The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Two-Party (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1991 (15) 1992-1998 (23) 1999-2000 (22) 2001-2002 (26) 2003 (30) 2004 (28) 2005 (51) 2006 (36) 2007 (45) 2008 (47) 2009 (56) 2010 (20) 2011 (31) 2012 (48) 2013 (52) 2014 (49) 2015 (33) 2016 (34) 2017 (41) 2018 (38) 2019 (41) 2020 (43) 2021 (43) 2022 (46) 2023 (49) 2024 (15)
Publication types (Num. hits)
article(422) book(2) incollection(3) inproceedings(524) phdthesis(11)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 320 occurrences of 182 keywords

Results
Found 962 publication records. Showing 962 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
105Luis von Ahn, Nicholas J. Hopper, John Langford 0001 Covert two-party computation. Search on Bibsonomy STOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF covert computation, fair two-party computation, two-party computation, steganography
65Yehuda Lindell, Benny Pinkas A Proof of Security of Yao's Protocol for Two-Party Computation. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Semi-honest adversaries, Yao’s two-party protocol, Secure two-party computation, Proofs of security
59Payman Mohassel, Matthew K. Franklin Efficiency Tradeoffs for Malicious Two-Party Computation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Yao’s garbled circuit, malicious adversary, secure two-party computation, secure function evaluation
58Ran Canetti, Eyal Kushilevitz, Yehuda Lindell On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Universal composability, Secure two-party computation, Impossibility results
58Philip D. MacKenzie, Alina Oprea, Michael K. Reiter Automatic generation of two-party computations. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF automatic generation of protocols, threshold cryptography, secure two-party computation
57Louis Salvail The Search for the Holy Grail in Quantum Cryptography. Search on Bibsonomy Lectures on Data Security The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
53Louis Salvail, Christian Schaffner, Miroslava Sotáková On the Power of Two-Party Quantum Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF two-party primitives, quantum protocols, oblivious transfer, quantum information theory
51Vipul Goyal, Payman Mohassel, Adam D. Smith Efficient Two Party and Multi Party Computation Against Covert Adversaries. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
48Guan Wang, Tongbo Luo, Michael T. Goodrich, Wenliang Du, Zutao Zhu Bureaucratic protocols for secure two-party sorting, selection, and permuting. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF bureaucratic protocols, oblivious algorithms, sorting, secure two-party computation
48S. Dov Gordon, Carmit Hazay, Jonathan Katz, Yehuda Lindell Complete fairness in secure two-party computation. Search on Bibsonomy STOC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptography, fairness, secure computation
48Rafael Pass, Hoeteck Wee Black-Box Constructions of Two-Party Protocols from One-Way Functions. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF black-box constructions, zero-knowledge arguments, trapdoor commitments, parallel coin-tossing, non-malleable commitments, secure two-party computation
46Andrew Y. Lindell Legally-Enforceable Fairness in Secure Two-Party Computation. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Raylin Tso, Takeshi Okamoto, Eiji Okamoto Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF CDH assumption, DDH assumption, double discrete logarithm, one-way two-party authenticated key agreement, privacy, designated verifier signature
42Yehuda Lindell Bounded-concurrent secure two-party computation without setup assumptions. Search on Bibsonomy STOC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF secure computation, protocol composition
42Marc Mouffron, Frederic Rousseau 0002, Huafei Zhu Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Squared Euclidean Distance, Stand-alone and simulation-based model, Secure two-party computation
42Huafei Zhu, Feng Bao 0001 A Novel Construction of Two-Party Private Bidding Protocols from Yao's Millionaires Problem. Search on Bibsonomy TrustBus The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Bidding protocol, millionaires problem, secure two-party computation
39Rafael Pass Bounded-concurrent secure multi-party computation with a dishonest majority. Search on Bibsonomy STOC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF constant-round protocols, simulation-sound zero-knowledge, secure multi-party computation, concurrent composition
39Dongyao Ji, Yuming Wang Comments on "An approach to the formal verification of the two-party cryptographic protocols" by Zhang, Li and Xiao. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
37Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee 0001 One-Round Protocols for Two-Party Authenticated Key Exchange. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Andreas Jakoby, Maciej Liskiewicz, Aleksander Madry Susceptible Two-Party Quantum Computations. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Donald Beaver One-Time Tables for Two-Party Computation. Search on Bibsonomy COCOON The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
36Konstantinos Chalkias, Spyros T. Halkidis, Dimitrios Hristu-Varsakelis, George Stephanides, Anastasios Alexiadis A Provably Secure One-Pass Two-Party Key Establishment Protocol. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF One-pass protocols, two-party key agreement, loss of information, key-compromise impersonation
36Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung Two-Party Computing with Encrypted Data. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Computing with Encrypted Data, CryptoComputing, oblivious transfer, Secure Two-Party Computation
35Omer Horvitz, Jonathan Katz Universally-Composable Two-Party Computation in Two Rounds. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Huafei Zhu, Willy Susilo, Yi Mu 0001 Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF setup-free, stand-alone, verifiably committed signatures, multi-party
33Mike Just, Serge Vaudenay Authenticated Multi-Party Key Agreement. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF confirmation, authentication, key agreement, forward secrecy
31Andrew Y. Lindell Adaptively Secure Two-Party Computation with Erasures. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Rafael Pass, Alon Rosen Bounded-Concurrent Secure Two-Party Computation in a Constant Number of Rounds. Search on Bibsonomy FOCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Tarjei K. Mandt, Chik How Tan Certificateless Authenticated Two-Party Key Agreement Protocols. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bilinear map, authenticated key agreement, Certificateless public key cryptography
30Anshuman Singh, Siddharth Barman, Kaushal K. Shukla Secure Two-Party Context Free Language Recognition. Search on Bibsonomy ICDCIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Ran Canetti, Eyal Kushilevitz, Yehuda Lindell On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Benny Pinkas Fair Secure Two-Party Computation. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Patrick C. K. Hung A Primitive Study of Logrolling in e-Negotiation. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Michael J. Freedman, Yuval Ishai, Benny Pinkas, Omer Reingold Keyword Search and Oblivious Pseudorandom Functions. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Secure keyword search, oblivious pseudorandom functions, secure two-party protocols, private information retrieval, privacy-preserving protocols
29Juraj Hromkovic Randomized Communication Protocols (A Survey). Search on Bibsonomy SAGA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF two-party protocols, communication complexity, Randomized computing
28Koji Chida, Katsumi Takahashi Privacy Preserving Computations without Public Key Cryptographic Operation. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Michel Abdalla, Pierre-Alain Fouque, David Pointcheval Password-Based Authenticated Key Exchange in the Three-Party Setting. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Password, key distribution, authenticated key exchange, multi-party protocols
28Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy, Hao Chen 0003 Multi-party off-the-record messaging. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy, instant messaging, deniability, multi-party
28Sandeep Hans, Sarat C. Addepalli, Anuj Gupta 0001, Kannan Srinathan On Privacy Preserving Convex Hull. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Vipul Goyal, Amit Sahai Resettably Secure Computation. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Florian Kerschbaum Practical Private Regular Expression Matching. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Jianying Zhou 0001, Jose Antonio Onieva, Javier López 0001 A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Jose Antonio Onieva, Jianying Zhou 0001, Javier López 0001 Attacking an Asynchronous Multi-party Contract Signing Protocol. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multi-party contract signing, security protocol analysis, Secure electronic commerce
26Binbin Tu, Yu Chen 0003, Hongrui Cui, Xianfang Wang Fast two-party signature for upgrading ECDSA to two-party scenario easily. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
26Guillermo Owen, Bernard Grofman Two-stage electoral competition in two-party contests: persistent divergence of party positions. Search on Bibsonomy Soc. Choice Welf. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Paul Bunn, Rafail Ostrovsky Secure two-party k-means clustering. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF k-means clustering, secure multiparty computation
25Danny Harnik, Moni Naor, Omer Reingold, Alon Rosen Completeness in Two-Party Secure Computation: A Computational View. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Maurizio Adriano Strangio Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptography, protocols, elliptic curves, key agreement
25Danny Harnik, Moni Naor, Omer Reingold, Alon Rosen Completeness in two-party secure computation: a computational view. Search on Bibsonomy STOC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF oblivious tansfer, completeness, secure computation
25Jonathan Katz, Rafail Ostrovsky Round-Optimal Secure Two-Party Computation. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Philip D. MacKenzie An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Yunpu Zhu, Jacqueline E. Rice A Lightweight Architecture for Secure Two-Party Mobile Payment. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Colleen Swanson, David Jao A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF key agreement, certificateless public key cryptography
25Mehmet S. Kiraz, Berry Schoenmakers An Efficient Protocol for Fair Secure Two-Party Computation. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Charalampos Papamanthou, Roberto Tamassia Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee 0001 One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Yuqing Zhang 0001, Suping Jia Common Program Analysis of Two-Party Security Protocols Using SMV. Search on Bibsonomy APWeb Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar An Improved Secure Two-Party Computation Protocol. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Noel McCullagh, Paulo S. L. M. Barreto A New Two-Party Identity-Based Authenticated Key Agreement. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF bilinear maps, Tate pairing, identity-based cryptography, authenticated key agreement
25Saurabh Sanghvi, Salil P. Vadhan The round complexity of two-party random selection. Search on Bibsonomy STOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptography, distributed computing, coin-flipping
25Yehuda Lindell Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. Search on Bibsonomy J. Cryptol. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Constant-round protocols, Coin-tossing, Secure computation
25Yehuda Lindell Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
25Alain J. Mayer, Moti Yung Secure Protocol Transformation via "Expansion": From Two-Party to Groups. Search on Bibsonomy CCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF complexity theoretic proofs, key transport, protocol transformation, secure group protocols, authentication, protocol design, forward secrecy
25C. V. Ramamoorthy, Yuh Yaw, R. Aggarwal, J. Song Synthesis of two-party error-recoverable protocols. Search on Bibsonomy SIGCOMM The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
24Benny Pinkas, Thomas Schneider 0003, Nigel P. Smart, Stephen C. Williams Secure Two-Party Computation Is Practical. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Xing-Lan Zhang Authenticated Key Exchange Protocol in One-Round. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Diffie-Hellman key exchange, Authenticated key exchange, Forward secrecy, Round complexity
23Frank Dignum, Gerard Vreeswijk Towards a Testbed for Multi-party Dialogues. Search on Bibsonomy Workshop on Agent Communication Languages The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Adrian Perrig, Dawn Song Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
23Kaisei Kajita, Go Ohtake, Tsuyoshi Takagi Generalized Adaptor Signature Scheme: From Two-Party to N-Party Settings. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
23Erik-Oliver Blass, Florian Kerschbaum Mixed-Technique Multi-Party Computations Composed of Two-Party Computations. Search on Bibsonomy ESORICS (3) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Runhua Shi, Bai Liu, Mingwu Zhang Secure two-party integer comparison protocol without any third party. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Yuval Filmus, Hamed Hatami, Yaqiao Li, Suzin You Information Complexity of the AND Function in the Two-Party and Multi-party Settings. Search on Bibsonomy Algorithmica The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Phi Hung Le, Samuel Ranellucci, S. Dov Gordon Two-party Private Set Intersection with an Untrusted Third Party. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
23Phi Hung Le, Samuel Ranellucci, S. Dov Gordon Two-party Private Set Intersection with an Untrusted Third Party. Search on Bibsonomy CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Christina Alexandris Evaluating Cognitive Bias in Two-Party and Multi-Party Spoken Interactions. Search on Bibsonomy AAAI Spring Symposium: Interpretable AI for Well-being The full citation details ... 2019 DBLP  BibTeX  RDF
23Gang Xiao, Kallirroi Georgila A Comparison of Reinforcement Learning Methodologies in Two-Party and Three-Party Negotiation Dialogue. Search on Bibsonomy FLAIRS The full citation details ... 2018 DBLP  BibTeX  RDF
23Yuval Filmus, Hamed Hatami, Yaqiao Li, Suzin You Information Complexity of the AND Function in the Two-Party and Multi-party Settings. Search on Bibsonomy COCOON The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Haiping Huang, Tianhe Gong, Ping Chen, Guoxia Qiu, Ruchuan Wang 0001 Secure Two-Party Distance Computation Protocols with a Semihonest Third Party and Randomization for Privacy Protection in Wireless Sensor Networks. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Xiaoyan Zhu 0005, Zengbao Chen, Haotian Chi, Jie Liu, Shunrong Jiang Two-party and multi-party private matching for proximity-based mobile social networks. Search on Bibsonomy ICC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Norman Schofield, Christopher Claassen, Ugur Ozdemir, Alexei V. Zakharov Estimating the effects of activists in two-party and multi-party systems: comparing the United States and Israel. Search on Bibsonomy Soc. Choice Welf. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Gautam Biswas Diffie-Hellman technique: extended to multiple two-party keys and one multi-party key. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, Amit Sahai Universally Composable Two-Party and Multi-Party Secure Computation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2002 DBLP  BibTeX  RDF
23Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, Amit Sahai Universally composable two-party and multi-party secure computation. Search on Bibsonomy STOC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
23Hong Tang, Liehuang Zhu, Yuanda Cao, Dazhen Wang A Novel Tree-based Authenticated Dynamic Group Key Agreement Protocol for Wireless Sensor Network. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ellipse curve, bilinear pairing, group key agreement, secure group communication
23Troy Lee, Adi Shraibman Disjointness Is Hard in the Multi-party Number-on-the-Forehead Model. Search on Bibsonomy CCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multiparty communication complexity, disjointness, lower bounds
23Gagan Aggarwal, Nina Mishra, Benny Pinkas Secure Computation of the k th-Ranked Element. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Rahul Jain 0001, Jaikumar Radhakrishnan, Pranab Sen A Lower Bound for the Bounded Round Quantum Communication Complexity of Set Disjointness. Search on Bibsonomy FOCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Oded Goldreich 0001, Silvio Micali, Avi Wigderson How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
23Jan Camenisch, Gregory M. Zaverucha Private Intersection of Certified Sets. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF private set intersection, certified sets, secure two-party computation
23Dana Dachman-Soled, Tal Malkin, Mariana Raykova 0001, Moti Yung Efficient Robust Private Set Intersection. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cryptographic Protocols, Privacy Preserving Data Mining, Secure Two-party Computation, Set Intersection
23Esma Aïmeur, Gilles Brassard, José M. Fernandez 0001, Flavien Serge Mani Onana Alambic : a privacy-preserving recommender system for electronic commerce. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Semi-trusted third party, Recommender system, Privacy protection, Web personalization, Secure two-party computation
23Minh-Huyen Nguyen, Salil P. Vadhan Simpler Session-Key Generation from Short Random Passwords. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Human-memorizable passwords, Authentication, Cryptographic protocols, Key exchange, Secure two-party computation
23Hugue Blier, Alain Tapp A Single Initialization Server for Multi-party Cryptography. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF two-party computation, initialization server, cryptography, zero-knowledge, multi-party computation
23Sven Laur, Helger Lipmaa A New Protocol for Conditional Disclosure of Secrets and Its Applications. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Conditional disclosure of secrets, crypto-computing, two-party computation, oblivious transfer, homomorphic encryption
23Chunbo Ma, Jun Ao, Jianhua Li 0001 A Novel Verifier-Based Authenticated Key Agreement Protocol. Search on Bibsonomy ICIC (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Two-Party, Password, Key Agreement, Verifier
23Oded Goldreich 0001, Shafi Goldwasser, Nathan Linial Fault-tolerant Computation in the Full Information Model (Extended Abstract) Search on Bibsonomy FOCS The full citation details ... 1991 DBLP  DOI  BibTeX  RDF m-argument function, full information model, two-party protocols, two-argument function, m-party fault-tolerant protocols, fault tolerant computation, sampling, polylogarithmic factors
22Tal Moran, Moni Naor, Gil Segev 0001 An Optimally Fair Coin Toss. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Julien Saunier, Flavien Balbo An Environment to Support Multi-Party Communications in Multi-Agent Systems. Search on Bibsonomy CEEMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Arkadev Chattopadhyay, Andreas Krebs, Michal Koucký 0001, Mario Szegedy, Pascal Tesson, Denis Thérien Languages with Bounded Multiparty Communication Complexity. Search on Bibsonomy STACS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Taekyoung Kwon 0002, Dong Hoon Lee 0002 Three-Party Password Authenticated Key Agreement Resistant to Server Compromise. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 962 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license