|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 320 occurrences of 182 keywords
|
|
|
Results
Found 962 publication records. Showing 962 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
105 | Luis von Ahn, Nicholas J. Hopper, John Langford 0001 |
Covert two-party computation. |
STOC |
2005 |
DBLP DOI BibTeX RDF |
covert computation, fair two-party computation, two-party computation, steganography |
65 | Yehuda Lindell, Benny Pinkas |
A Proof of Security of Yao's Protocol for Two-Party Computation. |
J. Cryptol. |
2009 |
DBLP DOI BibTeX RDF |
Semi-honest adversaries, Yao’s two-party protocol, Secure two-party computation, Proofs of security |
59 | Payman Mohassel, Matthew K. Franklin |
Efficiency Tradeoffs for Malicious Two-Party Computation. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Yao’s garbled circuit, malicious adversary, secure two-party computation, secure function evaluation |
58 | Ran Canetti, Eyal Kushilevitz, Yehuda Lindell |
On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
Universal composability, Secure two-party computation, Impossibility results |
58 | Philip D. MacKenzie, Alina Oprea, Michael K. Reiter |
Automatic generation of two-party computations. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
automatic generation of protocols, threshold cryptography, secure two-party computation |
57 | Louis Salvail |
The Search for the Holy Grail in Quantum Cryptography. |
Lectures on Data Security |
1998 |
DBLP DOI BibTeX RDF |
|
53 | Louis Salvail, Christian Schaffner, Miroslava Sotáková |
On the Power of Two-Party Quantum Cryptography. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
two-party primitives, quantum protocols, oblivious transfer, quantum information theory |
51 | Vipul Goyal, Payman Mohassel, Adam D. Smith |
Efficient Two Party and Multi Party Computation Against Covert Adversaries. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Guan Wang, Tongbo Luo, Michael T. Goodrich, Wenliang Du, Zutao Zhu |
Bureaucratic protocols for secure two-party sorting, selection, and permuting. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
bureaucratic protocols, oblivious algorithms, sorting, secure two-party computation |
48 | S. Dov Gordon, Carmit Hazay, Jonathan Katz, Yehuda Lindell |
Complete fairness in secure two-party computation. |
STOC |
2008 |
DBLP DOI BibTeX RDF |
cryptography, fairness, secure computation |
48 | Rafael Pass, Hoeteck Wee |
Black-Box Constructions of Two-Party Protocols from One-Way Functions. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
black-box constructions, zero-knowledge arguments, trapdoor commitments, parallel coin-tossing, non-malleable commitments, secure two-party computation |
46 | Andrew Y. Lindell |
Legally-Enforceable Fairness in Secure Two-Party Computation. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
CDH assumption, DDH assumption, double discrete logarithm, one-way two-party authenticated key agreement, privacy, designated verifier signature |
42 | Yehuda Lindell |
Bounded-concurrent secure two-party computation without setup assumptions. |
STOC |
2003 |
DBLP DOI BibTeX RDF |
secure computation, protocol composition |
42 | Marc Mouffron, Frederic Rousseau 0002, Huafei Zhu |
Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Squared Euclidean Distance, Stand-alone and simulation-based model, Secure two-party computation |
42 | Huafei Zhu, Feng Bao 0001 |
A Novel Construction of Two-Party Private Bidding Protocols from Yao's Millionaires Problem. |
TrustBus |
2005 |
DBLP DOI BibTeX RDF |
Bidding protocol, millionaires problem, secure two-party computation |
39 | Rafael Pass |
Bounded-concurrent secure multi-party computation with a dishonest majority. |
STOC |
2004 |
DBLP DOI BibTeX RDF |
constant-round protocols, simulation-sound zero-knowledge, secure multi-party computation, concurrent composition |
39 | Dongyao Ji, Yuming Wang |
Comments on "An approach to the formal verification of the two-party cryptographic protocols" by Zhang, Li and Xiao. |
ACM SIGOPS Oper. Syst. Rev. |
2001 |
DBLP DOI BibTeX RDF |
|
37 | Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee 0001 |
One-Round Protocols for Two-Party Authenticated Key Exchange. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Andreas Jakoby, Maciej Liskiewicz, Aleksander Madry |
Susceptible Two-Party Quantum Computations. |
ICITS |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Donald Beaver |
One-Time Tables for Two-Party Computation. |
COCOON |
1998 |
DBLP DOI BibTeX RDF |
|
36 | Konstantinos Chalkias, Spyros T. Halkidis, Dimitrios Hristu-Varsakelis, George Stephanides, Anastasios Alexiadis |
A Provably Secure One-Pass Two-Party Key Establishment Protocol. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
One-pass protocols, two-party key agreement, loss of information, key-compromise impersonation |
36 | Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung |
Two-Party Computing with Encrypted Data. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Computing with Encrypted Data, CryptoComputing, oblivious transfer, Secure Two-Party Computation |
35 | Omer Horvitz, Jonathan Katz |
Universally-Composable Two-Party Computation in Two Rounds. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Huafei Zhu, Willy Susilo, Yi Mu 0001 |
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
setup-free, stand-alone, verifiably committed signatures, multi-party |
33 | Mike Just, Serge Vaudenay |
Authenticated Multi-Party Key Agreement. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
confirmation, authentication, key agreement, forward secrecy |
31 | Andrew Y. Lindell |
Adaptively Secure Two-Party Computation with Erasures. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Rafael Pass, Alon Rosen |
Bounded-Concurrent Secure Two-Party Computation in a Constant Number of Rounds. |
FOCS |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Tarjei K. Mandt, Chik How Tan |
Certificateless Authenticated Two-Party Key Agreement Protocols. |
ASIAN |
2006 |
DBLP DOI BibTeX RDF |
bilinear map, authenticated key agreement, Certificateless public key cryptography |
30 | Anshuman Singh, Siddharth Barman, Kaushal K. Shukla |
Secure Two-Party Context Free Language Recognition. |
ICDCIT |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Ran Canetti, Eyal Kushilevitz, Yehuda Lindell |
On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Benny Pinkas |
Fair Secure Two-Party Computation. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Patrick C. K. Hung |
A Primitive Study of Logrolling in e-Negotiation. |
HICSS |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Michael J. Freedman, Yuval Ishai, Benny Pinkas, Omer Reingold |
Keyword Search and Oblivious Pseudorandom Functions. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
Secure keyword search, oblivious pseudorandom functions, secure two-party protocols, private information retrieval, privacy-preserving protocols |
29 | Juraj Hromkovic |
Randomized Communication Protocols (A Survey). |
SAGA |
2001 |
DBLP DOI BibTeX RDF |
two-party protocols, communication complexity, Randomized computing |
28 | Koji Chida, Katsumi Takahashi |
Privacy Preserving Computations without Public Key Cryptographic Operation. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Michel Abdalla, Pierre-Alain Fouque, David Pointcheval |
Password-Based Authenticated Key Exchange in the Three-Party Setting. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Password, key distribution, authenticated key exchange, multi-party protocols |
28 | Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy, Hao Chen 0003 |
Multi-party off-the-record messaging. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
privacy, instant messaging, deniability, multi-party |
28 | Sandeep Hans, Sarat C. Addepalli, Anuj Gupta 0001, Kannan Srinathan |
On Privacy Preserving Convex Hull. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Vipul Goyal, Amit Sahai |
Resettably Secure Computation. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Florian Kerschbaum |
Practical Private Regular Expression Matching. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Jianying Zhou 0001, Jose Antonio Onieva, Javier López 0001 |
A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Jose Antonio Onieva, Jianying Zhou 0001, Javier López 0001 |
Attacking an Asynchronous Multi-party Contract Signing Protocol. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
multi-party contract signing, security protocol analysis, Secure electronic commerce |
26 | Binbin Tu, Yu Chen 0003, Hongrui Cui, Xianfang Wang |
Fast two-party signature for upgrading ECDSA to two-party scenario easily. |
Theor. Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Guillermo Owen, Bernard Grofman |
Two-stage electoral competition in two-party contests: persistent divergence of party positions. |
Soc. Choice Welf. |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Paul Bunn, Rafail Ostrovsky |
Secure two-party k-means clustering. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
k-means clustering, secure multiparty computation |
25 | Danny Harnik, Moni Naor, Omer Reingold, Alon Rosen |
Completeness in Two-Party Secure Computation: A Computational View. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Maurizio Adriano Strangio |
Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves. |
SAC |
2005 |
DBLP DOI BibTeX RDF |
cryptography, protocols, elliptic curves, key agreement |
25 | Danny Harnik, Moni Naor, Omer Reingold, Alon Rosen |
Completeness in two-party secure computation: a computational view. |
STOC |
2004 |
DBLP DOI BibTeX RDF |
oblivious tansfer, completeness, secure computation |
25 | Jonathan Katz, Rafail Ostrovsky |
Round-Optimal Secure Two-Party Computation. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Philip D. MacKenzie |
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Yunpu Zhu, Jacqueline E. Rice |
A Lightweight Architecture for Secure Two-Party Mobile Payment. |
CSE (2) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Colleen Swanson, David Jao |
A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
key agreement, certificateless public key cryptography |
25 | Mehmet S. Kiraz, Berry Schoenmakers |
An Efficient Protocol for Fair Secure Two-Party Computation. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Charalampos Papamanthou, Roberto Tamassia |
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee 0001 |
One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange. |
Communications and Multimedia Security |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Yuqing Zhang 0001, Suping Jia |
Common Program Analysis of Two-Party Security Protocols Using SMV. |
APWeb Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar |
An Improved Secure Two-Party Computation Protocol. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Noel McCullagh, Paulo S. L. M. Barreto |
A New Two-Party Identity-Based Authenticated Key Agreement. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
bilinear maps, Tate pairing, identity-based cryptography, authenticated key agreement |
25 | Saurabh Sanghvi, Salil P. Vadhan |
The round complexity of two-party random selection. |
STOC |
2005 |
DBLP DOI BibTeX RDF |
cryptography, distributed computing, coin-flipping |
25 | Yehuda Lindell |
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. |
J. Cryptol. |
2003 |
DBLP DOI BibTeX RDF |
Constant-round protocols, Coin-tossing, Secure computation |
25 | Yehuda Lindell |
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Alain J. Mayer, Moti Yung |
Secure Protocol Transformation via "Expansion": From Two-Party to Groups. |
CCS |
1999 |
DBLP DOI BibTeX RDF |
complexity theoretic proofs, key transport, protocol transformation, secure group protocols, authentication, protocol design, forward secrecy |
25 | C. V. Ramamoorthy, Yuh Yaw, R. Aggarwal, J. Song |
Synthesis of two-party error-recoverable protocols. |
SIGCOMM |
1986 |
DBLP DOI BibTeX RDF |
|
24 | Benny Pinkas, Thomas Schneider 0003, Nigel P. Smart, Stephen C. Williams |
Secure Two-Party Computation Is Practical. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Xing-Lan Zhang |
Authenticated Key Exchange Protocol in One-Round. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
Diffie-Hellman key exchange, Authenticated key exchange, Forward secrecy, Round complexity |
23 | Frank Dignum, Gerard Vreeswijk |
Towards a Testbed for Multi-party Dialogues. |
Workshop on Agent Communication Languages |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Adrian Perrig, Dawn Song |
Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols. |
CSFW |
2000 |
DBLP DOI BibTeX RDF |
|
23 | Kaisei Kajita, Go Ohtake, Tsuyoshi Takagi |
Generalized Adaptor Signature Scheme: From Two-Party to N-Party Settings. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
23 | Erik-Oliver Blass, Florian Kerschbaum |
Mixed-Technique Multi-Party Computations Composed of Two-Party Computations. |
ESORICS (3) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Runhua Shi, Bai Liu, Mingwu Zhang |
Secure two-party integer comparison protocol without any third party. |
Quantum Inf. Process. |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Yuval Filmus, Hamed Hatami, Yaqiao Li, Suzin You |
Information Complexity of the AND Function in the Two-Party and Multi-party Settings. |
Algorithmica |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Phi Hung Le, Samuel Ranellucci, S. Dov Gordon |
Two-party Private Set Intersection with an Untrusted Third Party. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
23 | Phi Hung Le, Samuel Ranellucci, S. Dov Gordon |
Two-party Private Set Intersection with an Untrusted Third Party. |
CCS |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Christina Alexandris |
Evaluating Cognitive Bias in Two-Party and Multi-Party Spoken Interactions. |
AAAI Spring Symposium: Interpretable AI for Well-being |
2019 |
DBLP BibTeX RDF |
|
23 | Gang Xiao, Kallirroi Georgila |
A Comparison of Reinforcement Learning Methodologies in Two-Party and Three-Party Negotiation Dialogue. |
FLAIRS |
2018 |
DBLP BibTeX RDF |
|
23 | Yuval Filmus, Hamed Hatami, Yaqiao Li, Suzin You |
Information Complexity of the AND Function in the Two-Party and Multi-party Settings. |
COCOON |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Haiping Huang, Tianhe Gong, Ping Chen, Guoxia Qiu, Ruchuan Wang 0001 |
Secure Two-Party Distance Computation Protocols with a Semihonest Third Party and Randomization for Privacy Protection in Wireless Sensor Networks. |
Int. J. Distributed Sens. Networks |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Xiaoyan Zhu 0005, Zengbao Chen, Haotian Chi, Jie Liu, Shunrong Jiang |
Two-party and multi-party private matching for proximity-based mobile social networks. |
ICC |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Norman Schofield, Christopher Claassen, Ugur Ozdemir, Alexei V. Zakharov |
Estimating the effects of activists in two-party and multi-party systems: comparing the United States and Israel. |
Soc. Choice Welf. |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Gautam Biswas |
Diffie-Hellman technique: extended to multiple two-party keys and one multi-party key. |
IET Inf. Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, Amit Sahai |
Universally Composable Two-Party and Multi-Party Secure Computation. |
IACR Cryptol. ePrint Arch. |
2002 |
DBLP BibTeX RDF |
|
23 | Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, Amit Sahai |
Universally composable two-party and multi-party secure computation. |
STOC |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Hong Tang, Liehuang Zhu, Yuanda Cao, Dazhen Wang |
A Novel Tree-based Authenticated Dynamic Group Key Agreement Protocol for Wireless Sensor Network. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
ellipse curve, bilinear pairing, group key agreement, secure group communication |
23 | Troy Lee, Adi Shraibman |
Disjointness Is Hard in the Multi-party Number-on-the-Forehead Model. |
CCC |
2008 |
DBLP DOI BibTeX RDF |
multiparty communication complexity, disjointness, lower bounds |
23 | Gagan Aggarwal, Nina Mishra, Benny Pinkas |
Secure Computation of the k th-Ranked Element. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Rahul Jain 0001, Jaikumar Radhakrishnan, Pranab Sen |
A Lower Bound for the Bounded Round Quantum Communication Complexity of Set Disjointness. |
FOCS |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Oded Goldreich 0001, Silvio Micali, Avi Wigderson |
How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
|
23 | Jan Camenisch, Gregory M. Zaverucha |
Private Intersection of Certified Sets. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
private set intersection, certified sets, secure two-party computation |
23 | Dana Dachman-Soled, Tal Malkin, Mariana Raykova 0001, Moti Yung |
Efficient Robust Private Set Intersection. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
Cryptographic Protocols, Privacy Preserving Data Mining, Secure Two-party Computation, Set Intersection |
23 | Esma Aïmeur, Gilles Brassard, José M. Fernandez 0001, Flavien Serge Mani Onana |
Alambic : a privacy-preserving recommender system for electronic commerce. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Semi-trusted third party, Recommender system, Privacy protection, Web personalization, Secure two-party computation |
23 | Minh-Huyen Nguyen, Salil P. Vadhan |
Simpler Session-Key Generation from Short Random Passwords. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Human-memorizable passwords, Authentication, Cryptographic protocols, Key exchange, Secure two-party computation |
23 | Hugue Blier, Alain Tapp |
A Single Initialization Server for Multi-party Cryptography. |
ICITS |
2008 |
DBLP DOI BibTeX RDF |
two-party computation, initialization server, cryptography, zero-knowledge, multi-party computation |
23 | Sven Laur, Helger Lipmaa |
A New Protocol for Conditional Disclosure of Secrets and Its Applications. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
Conditional disclosure of secrets, crypto-computing, two-party computation, oblivious transfer, homomorphic encryption |
23 | Chunbo Ma, Jun Ao, Jianhua Li 0001 |
A Novel Verifier-Based Authenticated Key Agreement Protocol. |
ICIC (3) |
2007 |
DBLP DOI BibTeX RDF |
Two-Party, Password, Key Agreement, Verifier |
23 | Oded Goldreich 0001, Shafi Goldwasser, Nathan Linial |
Fault-tolerant Computation in the Full Information Model (Extended Abstract) |
FOCS |
1991 |
DBLP DOI BibTeX RDF |
m-argument function, full information model, two-party protocols, two-argument function, m-party fault-tolerant protocols, fault tolerant computation, sampling, polylogarithmic factors |
22 | Tal Moran, Moni Naor, Gil Segev 0001 |
An Optimally Fair Coin Toss. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Julien Saunier, Flavien Balbo |
An Environment to Support Multi-Party Communications in Multi-Agent Systems. |
CEEMAS |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Arkadev Chattopadhyay, Andreas Krebs, Michal Koucký 0001, Mario Szegedy, Pascal Tesson, Denis Thérien |
Languages with Bounded Multiparty Communication Complexity. |
STACS |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Taekyoung Kwon 0002, Dong Hoon Lee 0002 |
Three-Party Password Authenticated Key Agreement Resistant to Server Compromise. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 962 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|