2008, pp. 1098-1102, 2008, IEEE, 978-1-4244-1820-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Jan Kostka, Yvonne Anne Oswald, Roger Wattenhofer |
Word of Mouth: Rumor Dissemination in Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIROCCO ![In: Structural Information and Communication Complexity, 15th International Colloquium, SIROCCO 2008, Villars-sur-Ollon, Switzerland, June 17-20, 2008, Proceedings, pp. 185-196, 2008, Springer, 978-3-540-69326-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Jon G. Hall |
Requirements and architectures: two sides of the same coin. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SHARK ![In: Proceedings of the 3rd International Workshop on Sharing and Reusing Architectural Knowledge, SHARK 2008, Leipzig, Germany, May 13, 2008, pp. 29-30, 2008, ACM, 978-1-60558-038-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
problem orientation, engineering design |
12 | Giuseppe Visaggio |
Knowledge Base and Experience Factory for Empowering Competitiveness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSSE ![In: Software Engineering, International Summer Schools, ISSSE 2006-2008, Salerno, Italy, Revised Tutorial Lectures, pp. 223-256, 2008, Springer, 978-3-540-95887-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
knowledge management, knowledge transfer, Experience Factory, experience base |
12 | Ade Miller |
A Hundred Days of Continuous Integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AGILE ![In: Agile Development Conference, AGILE 2008, Toronto, Canada, 4-8 August 2008, pp. 289-293, 2008, IEEE Computer Society, 978-0-7695-3321-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Paolo Tonella, Marco Torchiano, Bart Du Bois, Tarja Systä |
Empirical studies in reverse engineering: state of the art and future trends. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Empir. Softw. Eng. ![In: Empir. Softw. Eng. 12(5), pp. 551-571, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
State of art, Empirical framework, Reverse engineering, Taxonomy |
12 | Edward Sobiesk, Gregory J. Conti |
The Cost of Free Web Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(3), pp. 66-68, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Bruce Schneier |
Nonsecurity Considerations in Security Decisions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(3), pp. 88, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Renaud Ott, Daniel Thalmann, Frédéric Vexo |
Haptic feedback in mixed-reality environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Vis. Comput. ![In: Vis. Comput. 23(9-11), pp. 843-849, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
(Novel) User interfaces, Haptic, Mixed-reality |
12 | Tom J. Bang |
Introducing Agile Methods into a Project Organisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
XP ![In: Agile Processes in Software Engineering and Extreme Programming, 8th International Conference, XP 2007, Como, Italy, June 18-22, 2007, Proceedings, pp. 203-207, 2007, Springer, 978-3-540-73100-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Hojung Cha, Sukwon Choi, Inuk Jung, Hyoseung Kim 0001, Hyojeong Shin, Jaehyun Yoo, Chanmin Yoon |
The RETOS operating system: kernel, tools and applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 6th International Conference on Information Processing in Sensor Networks, IPSN 2007, Cambridge, Massachusetts, USA, April 25-27, 2007, pp. 559-560, 2007, ACM, 978-1-59593-638-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
wireless sensor network, operating systems, multithreading |
12 | J. Alex Halderman, Brent Waters |
Harvesting verifiable challenges from oblivious online sources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 330-341, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Jeff Lewis |
Cryptol: specification, implementation and verification of high-grade cryptographic applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007, pp. 41, 2007, ACM, 978-1-59593-887-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cryptography, specification language, certification, high assurance, symmetric key |
12 | Sagar Chaki, Christian Schallhart, Helmut Veith |
Verification Across Intellectual Property Boundaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAV ![In: Computer Aided Verification, 19th International Conference, CAV 2007, Berlin, Germany, July 3-7, 2007, Proceedings, pp. 82-94, 2007, Springer, 978-3-540-73367-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Guilin Wang, Feng Bao 0001 |
Security Remarks on a Convertible Nominative Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, pp. 265-275, 2007, Springer, 978-0-387-72366-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Nominative signature, digital signature, information security, attacks |
12 | Román López-Cortijo García, Javier García Guzmán, Antonio de Amescua Seco |
iCharts: Charts for Software Process Improvement Value Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSPI ![In: Software Process Improvement, 14th European Conference, EuroSPI 2007, Potsdam, Germany, September 26-28, 2007, Proceedings, pp. 124-135, 2007, Springer, 978-3-540-74765-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Improvement Benefits, Improve-ment Monitoring, SPI value management, Software Process Improvement |
12 | Nigel Bevan, Helen Petrie, Nigel Claridge |
Tenuta: Strategies for Providing Guidance on Usability and Accessibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (7) ![In: Universal Access in Human-Computer Interaction. Applications and Services, 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007 Held as Part of HCI International 2007 Beijing, China, July 22-27, 2007 Proceedings, Part III, pp. 20-27, 2007, Springer, 978-3-540-73282-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Chunbo Ma, Jun Ao, Jianhua Li 0001 |
Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (15) ![In: Online Communities and Social Computing, Second International Conference, OCSC 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, pp. 124-133, 2007, Springer, 978-3-540-73256-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Chameleon, Authentication, Key Agreement, Deniability |
12 | Erik Meijer 0001 |
Confessions of a used programming language salesman. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA ![In: Proceedings of the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2007, October 21-25, 2007, Montreal, Quebec, Canada, pp. 677-694, 2007, ACM, 978-1-59593-786-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Prateek Gupta, Vitaly Shmatikov |
Security Analysis of Voice-over-IP Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy, pp. 49-63, 2007, IEEE Computer Society, 0-7695-2819-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Fabien Laguillaumie, Damien Vergnaud |
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 175-188, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Universal designated verifier signatures, zero-knowledge proof, Elgamal signatures |
12 | Chengyu Hu, Daxing Li |
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (1) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 866-868, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Alain Forget, Sonia Chiasson, Robert Biddle |
Helping users create better passwords: is this the right approach? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007, pp. 151-152, 2007, ACM, 978-1-59593-801-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Jianhong Zhang, Jane Mao |
Security Analysis of Two Signature Schemes and Their Improved Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part I, pp. 589-602, 2007, Springer, 978-3-540-74468-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Tobias Uldall-Espersen |
Exploring Multiple Usability Perspectives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTERACT (1) ![In: Human-Computer Interaction - INTERACT 2007, 11th IFIP TC 13 International Conference, Rio de Janeiro, Brazil, September 10-14, 2007, Proceedings, Part I, pp. 628-632, 2007, Springer, 978-3-540-74794-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Neil C. Rowe |
Finding Logically Consistent Resource-Deception Plans for Defense in Cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 563-568, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Jianhong Zhang |
A verifiably encrypted signature scheme with strong unforgeability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infoscale ![In: Proceedings of the 2nf International Conference on Scalable Information Systems, Infoscale 2007, Suzhou, China, June 6-8, 2007, pp. 66, 2007, ACM, 978-1-59593-757-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security analysis, proof, verifiably encryption |
12 | Ronen Gradwohl, Moni Naor, Benny Pinkas, Guy N. Rothblum |
Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FUN ![In: Fun with Algorithms, 4th International Conference, FUN 2007, Castiglioncello, Italy, June 3-5, 2007, Proceedings, pp. 166-182, 2007, Springer, 978-3-540-72913-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Salima Benbernou, Hassina Meziane, Yin Hua Li, Mohand-Said Hacid |
A Privacy Agreement Model for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2007 IEEE International Conference on Services Computing (SCC 2007), 9-13 July 2007, Salt Lake City, Utah, USA, pp. 196-203, 2007, IEEE Computer Society, 0-7695-2925-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Christophe Diot |
Editor's message. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 36(2), pp. 3, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Thomas A. Standish, Norman Jacobson |
Using O(n) ProxmapSort and O(1) ProxmapSearch to motivate CS2 students, Part II. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGCSE Bull. ![In: ACM SIGCSE Bull. 38(2), pp. 29-32, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ProxmapSearch, ProxmapSort, searching, sorting, CS2 |
12 | Philippe Golle, Frank McSherry, Ilya Mironov |
Data collection with self-enforcing privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 69-78, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, data collection |
12 | J. William Murdock, Deborah L. McGuinness, Paulo Pinheiro da Silva, Christopher A. Welty, David A. Ferrucci |
Explaining Conclusions from Diverse Knowledge Sources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISWC ![In: The Semantic Web - ISWC 2006, 5th International Semantic Web Conference, ISWC 2006, Athens, GA, USA, November 5-9, 2006, Proceedings, pp. 861-872, 2006, Springer, 3-540-49029-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Minh-Huyen Nguyen, Shien Jin Ong, Salil P. Vadhan |
Statistical Zero-Knowledge Arguments for NP from Any One-Way Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2006), 21-24 October 2006, Berkeley, California, USA, Proceedings, pp. 3-14, 2006, IEEE Computer Society, 0-7695-2720-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Zhongwei Zhang, Zhen Wang |
Assessing and Assuring Trust in E-Commerce Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIMCA/IAWTIC ![In: 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November - 1 December 2006, Sydney, Australia, pp. 124, 2006, IEEE Computer Society, 0-7695-2731-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|