|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 14005 occurrences of 4807 keywords
|
|
|
Results
Found 35133 publication records. Showing 35133 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
63 | Junzuo Lai, Weidong Kou |
Self-Generated-Certificate Public Key Encryption Without Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 476-489, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Self-Generated-Certificate Public Key Cryptography, Self-Certified-Key, Certificateless Public Key Cryptography |
59 | Alan J. Tomkins, Lisa M. Pytlik Zillig, Mitchel N. Herian, Tarik Abdel-Monem, Joseph A. Hamm |
Public input for municipal policymaking: engagement methods and their impact on trust and confidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 11th Annual International Conference on Digital Government Research, Public Administration Online: Challenges and Opportunities, DG.O 2010, Puebla, Mexico, May 17-20, 2010, pp. 41-50, 2010, Digital Government Research Center, 978-1-4503-0070-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
deliberative discussions, procedural fairness, public trust and confidence, online |
56 | Jae Hyung Koo, Bum Han Kim, Dong Hoon Lee 0001 |
Authenticated Public Key Distribution Scheme Without Trusted Third Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 926-935, 2005, Springer, 3-540-30803-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Key Management and Authentication, Public-key Cryptography, Public Key Infrastructure (PKI) |
54 | Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow |
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 352-369, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Identity-based signcryption, public ciphertext authenticity, network security, provable security, firewalls, elliptic curve cryptosystems, public key cryptosystems, forward security, semantical security, cryptographic primitives, public verifiability |
51 | Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner |
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 233-248, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
high order linearization equation, algebraic cryptanalysis, quadratic polynomial, multivariate public key cryptosystem |
50 | Eugenio Faldella, Marco Prandini |
A Novel Approach to On-Line Status Authentication of Public-Key Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 270-277, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
online status authentication, sensitive data exchange, security constraints, revoked certificates, certificate status handling scheme, one-way accumulator, Owa-based Revocation Scheme, Online Certificate Status Protocol, Internet, scalability, authentication, cryptography, protocols, data integrity, data integrity, computer networks, public key cryptography, public key infrastructure, message authentication, telecommunication security, certification authority, public-key certificates, computational load, public networks |
50 | Y. Pardhasaradhi, Safdar Ahmed |
Efficiency of electronic public service delivery in India: public-private partnership as a critical factor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: Proceedings of the 1st International Conference on Theory and Practice of Electronic Governance, ICEGOV 2007, Macao, China, December 10-13, 2007, pp. 357-365, 2007, ACM, 978-1-59593-822-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Bhoomi, e-Seva, e-governance practices, public private collaboration, efficiency |
49 | Yi-Ru Liu, Wen-Guey Tzeng |
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings, pp. 380-396, 2008, Springer, 978-3-540-78439-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Broadcast encryption, collusion, polynomial interpolation |
49 | Jurjen Jansen, Sjoerd de Vries, Thea van der Geest, Rex Arendsen, Jan van Dijk |
The State of Client-Centered Public Service Delivery in the Netherlands. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGOV ![In: Electronic Government, 8th International Conference, EGOV 2009, Linz, Austria, August 31 - September 3, 2009. Proceedings, pp. 293-304, 2009, Springer, 978-3-642-03515-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Client-centeredness, public service delivery, public organizations, segmentation, government, differentiation |
49 | Sonia Vilvovsky |
Differences between public and private IT outsourcing: common themes in the literature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 9th Annual International Conference on Digital Government Research, Partnerships for Public Innovation, DG.O 2008, Montreal, Canada, May 18-21, 2008, pp. 337-346, 2008, Digital Government Research Center, 978-1-60558-099-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
contracting out, public IT, public outsourcing, risk management, literature review |
48 | Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy |
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 196-214, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Blind identity-based encryption, public key encryption with keyword search, searchable encryption |
48 | Seong-Hun Paeng, Bae Eun Jung, Kil-Chan Ha |
A Lattice Based Public Key Cryptosystem Using Polynomial Representations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, pp. 292-308, 2003, Springer, 3-540-00324-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
GGH cryptosystem, lattice based public key cryptosystem, polynomial representation |
48 | Frank Hartung, Bernd Girod |
Fast Public-Key Watermarking of Compressed Video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (1) ![In: Proceedings 1997 International Conference on Image Processing, ICIP '97, Santa Barbara, California, USA, October 26-29, 1997, pp. 528-531, 1997, IEEE Computer Society, 0-8186-8183-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
fast public-key watermarking, pseudo-noise signal, watermark information, practical systems, public decoding, fast compressed-domain embedding technique, on-the-fly compressed-domain public-key watermarking, verification, images, decoding, compressed video, spread-spectrum watermarking |
47 | Chi-Sung Laih, K. Y. Chen |
Generating visible RSA public keys for PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 2(2), pp. 103-109, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Public key generation, RSA, Certificate, Integer factorization |
46 | Takeshi Koshiba |
On Sufficient Randomness for Secure Public-Key Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002, Proceedings, pp. 34-47, 2002, Springer, 3-540-43168-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
46 | Lih-Chung Wang, Yuh-Hua Hu, Feipei Lai, Chun-yen Chou, Bo-Yin Yang |
Tractable Rational Map Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings, pp. 244-257, 2005, Springer, 3-540-24454-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
tractable rational maps, digital signature, finite field, public key, multivariate |
45 | Byoungcheon Lee, Kwangjo Kim, Joongsoo Ma |
Efficient Public Auction with One-Time Registration and Public Verifiability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 162-174, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
public auction, English auction, one-time registration, signature of knowledge, anonymous signature scheme, anonymity, hash chain, public verifiability |
44 | Efthimis N. Efthimiadis, Jens-Erik Mai |
Puget sound's MARS (media asset retrieval systems) digital library. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCDL ![In: ACM/IEEE Joint Conference on Digital Libraries, JCDL 2002, Portland, Oregon, USA, June 14-18, 2002, Proceedings, pp. 390, 2002, ACM, 1-58113-513-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
access to broadcasts, corporation for public broadcasting (CPB), media asset management (MAM), metadata, video, audio |
44 | Vijay Varadharajan, Rajan Shankaran, Michael Hitchens |
Security services and public key infrastructure for ATM networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 22nd IEEE Conference on Local Computer Networks (LCN '97), 2-5 November 1997, Minneapolis, Minnesota, USA, Proceedings, pp. 253-262, 1997, IEEE Computer Society, 0-8186-8141-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
ATM protocol stack, security layer, data origin authentication, user plane, key establishment protocol, ATM signaling protocol, call setup procedures, ATM nodes, public key certificate retrieval, public key certificate distribution, B-ISDN Protocol Reference Model, integrity, public key cryptography, confidentiality, ATM networks, public key infrastructure, Certification Authority, security services |
43 | Adam L. Young, Moti Yung |
Towards Signature-Only Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 97-115, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Public Key Cryptosystems (PKCS), nested trapdoor, abuse freeness, (subliminal) leakage, design validation proofs, FIPS, digital signature, decryption, Public Key Infrastructure (PKI), NIST |
43 | Eva Eriksson, Thomas Riisgaard Hansen, Andreas Lykke-Olesen |
Reclaiming public space: designing for public interaction with private devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TEI ![In: Proceedings of the 1st International Conference on Tangible and Embedded Interaction 2007, Baton Rouge, Louisiana, USA, February 15-17, 2007, pp. 31-38, 2007, ACM, 978-1-59593-619-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
interaction design, mobile technology, public space |
43 | Satoshi Koga, Kouichi Sakurai |
A Distributed Online Certificate Status Protocol with a Single Public Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 389-401, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Sai Ho Kwok, Anthony C. T. Lai, Jason C. K. Yeung |
A study of online service and information exposure of public companies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD Workshop on CyberSecurity and Intelligence Informatics ![In: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, Paris, France, June 28, 2009, pp. 85-90, 2009, ACM, 978-1-60558-669-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
malicious hackers, public company, public server, web server, ports, cyber security |
43 | Nick A. Moldovyan |
New Public Key Cryptosystems Based on Difficulty of Factorization and Discrete Logarithm Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IF&GIS ![In: Third International Workshop on Information Fusion and Geographical Information Systems - IF&GIS'07, St. Petersburg, Russia, May 27-29, 2007. Proceedings, pp. 160-172, 2007, Springer, 978-3-540-37628-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
public encryption, Digital signature, public key cryptosystem, key agreement protocol |
43 | Shai Halevi, Hugo Krawczyk |
Public-Key Cryptography and Password Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 2(3), pp. 230-268, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
hand-held certificates, public passwords, public-key protocols, passwords, key exchange, dictionary attacks |
43 | Peter Muhlberger |
Information technology and public deliberation: research on improving public input into government. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 11th Annual International Conference on Digital Government Research, Public Administration Online: Challenges and Opportunities, DG.O 2010, Puebla, Mexico, May 17-20, 2010, pp. 258-260, 2010, Digital Government Research Center, 978-1-4503-0070-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
public input, collaboration, natural language processing, video, Wikipedia, government, collective intelligence, deliberation, rulemaking |
42 | Christian Wieschebrink |
An Attack on a Modified Niederreiter Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 14-26, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
McEliece encryption, Niederreiter encryption, generalized Reed-Solomon codes, Sidelnikov-Shestakov attack, error-correcting codes, Public key cryptography |
42 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings, pp. 380-397, 2005, Springer, 3-540-24454-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Multi-Receiver Identity-Based Encryption, Formal Security Analysis, Public Key Broadcast Encryption |
42 | Christopher Wolf, Bart Preneel |
Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings, pp. 275-287, 2005, Springer, 3-540-24454-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Public Key Schemes, Multivariate Quadratic Equations |
42 | Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel |
Cryptanalysis of the Tractable Rational Map Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings, pp. 258-274, 2005, Springer, 3-540-24454-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Tractable Rational Map Cryptosystem, XL, Gröbner Bases, Isomorphism of Polynomials, Public Key Cryptography, Polynomial Systems |
42 | Yuliang Zheng 0001 |
Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings, pp. 48-63, 2001, Springer, 3-540-41658-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
High Order Residues, RSA, Signature, Public Key Encryption, Signcryption |
42 | Anton Joha, Marijn Janssen |
Comparing strategic intents for public-private partnerships, outsourcing and shared services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
D.GO ![In: Proceedings of the 10th Annual International Conference on Digital Government Research, Partnerships for Public Innovation, DG.O 2009, Puebla, Mexico, May 17-20, 2009, pp. 283-292, 2009, Digital Government Research Center, 978-1-60558-535-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
decision support, outsourcing, public administration, service provisioning, sourcing, shared services, public-private partnerships |
42 | Jintai Ding, Christopher Wolf, Bo-Yin Yang |
l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 266-281, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Trapdoor, Encryption, Public Key, Signing |
42 | David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar |
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, pp. 279-291, 2003, Springer, 3-540-00324-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
public-key cryptography, factoring, standard model, semantic security |
41 | Meiyang Chen, Yijun Liu |
Research on the Best Time to Intervene into Network Public Opinion for Managers -Based on "Nankai Buick Affair"-. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex (2) ![In: Complex Sciences, First International Conference, Complex 2009, Shanghai, China, February 23-25, 2009. Revised Papers, Part 2, pp. 2300-2308, 2009, Springer, 978-3-642-02468-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Network Public Opinion, The Best Time to Intervene, Skewness, Kurtosis |
41 | W. Andrew Schloss, Dale Stammen |
Ambient media in public spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAME ![In: Proceedings of the 1st ACM Workshop on Semantic Ambient Media Experiences, SAME 2008, Vancouver, British Columbia, Canada, October 31, 2008, pp. 17-20, 2008, ACM, 978-1-60558-314-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
acoustic ecology, public art installations, sonification, auditory displays, computer music, information interfaces |
40 | Peter Muhlberger |
New research on public deliberation and information technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
D.GO ![In: Proceedings of the 10th Annual International Conference on Digital Government Research, Partnerships for Public Innovation, DG.O 2009, Puebla, Mexico, May 17-20, 2009, pp. 351-353, 2009, Digital Government Research Center, 978-1-60558-535-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
public input, collaboration, natural language processing, video, Wikipedia, government, collective intelligence, deliberation, rulemaking |
40 | Jean-Sébastien Coron |
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 14-27, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Akihiro Yamamura |
Public-Key Cryptosystems Using the Modular Group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings, pp. 203-216, 1998, Springer, 3-540-64693-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
39 | Koichiro Akiyama, Yasuhiro Goto, Hideyuki Miyake |
An Algebraic Surface Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 425-442, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Section, Public-key Cryptosystem, Algebraic Surface |
39 | Jintai Ding, Jason E. Gower |
Inoculating Multivariate Schemes Against Differential Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 290-301, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Matsumoto-Imai, plus, cryptography, public key, perturbation, differential, multivariate |
39 | Isamu Teranishi, Kazue Sako |
k-Times Anonymous Authentication with a Constant Proving Cost. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 525-542, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
k-times anonymous authentication, efficiency, public verifiability |
39 | Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih |
Fast Multi-computations with Integer Similarity Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings, pp. 138-153, 2005, Springer, 3-540-24454-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
ElGamal-like public key cryptosystems, binary signed-digit (BSD) representations, sparse forms, multi-computations, multiexponentiations, multi-scalar multiplications |
39 | Sattam S. Al-Riyami, Kenneth G. Paterson |
CBE from CL-PKE: A Generic Construction and Efficient Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings, pp. 398-415, 2005, Springer, 3-540-24454-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Certificateless Public Key Encryption, CL-PKE, Certificate based Encryption, CBE, pairings |
39 | Christian Tobias |
Security Analysis of the MOR Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, pp. 175-186, 2003, Springer, 3-540-00324-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
MOR Cryptosystem, Finite Non Abelian Groups, Cryptanalysis, Public Key Cryptosystem, Conjugacy Problem |
39 | Adrian von Bidder, Nathalie Weiler |
Key Exchange (KX) - A Next Generation Protocol to Synchronise PGP Keyservers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), Infrastructure for Collaborative Enterprises, 9-11 June 2003, Linz, Austria, pp. 249-254, 2003, IEEE Computer Society, 0-7695-1963-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Secure Synchronisation Protocol, E-Mail Security, OpenPGP, Keyserver |
39 | Roger Segelken |
A Case History of a Computer Media Event - Introducing a Supercomputer Center. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGDOC ![In: Proceedings of the Fourth International Conference on Systems Documentation, SIGDOC 1985, Ithaca, NY, USA, June 18-21, 1985, pp. 146-160, 1985, ACM, 0-89791-186-5. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
39 | Sonia Gantman Vilvovsky, Jane Fedorowicz |
IT outsourcing in interagency collaborations: lessons from public safety networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 11th Annual International Conference on Digital Government Research, Public Administration Online: Challenges and Opportunities, DG.O 2010, Puebla, Mexico, May 17-20, 2010, pp. 235-236, 2010, Digital Government Research Center, 978-1-4503-0070-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
contracting out, interorganizational collaboration, public IT outsourcing, public safety networks |
39 | Yumiko Kinoshita |
Analysis of Macro-micro Simulation Models for Service-Oriented Public Platform: Coordination of Networked Services and Measurement of Public Values. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E ![In: Software Services for e-Business and e-Society, 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009, Nancy, France, September 23-25, 2009. Proceedings, pp. 328-340, 2009, Springer, 978-3-642-04279-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Macro-micro simulation models, linkage aggregate variables, service-oriented public infrastructure, public value, e-Gov |
38 | Paula E. Stephan |
Robert K. Merton's perspective on priority and the provision of the public good knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Scientometrics ![In: Scientometrics 60(1), pp. 81-87, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
37 | Euripidis N. Loukis |
An Ontology for G2G Collaboration in Public Policy Making, Implementation and Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Law ![In: Artif. Intell. Law 15(1), pp. 19-48, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
G2G (Government-to-Government) e-Government, G2G (Government-to-Government) Collaboration, ontology, semantic web, public policy |
37 | Eun-Jun Yoon, Kee-Young Yoo |
Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (3) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, Third International Conference on Intelligent Computing, ICIC 2007, Qingdao, China, August 21-24, 2007. Proceedings, pp. 1103-1109, 2007, Springer, 978-3-540-74281-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Public key substitution attack, Cryptanalysis, Non-repudiation, Key authentication |
37 | Wenliang Du, Ronghua Wang, Peng Ning |
An efficient scheme for authenticating public keys in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2005, Urbana-Champaign, IL, USA, May 25-27, 2005, pp. 58-67, 2005, ACM, 1-59593-004-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
deployment knowledge, wireless sensor networks, public key, merkle tree |
37 | Anne M. Turner, Elizabeth D. Liddy, Jana Bradley |
Breathing life into digital archives: use of natural language processing to revitalize the grey literature of public health. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCDL ![In: ACM/IEEE Joint Conference on Digital Libraries, JCDL 2002, Portland, Oregon, USA, June 14-18, 2002, Proceedings, pp. 411, 2002, ACM, 1-58113-513-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
digital libraries, natural language processing, digital archives, public health |
36 | Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval |
Distributed Public-Key Cryptography from Weak Secrets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 139-159, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Yevgeniy Dodis, Nelly Fazio |
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, pp. 100-115, 2003, Springer, 3-540-00324-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Wen-Guey Tzeng, Zhi-Jia Tzeng |
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings, pp. 207-224, 2001, Springer, 3-540-41658-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
revocation, broadcast encryption, traitor tracing |
36 | Ivan Damgård, Mads Jurik |
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings, pp. 119-136, 2001, Springer, 3-540-41658-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
36 | Eiichiro Fujisaki, Tatsuaki Okamoto |
How to Enhance the Security of Public-Key Encryption at Minimum Cost. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 53-68, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Yair Frankel, Moti Yung |
Distributed Public Key Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings, pp. 1-13, 1998, Springer, 3-540-64693-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
36 | Elizabeth Avery Gomez |
Connecting Communities of Need with Public Health: Can SMS Text-Messaging Improve Outreach Communication? ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 128, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
SMS text- messaging, communities of need., culture, mobile technology, emergency response, Public health, public health |
36 | Giovanni Di Crescenzo, Vishal Saraswat |
Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings, pp. 282-296, 2007, Springer, 978-3-540-77025-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Searchable Public-Key Encryption, Quadratic Residuosity, Jacobi Symbol, Public-Key Encryption |
36 | Javier López 0001, Antonio Mana, José A. Montenegro, Juan J. Ortega, José M. Troya |
Towards a Trustful and Flexible Environment for Secure Communications with Public Administrations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGOV ![In: Electronic Government, First International Conference, EGOV 2002, Aix-en-Provence, France, September 2-5, 2002, Proceedings, pp. 211-214, 2002, Springer, 3-540-44121-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Electronic Forms, Public Key Infrastructure, Public Administrations, Secure Communications, Certification Authorities |
36 | Sébastien Kunz-Jacques, Gwenaëlle Martinet, Guillaume Poupard, Jacques Stern |
Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 27-43, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
discrete logarithm, proof of knowledge, Public key cryptanalysis |
36 | Jintai Ding, Dieter Schmidt |
Cryptanalysis of HFEv and Internal Perturbation of HFE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings, pp. 288-301, 2005, Springer, 3-540-24454-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Hidden field equation, internal perturbation, Public-key, multivariable, quadratic polynomials |
36 | Kristian Gjøsteen |
Symmetric Subgroup Membership Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings, pp. 104-119, 2005, Springer, 3-540-24454-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
subgroup membership problem, standard model, public key encryption, hybrid encryption |
36 | Louis Goubin |
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, pp. 199-210, 2003, Springer, 3-540-00324-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards |
36 | Ari Juels, Jorge Guajardo |
RSA Key Generation with Verifiable Randomness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002, Proceedings, pp. 357-374, 2002, Springer, 3-540-43168-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
verifiable randomness, public-key infrastructure, zero knowledge, non-repudiation, certificate authority, key generation |
36 | Marc Joye, Christophe Tymen |
Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings, pp. 353-364, 2001, Springer, 3-540-41658-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
smart-cards, Public-key cryptography, elliptic curves, non-adjacent forms |
36 | Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 |
Encrypted Message Authentication by Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 69-81, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption |
36 | Adam L. Young, Moti Yung |
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 306-314, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Auto-Recoverable Auto-Certifiable Cryptosystems, NIZK, software key escrow, escrow hierarchy, RSA, Public Key, Key Escrow, ElGamal |
36 | Helena Handschuh, Yiannis Tsiounis, Moti Yung |
Decision Oracles are Equivalent to Matching Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 276-289, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Diffie-Hellman variants, randomized reductions, uniform reductions, homomorphic encryption functions (ElGamal, Goldwasser-Micali, Okamoto-Uchiyama, Naccache-Stern), random self-reducibility, universal malleability, public-key encryption, decision problems, matching problems |
36 | Michael W. David, Kouichi Sakurai |
Security Issues for Contactless Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings, pp. 247-252, 1998, Springer, 3-540-64693-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Contactless-card, Standards, Smart-card, Public key, Efficient Implementation |
36 | Michael Gisler, Dieter Spahni |
eGovernment Experiences of the Swiss Federal Institute of Intellectual Property. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 6-8 September 2000, Greenwich, London, UK, pp. 278-284, 2000, IEEE Computer Society, 0-7695-0680-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
eGovernment experiences, public management offices, Swiss public administration, private law, eGovernment transaction, relation based view, intellectual property, government data processing, eBusiness, New Public Management |
36 | Guillaume Barbu, Alberto Battistello, Guillaume Dabosville, Christophe Giraud 0001, Guénaël Renault, Soline Renner, Rina Zeitoun |
Combined Attack on CRT-RSA - Why Public Verification Must Not Be Public? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings, pp. 198-215, 2013, Springer, 978-3-642-36361-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
36 | Michael Kaschesky, Reinhard Riedl |
Top-level decisions through public deliberation on the internet: evidence from the evolution of Java governance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
D.GO ![In: Proceedings of the 10th Annual International Conference on Digital Government Research, Partnerships for Public Innovation, DG.O 2009, Puebla, Mexico, May 17-20, 2009, pp. 42-55, 2009, Digital Government Research Center, 978-1-60558-535-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
public consultation, e-government, innovation, government, participation, public administration, politics, policy making |
35 | L. J. Lapro |
Design Issues for Individual Online Public Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 6-8 September 2000, Greenwich, London, UK, pp. 335-339, 2000, IEEE Computer Society, 0-7695-0680-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
public orientated government service, individual online public service design issues, integration, fragmentation, public administration |
35 | Kouichi Sakurai, Tsuyoshi Takagi |
On the Security of a Modified Paillier Public-Key Primitive. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 436-448, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
One-wayness, Composite residuosity problem, Paillier cryptosystem, Factoring, Key distribution, Chosen ciphertext attack |
34 | Sungyoung Yoon, Jonghoon Seo, Joonyoung Yoon, Seungchul Shin, Tack-Don Han |
A Usability Evaluation of Public Icon Interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (1) ![In: Human-Computer Interaction. New Trends, 13th International Conference, HCI International 2009, San Diego, CA, USA, July 19-24, 2009, Proceedings, Part I, pp. 540-546, 2009, Springer, 978-3-642-02573-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Public icon, color-based image code, image code, barcode, pictogram |
34 | Matthias Finke, Anthony Tang 0001, Rock Leung, Michael Blackstock |
Lessons learned: game design for large public displays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMEA ![In: Proceedings of the Third International Conference on Digital Interactive Media in Entertainment and Arts, DIMEA 2008, 10-12 September 2008, Athens, Greece, pp. 26-33, 2008, ACM, 978-1-60558-248-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
interactive large public displays, personal devices, shared entertainment, user study, gaming, short messages services (SMS), cell phones |
34 | Xiang Cao, Michael Massimi, Ravin Balakrishnan |
Flashlight jigsaw: an exploratory study of an ad-hoc multi-player game on public displays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCW ![In: Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, CSCW 2008, San Diego, CA, USA, November 8-12, 2008, pp. 77-86, 2008, ACM, 978-1-60558-007-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
flashlight display, games, public display, exploratory study |
34 | Wei-Chuen Yau, Swee-Huay Heng, Bok-Min Goi |
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 100-105, 2008, Springer, 978-3-540-69294-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
off-line keyword guessing attack, privacy, public key encryption, database security, Searching on encrypted data |
34 | Loo Geok Pee, Atreyi Kankanhalli |
Understanding the drivers, enablers, and performance of knowledge management in public organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, ICEGOV 2008, Cairo, Egypt, December 1-4, 2008, pp. 439-466, 2008, ACM, 978-1-60558-386-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
KM drivers, KM enablers, public sector performance, knowledge management |
34 | Akio Shinohara, Junji Tomita, Tamio Kihara, Shinya Nakajima, Katsuhiko Ogawa |
A Huge Screen Interactive Public Media System: Mirai-Tube. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (2) ![In: Human-Computer Interaction. Interaction Platforms and Techniques, 12th International Conference, HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part II, pp. 936-945, 2007, Springer, 978-3-540-73106-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
interactive advertising, subtle interaction, pattern recognition, ambient displays, interactive public displays |
34 | Sarah Guth |
Wikis in education: : is public better? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. Sym. Wikis ![In: Proceedings of the 2007 International Symposium on Wikis, 2007, Montreal, Quebec, Canada, October 21-25, 2007, pp. 61-68, 2007, ACM, 978-1-59593-861-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
blended course development, collective authoring, public wiki |
34 | María Isabel González Vasco, Dennis Hofheinz, Consuelo Martínez, Rainer Steinwandt |
On the Security of Two Public Key Cryptosystems Using Non-Abelian Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 32(1-3), pp. 207-216, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
logarithmic signatures, public key encryption, word problem, non-abelian groups |
34 | Marc Eaddy, Gábor Blaskó, Jason S. Babcock, Steven Feiner |
My Own Private Kiosk: Privacy-Preserving Public Displays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISWC ![In: 8th International Symposium on Wearable Computers (ISWC 2004), 31 October - 3 November 2004, Arlington, VA, USA, pp. 132-135, 2004, IEEE Computer Society, 0-7695-2186-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
gaze steering, audio augmented reality, privacy, eye tracking, public display, gaze-contingent |
34 | Siguna Müller, Winfried B. Müller |
The Security of Public Key Cryptosystems Based on Integer Factorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings, pp. 9-23, 1998, Springer, 3-540-64732-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
factorization problem, Dickson cryptosystem, LUC cryptosystem, Williams cryptosystem, ElGamal cryptosystem, secure keys, cryptanalysis, Public-key cryptography, RSA cryptosystem, discrete logarithm problem |
34 | Alexandra Boldyreva, Marc Fischlin, Adriana Palacio, Bogdan Warinschi |
A Closer Look at PKI: Security and Efficiency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 458-475, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Eike Kiltz |
Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 282-297, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao 0001 |
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 43-60, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Designated Confirmer Signature, Digital Signature, Fair Exchange |
34 | Craig Gentry, Zulfikar Ramzan |
Identity-Based Aggregate Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 257-273, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Liqun Chen 0002, John Malone-Lee |
Improved Identity-Based Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings, pp. 362-379, 2005, Springer, 3-540-24454-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Yuji Watanabe, Hideki Imai |
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 290-305, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
33 | Alvaro Graves |
Integrating and publishing public safety data using semantic technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 11th Annual International Conference on Digital Government Research, Public Administration Online: Challenges and Opportunities, DG.O 2010, Puebla, Mexico, May 17-20, 2010, pp. 193-199, 2010, Digital Government Research Center, 978-1-4503-0070-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
visualization, data integration, semantic technologies, local government, public safety, crime |
33 | Batya Friedman, Alan Borning, Janet Davis, Brian T. Gill, Peter H. Kahn Jr., Travis Kriplean, Peyina Lin |
Laying the foundations for public participation and value advocacy: interaction design for a large scale urban simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 9th Annual International Conference on Digital Government Research, Partnerships for Public Innovation, DG.O 2008, Montreal, Canada, May 18-21, 2008, pp. 305-314, 2008, Digital Government Research Center, 978-1-60558-099-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
democratization, direct and indirect stakeholders, legitimation, urban development, value advocacy, simulation, participatory design, conflict, bias, value sensitive design, public participation, human values |
33 | Stephen Purpura, Claire Cardie, Jesse Simons |
Active learning for e-rulemaking: public comment categorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 9th Annual International Conference on Digital Government Research, Partnerships for Public Innovation, DG.O 2008, Montreal, Canada, May 18-21, 2008, pp. 234-243, 2008, Digital Government Research Center, 978-1-60558-099-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
machine learning, active learning, text categorization, e-rulemaking, public comment |
33 | Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai |
Parallel Key-Insulated Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 105-122, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Philip D. MacKenzie |
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, pp. 47-61, 2003, Springer, 3-540-00324-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Adrian Antipa, Daniel R. L. Brown, Alfred Menezes, René Struik, Scott A. Vanstone |
Validation of Elliptic Curve Public Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, pp. 211-223, 2003, Springer, 3-540-00324-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 35133 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|