The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Recipient with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1988 (16) 1989-1994 (15) 1995-1997 (16) 1998-1999 (15) 2000 (19) 2001-2002 (26) 2003 (20) 2004 (42) 2005 (49) 2006 (47) 2007 (55) 2008 (40) 2009 (36) 2010 (16) 2011-2012 (21) 2013-2014 (25) 2015-2017 (22) 2018-2019 (21) 2020-2021 (24) 2022-2023 (26) 2024 (1)
Publication types (Num. hits)
article(145) incollection(7) inproceedings(399) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 434 occurrences of 355 keywords

Results
Found 552 publication records. Showing 552 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
108Harunaga Hiwatari, Keisuke Tanaka, Tomoyuki Asano, Koichi Sakumoto Multi-recipient Public-Key Encryption from Simulators in Security Proofs. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-recipient, IND-CCA, simulator, public-key encryption, broadcast encryption
72Kaoru Kurosawa Multi-recipient Public-Key Encryption with Shortened Ciphertext. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
72Giuseppe Ateniese, Cristina Nita-Rotaru Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
57Manuel Barbosa, Pooya Farshim Randomness Reuse: Extensions and Improvements. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Randomness Reuse, Multi-Recipient, Hybrid Encryption
57Igor Miladinovic Group Messaging in IP Multimedia Subsystem of UMTS. Search on Bibsonomy ICT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Multi-Recipient Messages, SIP, Group communication, UMTS, IMS, Messaging
51Dmitrij Lagutin, Hannu H. Kari Controlling Incoming Connections Using Certificates and Distributed Hash Tables. Search on Bibsonomy NEW2AN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF rights delegation, DoS countermeasures, certificates, Session management, rights management
51Yeong-Geon Seo, Moon-Ryul Jung, Hae-Seok Oh Sending, receiving and presenting multimedia data over network for tele-medical diagnosis (MediNet). Search on Bibsonomy RTCSA The full citation details ... 1996 DBLP  DOI  BibTeX  RDF tele-medical diagnosis, MediNet, prototype teleconference system, patient information, 3-D medical images, 2-D medical images, hand position, motion images, still images, multimedia systems, voice, multimedia data, delay time, doctors
51Sebon Ku, Bogju Lee, Dongman Lee TWIMC: An Anonymous Recipient E-mail System. Search on Bibsonomy IEA/AIE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu 0001 Publicly Verifiable Privacy-Preserving Group Decryption. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Group decryption, Anonymity, Bilinear pairing, Group-oriented cryptography
41Liane Lewin-Eytan, Joseph Naor, Ariel Orda Maximum-lifetime routing: system optimization & game-theoretic perspectives. Search on Bibsonomy MobiHoc The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anycast game, multicast game, nash equilibrium, price of anarchy, price of stability
41Elisa Bertino, Lorenzo Martino Security in SOA and Web Services. Search on Bibsonomy IEEE SCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Michael Kinateder, Ralf Terdic, Kurt Rothermel Strong pseudonymous communication for peer-to-peer reputation systems. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF distributed reputation systems, extended destination routing, pseudonymous communication, data protection, mixes
41Peter Gemmell, Moni Naor Codes for Interactive Authentication. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
41Agnieszka Matysiak Szóstek, Berry Eggen 'I Know That You Know' - Ascertaining Mutual Awareness of Recipient's Availability Status in Instant Messaging Applications. Search on Bibsonomy INTERACT (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Instant Messaging systems, mutual awareness, availability
41Giuseppe Ciaccio Recipient Anonymity in a Structured Overlay. Search on Bibsonomy AICT/ICIW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Wei Wei, Xuhua Ding, Kefei Chen Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
40Chittaranjan A. Mandal, Chris Reade Recipient Specific Electronic Cash - A Scheme for Recipient Specific Yet Anonymous and Tranferable Electronic Cash. Search on Bibsonomy WEBIST (3) The full citation details ... 2007 DBLP  BibTeX  RDF
36Mark Dredze, Hanna M. Wallach, Danny Puller, Fernando Pereira Generating summary keywords for emails using topics. Search on Bibsonomy IUI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF keyword generation, recipient prediction, email, topic modeling, foldering
36Xuerui Wang, Chris Pal, Andrew McCallum Generalized component analysis for text with heterogeneous attributes. Search on Bibsonomy KDD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF author prediction, multimodal heterogeneous data, recipient prediction, undirected graphical models, text mining, topic modeling
31Adam Fitzgerald, Gurlal Kahlon, Mark O. Riedl A Computational Model of Emotional Response to Stories. Search on Bibsonomy ICIDS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Mudhakar Srivatsa, Shane Balfe, Kenneth G. Paterson, Pankaj Rohatgi Trust management for secure information flows. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ID-PKC, trust, information flow, risk
31Benjamin C. M. Fung, Ke Wang 0001, Ada Wai-Chee Fu, Jian Pei Anonymity for continuous data publishing. Search on Bibsonomy EDBT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Dana Angluin, James Aspnes, David Eisenstat, Eric Ruppert The computational power of population protocols. Search on Bibsonomy Distributed Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Tony Clear Computing relationships: transactional algorithms yield to social networks. Search on Bibsonomy ACM SIGCSE Bull. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Anna Götmar, Jonas Lundberg Effective recommendations in loosely coupled accident investigations. Search on Bibsonomy ECCE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF recommendations, accident investigation
31Kenichi Takahashi, Zhaoyu Liu, Kouichi Sakurai, Makoto Amamiya An Approach of Trusted Program Generation for User-Responsible Privacy. Search on Bibsonomy UIC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Kenichi Takahashi, Zhaoyu Liu, Kouichi Sakurai An Approach of Program Analysis Prevention for Information Protection. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Ian F. Blake, Aldar C.-F. Chan Conditionally Verifiable Signature. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Ariel Orda, Ben-Ami Yassour Maximum-lifetime routing algorithms for networks with omnidirectional and directional antennas. Search on Bibsonomy MobiHoc The full citation details ... 2005 DBLP  DOI  BibTeX  RDF routing, wireless networks, multicast, broadcast, lifetime, unicast
31Charlie Daly, Jane Horgan Patterns of plagiarism. Search on Bibsonomy SIGCSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF introductory computer programming, watermarks, plagiarism, automatic evaluation
31Tianjie Cao, Dongdai Lin, Rui Xue 0001 ID-Based Ring Authenticated Encryption. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Xiaofeng Chen 0001, Fangguo Zhang, Kwangjo Kim Chameleon Hashing Without Key Exposure. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. Search on Bibsonomy S&P The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Martín Abadi, Andrew Birrell, Michael Burrows, Frank Dabek, Ted Wobber Bankable Postage for Network Services. Search on Bibsonomy ASIAN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Sebon Ku, Bogju Lee, Eunyong Ha Extracting User Profiles from E-mails Using the Set-Oriented Classifier. Search on Bibsonomy PRICAI The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
31Feng Bao 0001, Robert H. Deng A Signcryption Scheme with Signature Directly Verifiable by Public Key. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
31Ueli M. Maurer, Yacov Yacobi Non-interactive Public-Key Cryptography. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
30Zhou-Jing Wang, Kai-Biao Lin, Wen-Lei Sun A Method of Chinese Fax Recipient's Name Recognition Based on Hybrid Neural Networks. Search on Bibsonomy ISNN (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30K. D. Joshi 0001, Saonee Sarker Examining the Role of Knowledge, Source, Recipient, Relational, and Situational Context on Knowledge Transfer among Face-to-Face ISD Teams. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Vipul Sharma, Puneet Sarda, Swasti Sharma An Add-On to Rule-Based Sifters for Multi-recipient Spam Emails. Search on Bibsonomy NLDB The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Mihir Bellare, Alexandra Boldyreva, Jessica Staddon Randomness Re-use in Multi-recipient Encryption Schemeas. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Encryption, provable security, randomness, broadcast encryption
26Ann Light Transports of delight? What the experience of receiving (mobile) phone calls can tell us about design. Search on Bibsonomy Pers. Ubiquitous Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Personal phone, Recipient, Mobility, Context, Space, Phenomenology
26Jian Ren 0001 Privacy-Preserving Communication Algorithms and Network Protocols. Search on Bibsonomy WASA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Communication anonymity, sender anonymity, recipient anonymity, location privacy, unconditional security, content authenticity
26Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Recipient Anonymity, Access Control on Encrypted Data, Attribute-Based Encryption, Ciphertext Policy
21 To change the world, take a chance. Search on Bibsonomy Commun. ACM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21 UX design and agile: a natural fit? (Talking with Julian Gosper, Jean-Luc Agathos, Richard Rutter, and Terry Coatta). Search on Bibsonomy Commun. ACM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21 In the Virtual Extension. Search on Bibsonomy Commun. ACM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Niall McGrath, Pavel Gladyshev, M. Tahar Kechadi, Joe Carthy Investigating Encrypted Material. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Public & Private Keys, Encryption, RSA, OpenPGP, Ciphertext
21Fuchun Guo, Yi Mu 0001, Zhide Chen Identity-Based Online/Offline Encryption. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Samar Agnihotri, H. S. Jamadagni, Pavan Nuggehalli Interactive Distributed Source Coding in Asymmetric Communication Scenarios. Search on Bibsonomy DCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Communication complexity, Distributed source coding, Interactive communication
21Raylin Tso, Takeshi Okamoto, Eiji Okamoto 1-out-of-. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF 1-out-of-n signature, oblivious signature, Schnorr signature, oblivious transfer
21Pan Wang, Peng Ning, Douglas S. Reeves A k-anonymous communication protocol for overlay networks. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, anonymity, overlay networks
21Xiaofeng Chen 0001, Fangguo Zhang, Willy Susilo, Yi Mu 0001 Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF On-line/off-line signatures, Key exposure, Chameleon hashing
21Anita Z. Schwartz UD dropbox 2.0: collaboration magic. Search on Bibsonomy SIGUCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF dropbox technology, large e-mail attachments, collaboration, groupware, file sharing
21Ji-Seon Lee, Jik Hyun Chang Semantically Secure Authenticated Encryption Scheme and the Same Scheme for Ad-hoc Group Called a Ring. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Satoshi Kondo, Qiangfu Zhao A Novel Steganographic Technique Based on Image Morphing. Search on Bibsonomy UIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Amitava Datta A Fault-Tolerant Protocol for Energy-Efficient Permutation Routing in Wireless Networks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF single-hop network, fault-tolerance, Wireless network, energy-efficiency, permutation routing
21Joey F. George, John R. Carlson Media Selection for Deceptive Communication. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Min-Hua Shao, Jianying Zhou 0001, Guilin Wang On the Security of a Certified E-Mail Scheme with Temporal Authentication. Search on Bibsonomy ICCSA (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Jun Li 0001, Xun Kang Proof of Service in a Hybrid P2P Environment. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Catherine C. Marshall, Sara A. Bly Sharing encountered information: digital libraries get a social life. Search on Bibsonomy JCDL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF electronic periodicals, encountered information, collaboration, interaction, browsing, field study, reading, clipping
21Jessica J. Fridrich, Miroslav Goljan, David Soukal Perturbed quantization steganography with wet paper codes. Search on Bibsonomy MM&Sec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, multimedia, adaptive, steganography, steganalysis, quantizer
21Rafael Magdalena, Antonio J. Serrano, Agustin Serrano, Jorge Muñoz, Joan Vila-Francés, Emilio Soria-Olivas Design of a Neural Network Model as a Decision Making Aid in Renal Transplant. Search on Bibsonomy ISBMDA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Yongsu Park, Yookun Cho Fair Certified E-mail Protocols with Delivery Deadline Agreement. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Digital signature, encryption, electronic mail
21Anna Shubina, Sean W. Smith Using caching for browsing anonymity. Search on Bibsonomy SIGecom Exch. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF caching proxies, security, privacy, anonymity, human factors, legal aspects
21Iosif Lazaridis, Sharad Mehrotra Capturing Sensor-Generated Time Series with Quality Guarantees. Search on Bibsonomy ICDE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Philippe Golle, Markus Jakobsson Reusable anonymous return channels. Search on Bibsonomy WPES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF return address, privacy, anonymity, mix networks
21Petros Maniatis, Mary Baker A Historic Name-Trail Service. Search on Bibsonomy WMCSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21John C. Lach, William H. Mangione-Smith, Miodrag Potkonjak Fingerprinting techniques for field-programmable gate arrayintellectual property protection. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
21Laurence Likforman-Sulem Name Block Location in Facsimile Images Using Spatial/Visual Cues. Search on Bibsonomy ICDAR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
21Louise E. Moses, Sally Fincher, James Caristi Teams work (panel session). Search on Bibsonomy SIGCSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
21Kwangjo Kim, Sangjoon Park, Joonsang Baek Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol. Search on Bibsonomy ICPP Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Fairness, Cryptographic Protocol, Non-repudiation, Trusted Third Party
21Nicholas F. Maxemchuk, Steven H. Low Marking Text Documents. Search on Bibsonomy ICIP (3) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
21Thomas A. Berson Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF McEliece, error vectors, message-resend attack, related-message attack, protocol failure, cryptanalysis, error-correcting codes, randomization, public-key cryptosystem
21Lidong Chen Oblivious Signatures. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF oblivious signatures
21David Chaum, Hans Van Antwerpen Undeniable Signatures. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
21John Hogg, Stelios Gamvroulas An Active Mail System. Search on Bibsonomy SIGMOD Conference The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
21David J. Mishelevich, Peter Stastny, R. Gail Ellis, Susan G. Mize Regional kidney transplant matching: the RENTRAN interactive approach. Search on Bibsonomy AFIPS National Computer Conference The full citation details ... 1976 DBLP  DOI  BibTeX  RDF
20Amit Kumar Singh, Kamalesh Acharya, Sourav Mukhopadhyay Post-quantum secure recipient revocable broadcast encryption supporting anonymity. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Tara Chand Rosalind Franklin Society Proudly Announces the 2022 Award Recipient for Brain Connectivity. Search on Bibsonomy Brain Connect. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Liwang Sun, Zhenfu Cao, Xiaolei Dong, Jiachen Shen LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search. Search on Bibsonomy Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Kelechi Nwaike, Licheng Jiao Quantifying Actionability: Evaluating Human-Recipient Models. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Amin Khakpour Komarsofla, Fatemeh Heyran, Javad Khodaei-Mehr, Ramin Vatankhah Hybrid Control of Immune Response and HCMV Infection of Renal Transplant Recipient. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Cuong Le Van, Ngoc-Sang Pham, Thi Kim Cuong Pham Effects of development aid (grants and loans) on the economic dynamics of the recipient country. Search on Bibsonomy Math. Soc. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Maciej Krasicki BICM-ID Labeling-Based Recipient Identification in a Heterogeneous Network. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Susan Persky Rosalind Franklin Society Proudly Announces the 2022 Award Recipient for Cyberpsychology, Behavior, and Social Networking. Search on Bibsonomy Cyberpsychology Behav. Soc. Netw. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Liwang Sun, Zhenfu Cao, Xiaolei Dong, Jiachen Shen, Miao Wang, Jiasheng Chen dMCLAEKS: Pairing-free designated-tester multi-recipient certificateless authenticated encryption with keyword search for concealing search patterns. Search on Bibsonomy J. Syst. Archit. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk, Peter Schwabe Post-Quantum Multi-Recipient Public Key Encryption. Search on Bibsonomy CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Marcos Rivera-Gavilán, Víctor Manuel Vargas, Pedro Antonio Gutiérrez, Javier Briceño, César Hervás-Martínez, David Guijo-Rubio Ordinal Classification Approach for Donor-Recipient Matching in Liver Transplantation with Circulatory Death Donors. Search on Bibsonomy IWANN (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Claudia E. Hawks, Esther Bahillo, Marisa Gil, Bruno Colmenares, Deepika Verma Quality and Traceability of Starting Materials from Supplier to Recipient. Search on Bibsonomy ICIMTH The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Yanran Zhang, Yan Gu A recipient design in multimodal language on TV: A comparison of child-directed and adult-directed broadcasting. Search on Bibsonomy CogSci The full citation details ... 2023 DBLP  BibTeX  RDF
20Ronald Petrlic, David Stiegler Why Johnny was allowed to send this email: How to better provide transparency in email security towards the recipient. Search on Bibsonomy ICEBE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Haris Pratama Putra. J, Sulfikar, Sunardi User Experience Analysis of Social AID Assistance Data Recipient Application using User Experience Analysis Questionnaire (UEQ) and Usability Testing Method. Search on Bibsonomy ICIMTech The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Yi Xu, Ruyi Guo, Jonathan Kua, Haoyu Luo, Zheng Zhang, Xiao Liu 0004 We Will Find You: An Edge-Based Multi-UAV Multi-Recipient Identification Method in Smart Delivery Services. Search on Bibsonomy ICA3PP (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Ningbin Yang, Quan Zhou, Qiong Huang, Chunming Tang 0003 Multi-Recipient encryption with keyword search without pairing for cloud storage. Search on Bibsonomy J. Cloud Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Tung-Tso Tsai, Yuh-Min Tseng, Sen-Shan Huang, Jia-Yi Xie, Ying-Hao Hung Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage Model. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Grégoire Mariéthoz Laudatio for Prof. Philippe Renard, recipient of the IAMG John Cedric Griffiths Teaching Award. Search on Bibsonomy Comput. Geosci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Vitaly Roman'kov Multi-recipient and threshold encryption based on hidden multipliers. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Andrew MacFarlane 0001, Sondess Missaoui, Stephann Makri, Marisela Gutierrez Lopez Sender vs. recipient-orientated information systems revisited. Search on Bibsonomy J. Documentation The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 552 (100 per page; Change: )
Pages: [1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license