Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
138 | Zhi Zhang, Vartika Singh, Thomas E. Slowe, Sergey Tulyakov, Venugopal Govindaraju |
Real-time Automatic Deceit Detection from Involuntary Facial Expressions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR ![In: 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 18-23 June 2007, Minneapolis, Minnesota, USA, 2007, IEEE Computer Society, 1-4244-1179-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
78 | Gert Jan Hofstede, Catholijn M. Jonker, Tim Verwaart |
A Multi-agent Model of Deceit and Trust in Intercultural Trade. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCI ![In: Computational Collective Intelligence. Semantic Web, Social Networks and Multiagent Systems, First International Conference, ICCCI 2009, Wroclaw, Poland, October 5-7, 2009. Proceedings, pp. 205-216, 2009, Springer, 978-3-642-04440-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
trust and reputation management, trade partner selection, negotiation, culture, deceit |
55 | Wendy Moncur, Judith Masthoff, Ehud Reiter |
Facilitating benign deceit in mediated communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Extended Abstracts Volume, Boston, MA, USA, April 4-9, 2009, pp. 3383-3388, 2009, ACM, 978-1-60558-247-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
computer-mediated social interaction, personal social networks, personalization, ambiguity, grounded theory, deceit |
50 | Curtis S. Ikehara, Martha E. Crosby |
Detecting Intentional Errors Using the Pressures Applied to a Computer Mouse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (16) ![In: Foundations of Augmented Cognition. Neuroergonomics and Operational Neuroscience, 5th International Conference, FAC 2009 Held as Part of HCI International 2009 San Diego, CA, USA, July 19-24, 2009, Proceedings, pp. 248-253, 2009, Springer, 978-3-642-02811-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Intentional errors, pressure sensitive computer mouse, deceit |
44 | Judee K. Burgoon, Gates Matthew Stoner, Joseph A. Bonito, Norah E. Dunbar |
Trust and Deception in Mediated Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 36th Hawaii International Conference on System Sciences (HICSS-36 2003), CD-ROM / Abstracts Proceedings, January 6-9, 2003, Big Island, HI, USA, pp. 44, 2003, IEEE Computer Society, 0-7695-1874-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
44 | Joey F. George, John R. Carlson |
Group Support Systems and Deceptive Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), January 5-8, 1999, Maui, Hawaii, USA, 1999, IEEE Computer Society, 0-7695-0001-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
28 | Gert Jan Hofstede, Catholijn M. Jonker, Tim Verwaart |
Modeling Power Distance in Trade. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MABS ![In: Multi-Agent-Based Simulation IX, International Workshop, MABS 2008, Estoril, Portugal, May 12-13, 2008, Revised Selected Papers, pp. 1-16, 2008, Springer, 978-3-642-01990-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
simulation, trust, negotiation, culture, deceit |
28 | Gert Jan Hofstede, Catholijn M. Jonker, Tim Verwaart |
Individualism and Collectivism in Trade Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE ![In: New Frontiers in Applied Artificial Intelligence, 21st International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2008, Wroclaw, Poland, June 18-20, 2008, Proceedings, pp. 492-501, 2008, Springer, 978-3-540-69045-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
simulation, trust, negotiation, culture, deceit |
27 | Berat Bicer, Hamdi Dibeklioglu |
Automatic Deceit Detection Through Multimodal Analysis of High-Stake Court-Trials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Affect. Comput. ![In: IEEE Trans. Affect. Comput. 15(1), pp. 342-356, January - March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
27 | Luca Luceri, Valeria Pantè, Keith Burghardt, Emilio Ferrara |
Unmasking the Web of Deceit: Uncovering Coordinated Activity to Expose Information Operations on Twitter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.09884, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Vijayasree Boddu, Prakash Kodali |
PSO-based optimization for EEG data and SVM for efficient deceit identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 27(14), pp. 9835-9843, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Stephen John |
Scientific deceit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Synth. ![In: Synth. 198(1), pp. 373-394, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Lucy Hall |
Programming the machine: gender, race, sexuality, AI, and the construction of credibility and deceit a t the border. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Policy Rev. ![In: Internet Policy Rev. 10(4), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Damodar Reddy Edla, Shubham Dodia, Annushree Bablani, Venkatanareshbabu Kuppili |
An Efficient Deep Learning Paradigm for Deceit Identification Test on EEG Signals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Manag. Inf. Syst. ![In: ACM Trans. Manag. Inf. Syst. 12(3), pp. 25:1-25:20, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Saswata Satpathi, Sourav Bagchi, Aurobinda Routray, Partha Sarathi Satpathi, Ritwik Dash |
Adaptive Change Detection of the temperature pattern of the face for identifying deceit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IECON ![In: IECON 2021 - 47th Annual Conference of the IEEE Industrial Electronics Society, Toronto, ON, Canada, October 13-16, 2021, pp. 1-6, 2021, IEEE, 978-1-6654-3554-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Santosh Thakur, Ramesh Dharavath, Damodar Reddy Edla |
Spark and Rule-KNN based scalable machine learning framework for EEG deceit identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biomed. Signal Process. Control. ![In: Biomed. Signal Process. Control. 58, pp. 101886, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Xuanying Zhu, Tom Gedeon, Sabrina B. Caldwell, Richard Jones 0002, Xiaohan Gu |
Deceit Detection: Identification of Presenter's Subjective Doubt Using Affective Observation Neural Network Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: 2020 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2020, Toronto, ON, Canada, October 11-14, 2020, pp. 3174-3181, 2020, IEEE, 978-1-7281-8526-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Saswata Satpathi, Mohamed Ismail Yasar Arafath K, Aurobinda Routray, Partha Sarathi Satpathi |
Detection of Deceit from Thermal Videos on Real Crime Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCNT ![In: 11th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2020, Kharagpur, India, July 1-3, 2020, pp. 1-6, 2020, IEEE, 978-1-7281-6851-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Javier Sánchez-Monedero, Lina Dencik |
The politics of deceptive borders: 'biomarkers of deceit' and the case of iBorderCtrl. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1911.09156, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
27 | Dusko Pavlovic, Temra Pavlovic |
Causality and deceit: Do androids watch action movies? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1910.04383, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
27 | Jason J. Quinlan, Utz Roedig |
The benefits of Deceit: a Malicious client in a 5G Cellular Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LANMAN ![In: IEEE International Symposium on Local and Metropolitan Area Networks, LANMAN 2019, Paris, France, July 1-3, 2019, pp. 1-2, 2019, IEEE, 978-1-7281-1434-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Toby D. Pilditch, Alexander Fries, David A. Lagnado |
Deception in evidential reasoning: Willful deceit or honest mistake? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CogSci ![In: Proceedings of the 41th Annual Meeting of the Cognitive Science Society, CogSci 2019: Creativity + Cognition + Computation, Montreal, Canada, July 24-27, 2019, pp. 931-937, 2019, cognitivesciencesociety.org, 0-9911967-7-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
27 | Annushree Bablani, Damodar Reddy Edla, Venkatanareshbabu Kuppili |
Deceit Identification Test on EEG Data Using Deep Belief Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCNT ![In: 9th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2018, Bengaluru, India, July 10-12, 2018, pp. 1-6, 2018, IEEE, 978-1-5386-4430-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Luís Duarte |
Contextualizing deceit in videogames. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entertain. Comput. ![In: Entertain. Comput. 23, pp. 13-26, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Marko Uotinen |
Detecting Deceit - Guessing or Assessing? Study on the Applicability of Veracity Assessment Methods in Human Intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICGS3 ![In: Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security - 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings, pp. 35-49, 2015, Springer, 978-3-319-23275-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Kai Shu, Ping Luo 0001, Wan Li, Peifeng Yin, Linpeng Tang |
Deal or deceit: detecting cheating in distribution channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, CIKM 2014, Shanghai, China, November 3-7, 2014, pp. 1419-1428, 2014, ACM, 978-1-4503-2598-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Ross MacDonald |
Web of Deceit: Misinformation and Manipulation in the Age of Social Media. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Online Inf. Rev. ![In: Online Inf. Rev. 37(1), pp. 155-156, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Rada Mihalcea, Verónica Pérez-Rosas, Mihai Burzo |
Automatic detection of deceit in verbal communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMI ![In: 2013 International Conference on Multimodal Interaction, ICMI '13, Sydney, NSW, Australia, December 9-13, 2013, pp. 131-134, 2013, ACM, 978-1-4503-2129-7. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Aaron Hunter 0001 |
Belief Manipulation: A Formal Model of Deceit in Message Passing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings, pp. 1-8, 2013, Springer, 978-3-642-39692-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Hong Liu 0008, Pingping Wu |
Comparison of methods for smile deceit detection by training AU6 and AU12 simultaneously. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: 19th IEEE International Conference on Image Processing, ICIP 2012, Lake Buena Vista, Orlando, FL, USA, September 30 - October 3, 2012, pp. 1805-1808, 2012, IEEE, 978-1-4673-2534-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Justin Davis, Ronald C. Arkin |
Mobbing Behavior and Deceit and Its Role in Bio-inspired Autonomous Robotic Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANTS ![In: Swarm Intelligence - 8th International Conference, ANTS 2012, Brussels, Belgium, September 12-14, 2012. Proceedings, pp. 276-283, 2012, Springer, 978-3-642-32649-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Sara L. Uckelman |
Deceit and indefeasible knowledge: the case of dubitatio. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Appl. Non Class. Logics ![In: J. Appl. Non Class. Logics 21(3-4), pp. 503-519, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Nisha Bhaskaran, Ifeoma Nwogu, Mark G. Frank, Venu Govindaraju |
Deceit detection via online behavioral learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21 - 24, 2011, pp. 29-30, 2011, ACM, 978-1-4503-0113-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Nisha Bhaskaran, Ifeoma Nwogu, Mark G. Frank, Venu Govindaraju |
Lie to Me: Deceit detection via online behavioral learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FG ![In: Ninth IEEE International Conference on Automatic Face and Gesture Recognition (FG 2011), Santa Barbara, CA, USA, 21-25 March 2011, pp. 24-29, 2011, IEEE Computer Society, 978-1-4244-9140-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Timothy W. Bickmore, Daniel Schulman, Langxuan Yin |
Engagement vs. Deceit: Virtual Humans with Human Autobiographies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IVA ![In: Intelligent Virtual Agents, 9th International Conference, IVA 2009, Amsterdam, The Netherlands, September 14-16, 2009, Proceedings, pp. 6-19, 2009, Springer, 978-3-642-04379-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Embodied Conversational Agent, Longitudinal Study, Relational Agent |
27 | Panagiotis Tsiamyrtzis, Jonathan Dowdall, Dvijesh J. Shastri, Ioannis T. Pavlidis, M. G. Frank, P. Ekman |
Imaging Facial Physiology for the Detection of Deceit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Vis. ![In: Int. J. Comput. Vis. 71(2), pp. 197-214, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
polygraph, thermography, facial tracking, contact-free physiological monitoring, deception detection |
27 | Thomas E. Slowe, Venu Govindaraju |
Automatic Deceit Indication through Reliable Facial Expressions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AutoID ![In: 2007 IEEE Workshop on Automatic Identification Advanced Technologies, AutoID 2007, Alghero, Italy, June 7-8, 2007, pp. 87-92, 2007, IEEE, 1-4244-1300-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Julie Grèzes, Sylvie Berthoz, Richard E. Passingham |
Amygdala activation when one is the target of deceit: Did he lie to you or to someone else? ![Search on Bibsonomy](Pics/bibsonomy.png) |
NeuroImage ![In: NeuroImage 30(2), pp. 601-608, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | L. Jean Camp, Cathleen McGrath, Alla Genkina |
Security and Morality: A Tale of User Deceit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MTW ![In: Proceedings of the WWW'06 Workshop on Models of Trust for the Web (MTW'06), Edinburgh, Scotland, UK, May 22, 2006, 2006, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
27 | Catholijn M. Jonker, Sebastiaan A. Meijer, Dmytro Tykhonov, Tim Verwaart |
Modeling and Simulation of Selling, Buying, Deceit, and Trust Behavior in the Trust and Tracing Game. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNAIC ![In: BNAIC 2005 - Proceedings of the Seventeenth Belgium-Netherlands Conference on Artificial Intelligence, Brussels, Belgium, October 17-18, 2005, pp. 351-352, 2005, Koninklijke Vlaamse Academie van Belie voor Wetenschappen en Kunsten. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
27 | Pete Docter |
Cheating, deceit and sleight-of-hand: how to create good character animation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SI3D ![In: Proceedings of the 2003 Symposium on Interactive 3D Graphics, SI3D 2003, Monterey, California, USA, April 28-30, 2003, pp. 8, 2003, ACM, 1-58113-645-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Philip H. Jacobsen |
A Cryptologic Veteran's Analysis of "Day of Deceit" - a Book Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptologia ![In: Cryptologia 24(2), pp. 110-118, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
27 | Andy Whitcroft, Tim Wilkinson |
A Tangled Web of Deceit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ISDN Syst. ![In: Comput. Networks ISDN Syst. 27(2), pp. 225-234, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
27 | Alex Siegel, Kenneth P. Birman, Keith Marzullo |
Deceit: A Flexible Distributed File System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Summer ![In: Proceedings of the Usenix Summer 1990 Technical Conference, Anaheim, California, USA, June 1990, pp. 51-62, 1990, USENIX Association. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
27 | Alex Siegel, Kenneth P. Birman, Keith Marzullo |
Position Paper - Deceit: A Flexible Distributed File System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on the Management of Replicated Data ![In: Proceedings of the First Workshop on the Management of Replicated Data, November 8-9, 1990, Houston, Texas, USA., pp. 15-17, 1990, IEEE Computer Society Press, 0-8186-2085-4. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
27 | Gustavus J. Simmons |
Secure Communications in the Presence of Pervasive Deceit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: Proceedings of the 1980 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 14-16, 1980, pp. 84-93, 1980, IEEE Computer Society, 0-8186-0335-6. The full citation details ...](Pics/full.jpeg) |
1980 |
DBLP DOI BibTeX RDF |
|
22 | Markus Jakobsson, Peter Finn, Nathaniel A. Johnson |
Why and How to Perform Fraud Experiments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(2), pp. 66-68, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Florian Schoppmann |
The Power of Small Coalitions in Cost Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WINE ![In: Internet and Network Economics, 4th International Workshop, WINE 2008, Shanghai, China, December 17-20, 2008. Proceedings, pp. 665-674, 2008, Springer, 978-3-540-92184-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Cleopas O. Angaye, Paul S. Fisher |
Application of FI sequences for authentication in a network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 45th Annual Southeast Regional Conference, 2007, Winston-Salem, North Carolina, USA, March 23-24, 2007, pp. 362-366, 2007, ACM, 978-1-59593-629-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
finite induction, private keys, security, public keys |
22 | Judee K. Burgoon, J. P. Blair, Tiantian Qin, Jay F. Nunamaker Jr. |
Detecting Deception through Linguistic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings, pp. 91-101, 2003, Springer, 3-540-40189-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | James Riordan, Bruce Schneier |
Environmental Key Generation Towards Clueless Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile Agents and Security ![In: Mobile Agents and Security, pp. 15-24, 1998, Springer, 3-540-64792-9. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
22 | Anupam Bhide, E. N. Elnozahy, Stephen P. Morgan, A. Siegel |
A comparison of two approaches to build reliable distributed file servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 10th International Conference on Distributed Computing Systems (ICDCS 1991), May 20-24, 1991, Arlington, Texas, USA, pp. 616-623, 1991, IEEE Computer Society, 0-8186-2144-3. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|