The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase three-party (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1987-2002 (17) 2003-2004 (15) 2005-2006 (26) 2007-2008 (33) 2009 (19) 2010 (16) 2011-2012 (30) 2013 (30) 2014 (19) 2015 (19) 2016 (15) 2017 (18) 2018-2019 (34) 2020-2021 (24) 2022 (20) 2023 (21) 2024 (4)
Publication types (Num. hits)
article(223) incollection(1) inproceedings(136)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 78 occurrences of 51 keywords

Results
Found 360 publication records. Showing 360 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
59Weijia Wang, Lei Hu Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF password, key distribution, authenticated key exchange, multi-party protocol
55Eun-Jun Yoon, Kee-Young Yoo Token-Based Authenticated Key Establishment Protocols for Three-Party Communication. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Three-party, Authentication, Cryptography, Password, Key agreement, Token
55Juan A. Garay, Markus Jakobsson, Philip D. MacKenzie Abuse-Free Optimistic Contract Signing. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
53Shuhua Wu, Yuefei Zhu Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting. Search on Bibsonomy NPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF three-party, password, forward-secure
46Tzonelih Hwang, Kuo-Chang Lee, Chuan-Ming Li Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF three-party key distribution protocol, provable security, Quantum cryptography
45Michel Abdalla, Pierre-Alain Fouque, David Pointcheval Password-Based Authenticated Key Exchange in the Three-Party Setting. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Password, key distribution, authenticated key exchange, multi-party protocols
40Jin Wook Byun, Dong Hoon Lee 0001 N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
39Raphael C.-W. Phan, Wei-Chuen Yau, Bok-Min Goi Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF three-party, cryptanalysis, provable security, attacks, Weil pairing, Password-authenticated key exchange, key compromise impersonation
39Hui-Feng Huang, Yi-Jia Chang, Kuo-Ching Liu An Efficient Three Party Authenticated Key Exchange for Mobile Communications. Search on Bibsonomy ISPAN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Three-party key exchange, Elliptic curve cryptography, Password
39Taekyoung Kwon 0002, Dong Hoon Lee 0002 Three-Party Password Authenticated Key Agreement Resistant to Server Compromise. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Yvonne Cliff, Yiu Shing Terry Tin, Colin Boyd Password Based Server Aided Key Exchange . Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF three-party, Key agreement, password authentication
35TingMao Chang, Yuefei Zhu, Jin Zhou, YaJuan Zhang Universally Composable Three-Party Key Distribution. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee 0001 Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF mobile network security, Cryptography, dictionary attacks, password-authenticated key exchange, round complexity
29Koji Chida, Katsumi Takahashi Privacy Preserving Computations without Public Key Cryptographic Operation. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Kazuki Yoneyama Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract). Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF password-based key exchange, password-based server aided key exchange, leakage of internal states, undetectable on-line dictionary attack
28Youngsook Lee, Junghyun Nam, Dongho Won An Inter-domain Key Agreement Protocol Using Weak Passwords. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authentication, password, Key exchange, public key
28Jian Sun, Holger Regenbrecht Implementing three-party desktop videoconferencing. Search on Bibsonomy OZCHI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF three-way communication, two-camera systems, gaze awareness
27Yosuke Matsusaka, Mika Enomoto, Yasuharu Den Simultaneous prediction of dialog acts and address types in three-party conversations. Search on Bibsonomy ICMI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF dialog act, recognition, gaze, prosody, multi-party interaction
27Ya-Fen Chang, Chin-Chen Chang 0001 Password-authenticated 3PEKE with Round Efficiency without Server's Public Key. Search on Bibsonomy CW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF EKE, 3PEKE, key exchange protocol
27John A. Trono Comments on "Tagged Semaphores". Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
25Hong Tang, Liehuang Zhu, Yuanda Cao, Dazhen Wang A Novel Tree-based Authenticated Dynamic Group Key Agreement Protocol for Wireless Sensor Network. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ellipse curve, bilinear pairing, group key agreement, secure group communication
24Gang Xiao, Kallirroi Georgila A Comparison of Reinforcement Learning Methodologies in Two-Party and Three-Party Negotiation Dialogue. Search on Bibsonomy FLAIRS The full citation details ... 2018 DBLP  BibTeX  RDF
24Ye Wang 0001, Prakash Ishwar, Shantanu Rane Information-theoretically secure three-party computation with One corrupted party. Search on Bibsonomy ISIT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Yoshito Kanamori, Bogdan Hoanca, Seong-Moo Yoo Three-Party Quantum Authenticated Key Distribution with Partially Trusted Third Party. Search on Bibsonomy GLOBECOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Michel Abdalla, David Pointcheval Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Password-based authentication, multi-party protocols, Diffie-Hellman assumptions
23Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger Efficient Optimistic N-Party Contract Signing Protocol. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Stefan Brands, David Chaum Distance-Bounding Protocols (Extended Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
21E. Dongna, Qingfeng Cheng, Chuangui Ma Password Authenticated Key Exchange Based on RSA in the Three-Party Settings. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF e-Residue Attack, RSA, Password Authenticated Key Exchange
21Chin-Chen Chang 0001, Jung-San Lee, Ting-Fang Cheng Security design for three-party encrypted key exchange protocol using smart cards. Search on Bibsonomy ICUIMC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF 3PEKE, off-line password guessing attack, communications, smart cards
21Hung-Yu Chien, Tzong-Chen Wu Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication, key agreement, random oracle, impersonation attack, guessing attack
21Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Hao-Rung Chung, Wei-Chi Ku Three weaknesses in a simple three-party key exchange protocol. Search on Bibsonomy Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Youngsook Lee, Junghyun Nam, Jin Kwak, Dongho Won Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication, agent, Password, key exchange, inter-domain
15Han Wang, Wei Liu 0077, Anfeng Liu, Tian Wang 0001, Houbing Song, Shaobo Zhang 0001 SQCS: A sustainable quality control system for spatial crowdsourcing via three-party evolutionary game: Theory and practice. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Yuqi Zhang, Chunping Tan, Jiayan Zhang Three-Party Evolutionary Game Analysis of IoT Platform Knowledge Hiding Under Organization Participation from the Perspective of Stakeholders. Search on Bibsonomy J. Circuits Syst. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Haipeng Zhou, Ruoyang Chen, Changyan Yi, Juan Li 0011, Jun Cai 0001 A Three-Party Repeated Coalition Formation Game for PLS in Wireless Communications with IRSs. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Zhen Tian, Chuchu Jiang, Gangyi Yue Analysis of Digital Security Governance under the Objectives of Digital Ecology: A Three-Party Evolutionary Game Approach. Search on Bibsonomy Complex. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Purva Rewal, Mrityunjay Singh, Dheerendra Mishra, Komal Pursharthi, Ankita Mishra Quantum-safe three-party lattice based authenticated key agreement protocol for mobile devices. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Sina Faraji, Florian Kerschbaum Trifecta: Faster High-Throughput Three-Party Computation over WAN Using Multi-Fan-In Logic Gates. Search on Bibsonomy Proc. Priv. Enhancing Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Dharminder Chaudhary, Uddeshaya Kumar, Kashif Saleem A Construction of Three Party Post Quantum Secure Authenticated Key Exchange Using Ring Learning With Errors and ECC Cryptography. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Jun Furukawa 0001, Yehuda Lindell, Ariel Nof, Or Weinstein High-Throughput Secure Three-Party Computation with an Honest Majority. Search on Bibsonomy J. Cryptol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Bar Alon, Ran Cohen, Eran Omri, Tom Suad On the Power of an Honest Majority in Three-Party Computation Without Broadcast. Search on Bibsonomy J. Cryptol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Songhui Guo, Yunfan Song, Song Guo, Yeming Yang, Shuaichao Song Three-Party Password Authentication and Key Exchange Protocol Based on MLWE. Search on Bibsonomy Symmetry The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Huan Yang, Yajun Guo, Yimin Guo 0001 A puf-based three-party authentication key establishment scheme for fog-enabled smart home. Search on Bibsonomy Pervasive Mob. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Kalluri Rama Krishna, C. V. Guru Rao ETP-AKEP: enhanced three-party authenticated key exchange protocols for data integrity in cloud environments. Search on Bibsonomy J. Control. Decis. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Bar Alon, Amos Beimel, Eran Omri Three Party Secure Computation with Friends and Foes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
15Lennart Braun, Mahak Pancholi, Rahul Rachuri, Mark Simkin 0001 Ramen: Souper Fast Three-Party Computation for RAM Programs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
15Andreas Brüggemann, Oliver Schick, Thomas Schneider 0003, Ajith Suresh, Hossein Yalame Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater (Full Version). Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
15I-Cheng Liu, Tzonelih Hwang, Hsu-Chen Wei Three-party authenticated lightweight quantum key distribution without pre-shared key between participants. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Yi-Piao Hong, Lan Zhou, Wei Zhong, Yu-Bo Sheng Measurement-device-independent three-party quantum secure direct communication. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Li Li, Ri-Gui Zhou, Xiao-Xue Zhang Three-party quantum key agreement protocol based on logical four-particle Cluster state to resist collective noise. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Huimin Ma, Yibing Tang Three-Party Evolutionary Game Analysis of the Government Reward and Punishment in Takeaway Food Safety Quality Regulation Under the Platform Economy. Search on Bibsonomy FSDM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Lennart Braun, Mahak Pancholi, Rahul Rachuri, Mark Simkin 0001 Ramen: Souper Fast Three-Party Computation for RAM Programs. Search on Bibsonomy CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Bar Alon, Amos Beimel, Eran Omri Three Party Secure Computation with Friends and Foes. Search on Bibsonomy TCC (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Sijia Cao, Hanlin Zhang, Yuhang Wang, Jie Lin, Fanyu Kong, Leyun Yu SecureGAN: Secure Three-Party GAN Training. Search on Bibsonomy ICCCN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Uddeshaya Kumar, Yogesh Pal, Perla Sai Nikhil, Manish Garg, M. Ranjith Kumar, Dharminder Chaudhary A Construction of Three Party Post Quantum Secure Authenticated Key Exchange for Mobile Users. Search on Bibsonomy ICCCNT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Lijing Zhou, Ziyu Wang, Hongrui Cui, Qingrui Song, Yu Yu 0001 Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning. Search on Bibsonomy SP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Nan Cheng, Feng Zhang, Aikaterini Mitrokotsa Efficient Three-party Boolean-to-Arithmetic Share Conversion. Search on Bibsonomy PST The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Jörg Schwenk, Douglas Stebila A reduction-based proof for authentication and session key security in three-party Kerberos. Search on Bibsonomy Int. J. Appl. Cryptogr. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Kalluri Rama Krishna, C. V. Guru Rao ETP-AKEP Enhanced Three Party Authenticated Key Exchange Protocols for Data Integrity in Cloud Environments. Search on Bibsonomy Int. J. Inf. Secur. Priv. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Binghui Wu, Jing Yang 0042, Guanhao Fu, Mengjian Zhang The Strategy Selection in Financial Fraud and Audit Supervision: A Study Based on a Three-Party Evolutionary Game Model. Search on Bibsonomy Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Mukul Majhi, Arup Kumar Pal, Jitesh Pradhan, SK Hafizul Islam, Muhammad Khurram Khan Computational intelligence based secure three-party CBIR scheme for medical data for cloud-assisted healthcare applications. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Fuxing Li, Yingjie Wang 0002, Yang Gao 0028, Xiangrong Tong, Nan Jiang 0013, Zhipeng Cai 0001 Three-Party Evolutionary Game Model of Stakeholders in Mobile Crowdsourcing. Search on Bibsonomy IEEE Trans. Comput. Soc. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Vivek Kumar Sinha, Divya Anand, Sandeep Kaur, Pankaj Singh, Irene Delgado Noya Security Verification of Social Network Model Using Improved Three-Party Authenticated Key Exchange Protocol. Search on Bibsonomy Symmetry The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Aobo Jin, Qixin Deng, Zhigang Deng A Live Speech-Driven Avatar-Mediated Three-Party Telepresence System: Design and Evaluation. Search on Bibsonomy Presence Teleoperators Virtual Environ. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Christopher Harth-Kitzerow Communication Efficient Semi-Honest Three-Party Secure Multiparty Computation with an Honest Majority. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Lijing Zhou, Ziyu Wang, Hongrui Cui, Qingrui Song, Yu Yu 0001 Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Jui-Ying Wang, Sho Kubota, Tomoo Inoue Effects of Meal Similarity on Interpersonal Synchronization in Three-Party Remote Dining. Search on Bibsonomy Frontiers Comput. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Weiming Wei, Chunming Tang, Yucheng Chen Efficient Privacy-Preserving K-Means Clustering from Secret-Sharing-Based Secure Three-Party Computation. Search on Bibsonomy Entropy The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Gilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Katsumi Takahashi, Junichi Tomida Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
15 Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
15Wanqing Wu, Lingna Guo Three-party quantum privacy comparison protocol based on classical-quantum authentication channel. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Gilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Katsumi Takahashi, Junichi Tomida Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters. Search on Bibsonomy CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Andreas Brüggemann, Thomas Schneider 0003, Ajith Suresh, Hossein Yalame Poster: Efficient Three-Party Shuffling Using Precomputation. Search on Bibsonomy CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Yousheng Zhou, Lunhao Li, Mohammad S. Obaidat, Yuanni Liu, Pandi Vijayakumar, Kuei-Fang Hsiao RAKI: A Robust ECC Based Three-party Authentication and Key Agreement Scheme for Medical IoT. Search on Bibsonomy GLOBECOM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Jian-Hong Shi, Lan Zhou, Wei Zhong, Yu-Bo Sheng Measurement-Device-Independent Three-party Quantum Secure Direct Communication Based on Entanglement Swapping. Search on Bibsonomy WCSP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Aobo Jin, Qixin Deng, Zhigang Deng S2M-Net: Speech Driven Three-party Conversational Motion Synthesis Networks. Search on Bibsonomy MIG The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15Yigal Gerchak On the Dissolution of Three-Party Partnerships via a Buy-Sell Mechanism. Search on Bibsonomy GDN The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
15SK Hafizul Islam, Swagatam Basu PB-3PAKA: Password-based three-party authenticated key agreement protocol for mobile devices in post-quantum environments. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Seyed Abdolreza Eftekhari, Morteza Nikooghadam, Masoud Rafighi Security-enhanced three-party pairwise secret key agreement protocol for fog-based vehicular ad-hoc communications. Search on Bibsonomy Veh. Commun. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Jinbo Xiong, Mingfeng Zhao, Md. Zakirul Alam Bhuiyan, Lei Chen 0029, Youliang Tian An AI-Enabled Three-Party Game Framework for Guaranteed Data Privacy in Mobile Edge Crowdsensing of IoT. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Arpita Patra, Divya Ravi On the Exact Round Complexity of Secure Three-Party Computation. Search on Bibsonomy J. Cryptol. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Iftach Haitner, Eliad Tsfadia An Almost-Optimally Fair Three-Party Coin-Flipping Protocol. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
15Jie Ma, Bin Qi, Kewei Lv Three-Party Integer Comparison and Applications. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
15Chien-Ming Wang, Chih-Hung Wang A highly secure three-party authentication key exchange protocol and its application in e-business communication with ECK model. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Ri-Gui Zhou, Xiaoxue Zhang, Fengxin Li Three-party semi-quantum protocol for deterministic secure quantum dialogue based on GHZ states. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Marcin Wlodarczak, Emer Gilmartin Speaker Transition Patterns in Three-Party Conversation: Evidence from English, Estonian and Swedish. Search on Bibsonomy Interspeech The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Carlos Toshinori Ishi, Taiken Shintani Analysis of Eye Gaze Reasons and Gaze Aversions During Three-Party Conversations. Search on Bibsonomy Interspeech The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Jie Ma, Bin Qi, Kewei Lv Three-Party Integer Comparison and Applications. Search on Bibsonomy IPCCC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Zhihui Wang 0005, Peng Sun, Nana Luo, Benzhen Guo A Three-Party Mutual Authentication Protocol for Wearable IOT Health Monitoring System. Search on Bibsonomy SmartIoT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
15Muhammad Faizan Ayub, Muhammad Asad Saleem, Izwa Altaf, Khalid Mahmood 0002, Saru Kumari Fuzzy extraction and PUF based three party authentication protocol using USB as mass storage device. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Yilong Zheng, Shunfang Hu, Liangxiong Wei, Yanru Chen, Hao Wang 0034, Yanbing Yang, Yang Li, Bingjie Xu, Wei Huang 0002, Liangyin Chen Design and Analysis of a Security-Enhanced Three-Party Authenticated Key Agreement Protocol Based on Chaotic Maps. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Akasha Shafiq, Muhammad Faizan Ayub, Khalid Mahmood 0002, Mazhar Sadiq, Saru Kumari, Chien-Ming Chen 0001 An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure. Search on Bibsonomy J. Sensors The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Farhan Musanna, Sanjeev Kumar 0001 A novel three party Quantum secret sharing scheme based on Bell state sequential measurements with application in quantum image sharing. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
15Patrick Ah-Fat, Michael Huth 0001 Two and Three-Party Digital Goods Auctions: Scalable Privacy Analysis. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
15Bar Alon, Ran Cohen, Eran Omri, Tom Suad On the Power of an Honest Majority in Three-Party Computation Without Broadcast. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
15Farhan Musanna, Sanjeev Kumar 0001 A novel three-party quantum secret sharing scheme based on Bell state sequential measurements with application in quantum image sharing. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Justine Reverdy, Maria Koutsombogera, Carl Vogel Linguistic Repetition in Three-Party Conversations. Search on Bibsonomy Neural Approaches to Dynamics of Signal Exchanges The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Wataru Fujii, Keiichi Iwamura, Masaki Inamura Secure Comparison and Interval Test Protocols based on Three-party MPC. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Bar Alon, Ran Cohen, Eran Omri, Tom Suad On the Power of an Honest Majority in Three-Party Computation Without Broadcast. Search on Bibsonomy TCC (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 360 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license