The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase n-party (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1984 (19) 1985-1986 (15) 1987-1988 (20) 1989-1990 (24) 1991-1992 (21) 1993-1994 (30) 1995 (19) 1996 (22) 1997 (29) 1998 (76) 1999 (92) 2000 (103) 2001 (135) 2002 (140) 2003 (216) 2004 (276) 2005 (379) 2006 (393) 2007 (459) 2008 (454) 2009 (429) 2010 (194) 2011 (189) 2012 (219) 2013 (245) 2014 (253) 2015 (239) 2016 (241) 2017 (248) 2018 (270) 2019 (329) 2020 (353) 2021 (395) 2022 (466) 2023 (438) 2024 (105)
Publication types (Num. hits)
article(2649) book(6) data(2) incollection(35) inproceedings(4756) phdthesis(84) proceedings(3)
Venues (Conferences, Journals, ...)
CoRR(465) IACR Cryptol. ePrint Arch.(393) CRYPTO(105) Quantum Inf. Process.(103) CCS(78) EUROCRYPT(68) HICSS(53) Financial Cryptography(48) TCC(48) ASIACRYPT(43) INTERSPEECH(39) J. Cryptol.(38) IEEE Access(37) ICASSP(36) STOC(32) Inf. Sci.(31) More (+10 of total 2161)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3661 occurrences of 1810 keywords

Results
Found 7536 publication records. Showing 7535 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
90Qiong Liu 0002, Tingting Li Research on Benefits Distribution of Fourth Party Logistics Based on Nonprofit Organization. Search on Bibsonomy ICIRA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Fourth party logistics, Benefits distribution, Nash model, Third party logistics, Utility function
80Luis von Ahn, Nicholas J. Hopper, John Langford 0001 Covert two-party computation. Search on Bibsonomy STOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF covert computation, fair two-party computation, two-party computation, steganography
66Weijia Wang, Lei Hu Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF password, key distribution, authenticated key exchange, multi-party protocol
65Feng Bao 0001, Robert H. Deng, Khanh Quoc Nguyen, Vijay Varadharajan Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. Search on Bibsonomy DEXA Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF provable security, fair exchange, multi-party protocol, verifiable encryption
61Rafael Pass Bounded-concurrent secure multi-party computation with a dishonest majority. Search on Bibsonomy STOC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF constant-round protocols, simulation-sound zero-knowledge, secure multi-party computation, concurrent composition
58Emanuele Viola, Avi Wigderson One-Way Multi-Party Communication Lower Bound for Pointer Jumping with Applications. Search on Bibsonomy FOCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
55Weiqiang Liang, Xiaoling Dai BulaPay: a web-service based third-party payment system for e-commerce in South Pacific Islands. Search on Bibsonomy iiWAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF third-party payment system, web services, XML, e-commerce, SOAP
55Huafei Zhu, Willy Susilo, Yi Mu 0001 Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF setup-free, stand-alone, verifiably committed signatures, multi-party
54Juan A. Garay, Markus Jakobsson, Philip D. MacKenzie Abuse-Free Optimistic Contract Signing. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
54Louis Salvail The Search for the Holy Grail in Quantum Cryptography. Search on Bibsonomy Lectures on Data Security The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
54Hemanta K. Maji, Manoj Prabhakaran 0001, Mike Rosulek Complexity of Multi-Party Computation Functionalities. Search on Bibsonomy Secure Multi-Party Computation The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
51Michel Renou, Virginie Party, Angéla Rouyar, Sylvia Anton Olfactory signal coding in an odor background. Search on Bibsonomy Biosyst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
50Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy, Hao Chen 0003 Multi-party off-the-record messaging. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy, instant messaging, deniability, multi-party
50Michel Abdalla, Pierre-Alain Fouque, David Pointcheval Password-Based Authenticated Key Exchange in the Three-Party Setting. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Password, key distribution, authenticated key exchange, multi-party protocols
50Jose Antonio Onieva, Jianying Zhou 0001, Javier López 0001 Attacking an Asynchronous Multi-party Contract Signing Protocol. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multi-party contract signing, security protocol analysis, Secure electronic commerce
50Jaideep Vaidya, Chris Clifton Leveraging the "Multi" in secure multi-party computation. Search on Bibsonomy WPES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF secure distributed computation, privacy, secure multi-party computation
49Kwanghoon Pio Kim A Process-Driven Inter-organizational Choreography Modeling System. Search on Bibsonomy OTM Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Inter-organizational e-business service integration, B2B choreography and orchestration, Dual-party collaboration model, Process-driven multi-party collaboration model, Inter-organizational choreography modeling system
47Jin Wook Byun, Dong Hoon Lee 0001 N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
46Vipul Goyal, Payman Mohassel, Adam D. Smith Efficient Two Party and Multi Party Computation Against Covert Adversaries. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45Anand Bhalgat, Tanmoy Chakraborty 0001, Sanjeev Khanna Approximating pure nash equilibrium in cut, party affiliation, and satisfiability games. Search on Bibsonomy EC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cut games, party affiliation games, potential games, pure nash equilibrium, approximation algorithms
45Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung Two-Party Computing with Encrypted Data. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Computing with Encrypted Data, CryptoComputing, oblivious transfer, Secure Two-Party Computation
45Ran Canetti, Eyal Kushilevitz, Yehuda Lindell On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Universal composability, Secure two-party computation, Impossibility results
45Payman Mohassel, Matthew K. Franklin Efficiency Tradeoffs for Malicious Two-Party Computation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Yao’s garbled circuit, malicious adversary, secure two-party computation, secure function evaluation
45Shafi Goldwasser, Yehuda Lindell Secure Multi-Party Computation without Agreement. Search on Bibsonomy J. Cryptol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Broadcast, Secure multi-party computation, Protocol composition
45Philip D. MacKenzie, Alina Oprea, Michael K. Reiter Automatic generation of two-party computations. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF automatic generation of protocols, threshold cryptography, secure two-party computation
44Manoj Prabhakaran 0001, Amit Sahai (eds.) Secure Multi-Party Computation Search on Bibsonomy Secure Multi-Party Computation The full citation details ... 2013 DBLP  BibTeX  RDF
44Abhishek Jain 0002, Amit Sahai The IPS Compiler. Search on Bibsonomy Secure Multi-Party Computation The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
44Oded Goldreich 0001 A Short Tutorial of Zero-Knowledge. Search on Bibsonomy Secure Multi-Party Computation The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
44Ran Canetti Security and Composition of Cryptographic Protocols: A Tutorial. Search on Bibsonomy Secure Multi-Party Computation The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
44Yuval Ishai Randomization Techniques for Secure Computation. Search on Bibsonomy Secure Multi-Party Computation The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
44Gilad Asharov, Yehuda Lindell The BGW Protocol for Perfectly-Secure Multiparty Computation. Search on Bibsonomy Secure Multi-Party Computation The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
44Oded Goldreich 0001 General Cryptographic Protocols: The Very Basics. Search on Bibsonomy Secure Multi-Party Computation The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
44Ueli Maurer, Vassilis Zikas Information-Theoretic Secure Multiparty Computation. Search on Bibsonomy Secure Multi-Party Computation The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
43Feng Bao 0001, Robert H. Deng, Wenbo Mao Efficient and Practical Fair Exchange Protocols with Off-Line TTP. Search on Bibsonomy S&P The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
42Yehuda Lindell, Benny Pinkas A Proof of Security of Yao's Protocol for Two-Party Computation. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Semi-honest adversaries, Yao’s two-party protocol, Secure two-party computation, Proofs of security
42Min Huang 0001, Yan Cui, Xingwei Wang 0001, Hongyu Dong A genetic algorithm for solving fourth-party logistics routing optimizing problem with fuzzy duration time. Search on Bibsonomy GEC Summit The full citation details ... 2009 DBLP  DOI  BibTeX  RDF fourth party logistics, fourth party logistics routing problem, fuzzy duration time, genetic algorithm
42Hugue Blier, Alain Tapp A Single Initialization Server for Multi-party Cryptography. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF two-party computation, initialization server, cryptography, zero-knowledge, multi-party computation
42Andrew Y. Lindell Legally-Enforceable Fairness in Secure Two-Party Computation. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42S. Dov Gordon, Carmit Hazay, Jonathan Katz, Yehuda Lindell Complete fairness in secure two-party computation. Search on Bibsonomy STOC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptography, fairness, secure computation
42Steve Kremer, Olivier Markowitch Fair multi-party non-repudiation protocols. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Group communications, Non-repudiation, Fair exchange
42Nicolás González-Deleito, Olivier Markowitch Exclusion-Freeness in Multi-party Exchange Protocols. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
42Yu-Seung Ma, Seung-Uk Oh, Doo-Hwan Bae, Yong Rae Kwon Framework for Third Party Testing of Component Software. Search on Bibsonomy APSEC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF metadata, Framework, Certification, Component-based software engineering, EJB, Component testing
42Mike Just, Serge Vaudenay Authenticated Multi-Party Key Agreement. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF confirmation, authentication, key agreement, forward secrecy
39Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yung Secure Multi-party Computation Minimizing Online Rounds. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Computing with Encrypted Data, Universal Composition, Cryptographic Protocols, Public key Cryptography, Multi-Party Computation
39Louis Salvail, Christian Schaffner, Miroslava Sotáková On the Power of Two-Party Quantum Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF two-party primitives, quantum protocols, oblivious transfer, quantum information theory
39Rohit Pathak, Satyadhar Joshi Secure Multi-party Computation Using Virtual Parties for Computation on Encrypted Data. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Secure Multi-party Computation (SMC), Privacy, Protocol, Information Security
39Assaf Ben-David, Noam Nisan, Benny Pinkas FairplayMP: a system for secure multi-party computation. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptography, secure multi-party computation
39Raphael C.-W. Phan, Bok-Min Goi Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF n-party, cryptanalysis, dictionary attack, collusion, Password-authenticated key exchange, key privacy
39Dushyant Bansal, Paul A. S. Ward Third-Party Flow Control. Search on Bibsonomy CNSR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF third-party, peer-to-peer, congestion control, TCP, flow control
39Matthias Fitzi, Stefan Wolf 0001, Jürg Wullschleger Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF pseudo-signatures, broadcast, information theory, Unconditional security, multi-party computation
39Matthias Fitzi, Martin Hirt, Ueli M. Maurer Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Secure multi-party computation, threshold cryptography, unconditional security, verifiable secret sharing
38Zhongfei (Mark) Zhang, John J. Salerno, Philip S. Yu Applying data mining in investigating money laundering crimes. Search on Bibsonomy KDD The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Link Discovery based on Correlation Analysis (LDCA), MLC Group Models, Money Laundering Crimes (MLCs), bi-party data, community generation, timeline analysis, uni-party data, clustering, histogram, CORAL
38Matthew Addis, Paul Allen, Mike Surridge Negotiating for Software Services. Search on Bibsonomy DEXA Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF engineering computing, routine use, engineering meta-applications, hardware on-demand business model, agent based electronic marketplace, secure Internet based marketplace, negotiation services, software application users, third party hardware/software service providers, World Wide Web, software services, trusted third party, security technologies
38Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger An Efficient Protocol for Certified Electronic Mail. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
37Dawn Desplanque Managing a Third-Party Alliance Product Documentation Development Project. Search on Bibsonomy SIGDOC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF OEM, fourth-party, third-party, customized, alliance
37Eyal Kushilevitz, Silvio Micali, Rafail Ostrovsky Reducibility and Completeness in Multi-Party Private Computations Search on Bibsonomy FOCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Oblivious Transfer protocol, multi-party private computations, n-privacy, Boolean functions, completeness, reducibility, black-box, multi-party protocols
37Hillol Kargupta, Kamalika Das, Kun Liu 0001 Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework. Search on Bibsonomy PKDD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Jianying Zhou 0001, Jose Antonio Onieva, Javier López 0001 A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Li Na Ren, Yun Zhang Pei, Yibo Zhang, Chun Ying Charging Validation for Third Party Value-Added Applications in Service Delivery Platform. Search on Bibsonomy NOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Stanislaw Jarecki, Jihye Kim, Gene Tsudik Authentication for Paranoids: Multi-party Secret Handshakes. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Yehuda Lindell Bounded-concurrent secure two-party computation without setup assumptions. Search on Bibsonomy STOC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF secure computation, protocol composition
37Amir Herzberg, Yosi Mass Relying Party Credentials Framework. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
37Olivier Markowitch, Steve Kremer A Multi-party Optimistic Non-repudiation Protocol. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
35Henry N. Adorna On the Separation between k-Party and (k-1)-Party Nondeterministic Message Complexities. Search on Bibsonomy Developments in Language Theory The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
35Jens Groth, Rafail Ostrovsky Cryptography in the Multi-string Model. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Common random string model, multi-string model, universally composable commitment, multi-party computation, non-interactive zero-knowledge
35Michel Abdalla, David Pointcheval Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Password-based authentication, multi-party protocols, Diffie-Hellman assumptions
35Raylin Tso, Takeshi Okamoto, Eiji Okamoto Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF CDH assumption, DDH assumption, double discrete logarithm, one-way two-party authenticated key agreement, privacy, designated verifier signature
35Dov Monderer, Moshe Tennenholtz k-Implementation. Search on Bibsonomy EC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF implementation by an interested party, implementation cost, implementation theory
34Guan Wang, Tongbo Luo, Michael T. Goodrich, Wenliang Du, Zutao Zhu Bureaucratic protocols for secure two-party sorting, selection, and permuting. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF bureaucratic protocols, oblivious algorithms, sorting, secure two-party computation
34Rafael Pass, Hoeteck Wee Black-Box Constructions of Two-Party Protocols from One-Way Functions. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF black-box constructions, zero-knowledge arguments, trapdoor commitments, parallel coin-tossing, non-malleable commitments, secure two-party computation
34Feng Zhang 0012, Gansen Zhao, Tingyan Xing Privacy-Preserving Distributed k-Nearest Neighbor Mining on Horizontally Partitioned Multi-Party Data. Search on Bibsonomy ADMA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Privacy-reserving Data Mining, k -NN Mining, Probabilistic Cryptosystem, Communicative Cryptosystem, Secure Multi-party Computation
34Yong Xu The Mechanism Design of Third Party Assure-Payment Platform. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Assure-Payment, Third Party Platform, btob
34Shuhua Wu, Yuefei Zhu Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting. Search on Bibsonomy NPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF three-party, password, forward-secure
34Weijia Wang, Lei Hu, Yong Li 0002 Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Password, key distribution, authenticated key exchange, multi-party protocols
34Yosuke Matsusaka, Mika Enomoto, Yasuharu Den Simultaneous prediction of dialog acts and address types in three-party conversations. Search on Bibsonomy ICMI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF dialog act, recognition, gaze, prosody, multi-party interaction
34Hanping Hou, Shoubo Xu Emergence and Simulation of Bionic Swarm Intelligence Type X Party Material Flow. Search on Bibsonomy CONFENIS (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Material flow, Swarm intelligence (SI), X party material flow (XPMF), Simulation, Supply chain, Emergence, Logistics
34Eun-Jun Yoon, Kee-Young Yoo Token-Based Authenticated Key Establishment Protocols for Three-Party Communication. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Three-party, Authentication, Cryptography, Password, Key agreement, Token
34Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang On Secure Multi-party Computation in Black-Box Groups. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Planar Graph, Graph Colouring, Black-Box, Multi-Party Computation, Non-Abelian Group
34Shundong Li, Yiqi Dai Secure Two-Party Computational Geometry. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF millionaire problem, secure computation geometry, protocol, oblivious transfer, secure multi-party computation
34Matthias Fitzi, Juan A. Garay, Ueli M. Maurer, Rafail Ostrovsky Minimal Complete Primitives for Secure Multi-Party Computation. Search on Bibsonomy J. Cryptol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Complete functions, Oblivious cast, Unconditional security, Multi-party computation, Secure function evaluation
34Barbara Carminati, Elena Ferrari, Elisa Bertino Securing XML data in third-party distribution systems. Search on Bibsonomy CIKM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF third-party architecture, XML, data outsourcing
34Sergei Kojarski, David H. Lorenz Pluggable AOP: designing aspect mechanisms for third-party composition. Search on Bibsonomy OOPSLA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF AOP semantics, AspectWerkz, aspect extension, aspect mechanism, aspectual effect, domain-specific aspect language, third-party composition, collaboration, AOP, reuse, software components, AOSD, AspectJ, mixin, CBSE, COOL
34Matthias Fitzi, Nicolas Gisin, Ueli M. Maurer, Oliver von Rotz Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Byzantine agreement, unconditional security, multi-party computation
34Ueli M. Maurer Secure Multi-party Computation Made Simple. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF adversary structures, secret-sharing, Secure multi-party computation, verifiable secret-sharing
34Claude Crépeau, Daniel Gottesman, Adam D. Smith Secure multi-party quantum computation. Search on Bibsonomy STOC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF distributed computing, quantum cryptography, secure function evaluation, multi-party protocols
34Chih-Hung Wang, Tzonelih Hwang Threshold and Generalized DSS Signatures without a Trusted Party. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF (t+1,n) threshold signature scheme, generalized DSS signatures, trusted party, secret key sharing, valid group signature, Digital Signature Standard, signers, conspiracy, signing procedure, cryptography
33Christoph Lucas, Dominik Raub, Ueli M. Maurer Hybrid-secure MPC: trading information-theoretic robustness for computational privacy. Search on Bibsonomy PODC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF hybrid security, party emulation, computational security, information-theoretic security, universal composability, multi-party computation
33Esma Aïmeur, Gilles Brassard, José M. Fernandez 0001, Flavien Serge Mani Onana Alambic : a privacy-preserving recommender system for electronic commerce. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Semi-trusted third party, Recommender system, Privacy protection, Web personalization, Secure two-party computation
32Detlef Kähler, Ralf Küsters, Thomas Wilke A Dolev-Yao-Based Definition of Abuse-Free Protocols. Search on Bibsonomy ICALP (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Tzafrir Cohen, Joe Kilian, Erez Petrank Responsive Round Complexity and Concurrent Zero-Knowledge. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF cryptographic protocols, Zero-knowledge, concurrent zero-knowledge
32Jianying Zhou 0001, Dieter Gollmann An Efficient Non-repudiation Protocol . Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF network security, security protocols, non-repudiation
32Ming-Deh A. Huang, Shang-Hua Teng A Universal Problem in Secure and Verifiable Distributed Computation. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
31I-Cheng Wang, Chih-Hao Shen, Kung Chen, Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang 0004 An Empirical Study on Privacy and Secure Multi-party Computation Using Exponentiation. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31G. Sathya Narayanan, T. Aishwarya, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, C. Pandu Rangan Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Privacy preserving Set operations, Multiparty Computation
31Michele Mancioppi, Manuel Carro, Willem-Jan van den Heuvel, Mike P. Papazoglou Sound Multi-party Business Protocols for Service Networks. Search on Bibsonomy ICSOC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Andreas Jakoby, Maciej Liskiewicz, Aleksander Madry Susceptible Two-Party Quantum Computations. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Xiangdong Li, Qingxian Wang, Li Chen Analysis on Cyclic Multi-party Fair Exchange Protocols. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Troy Lee, Adi Shraibman Disjointness Is Hard in the Multi-party Number-on-the-Forehead Model. Search on Bibsonomy CCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multiparty communication complexity, disjointness, lower bounds
31Julien Saunier, Flavien Balbo An Environment to Support Multi-Party Communications in Multi-Agent Systems. Search on Bibsonomy CEEMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Yong Jin, Wei Song, Jingyi Zhang On Developing China's Third Party Payment. Search on Bibsonomy I3E (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 7535 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license