The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Alice with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1977 (16) 1978-1981 (20) 1982-1984 (17) 1985-1986 (16) 1987-1988 (31) 1989-1990 (22) 1991 (18) 1992 (17) 1993 (20) 1994 (17) 1995 (21) 1996 (26) 1997 (33) 1998 (34) 1999 (35) 2000 (44) 2001 (54) 2002 (67) 2003 (57) 2004 (88) 2005 (103) 2006 (101) 2007 (110) 2008 (109) 2009 (131) 2010 (131) 2011 (133) 2012 (160) 2013 (192) 2014 (166) 2015 (195) 2016 (185) 2017 (203) 2018 (226) 2019 (319) 2020 (358) 2021 (400) 2022 (405) 2023 (425) 2024 (86)
Publication types (Num. hits)
article(2249) book(6) data(3) incollection(24) inproceedings(2437) phdthesis(52) proceedings(20)
Venues (Conferences, Journals, ...)
CoRR(507) Sensors(48) NeuroImage(42) SIGCSE(38) EMBC(36) Remote. Sens.(36) DAC(35) IACR Cryptol. ePrint Arch.(35) Bioinform.(34) CogSci(31) INTERSPEECH(28) PLoS Comput. Biol.(27) CHI(26) IGARSS(25) Nucleic Acids Res.(24) CRYPTO(23) More (+10 of total 1738)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 669 occurrences of 482 keywords

Results
Found 5904 publication records. Showing 4791 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
33Christian Cachin On the Foundations of Oblivious Transfer. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Rényi Entropy, Statistical Security, Cryptographic Protocols, Oblivious Transfer, Multiparty Computation, Shannon Entropy
33David P. Jablon Extended Password Key Exchange Protocols Immune to Dictionary Attacks. Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF extended password key exchange protocols, stored password-verifier, Simple Password Exponential Key Exchange, intranet use, Internet, Internet, authentication, dictionary attack
33László Babai, Peter G. Kimmel Randomized Simultaneous Messages: Solution of a Problem of Yao in Communication Complexity. Search on Bibsonomy CCC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF randomized simultaneous messages, two-player communication model, deterministic SM complexity, quadratic reduction, lower bound proof, computational complexity, communication complexity, linear algebra
33Gilles Brassard, Louis Salvail Secret-Key Reconciliation by Public Discussion. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
33Chao-Huang Chang, Gilbert K. Krulee Resolution of ambiguity in Chinese and its application to machine translation. Search on Bibsonomy Mach. Transl. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF ambiguity typology, serial verb construction, predication ambiguity, semantic functional grammar, disambiguation, Chinese
33Gerrit Bleumer, Birgit Pfitzmann, Michael Waidner A Remark on a Signature Scheme Where Forgery Can Be Proved. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
33Marc Girault Hash-Functions Using Modulo-N Operations. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
33Gilles Brassard, Claude Crépeau, Jean-Marc Robert 0001 All-or-Nothing Disclosure of Secrets. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
33Gilles Brassard, Claude Crépeau Zero-Knowledge Simulation of Boolean Circuits. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
33Sergiu Weisz, Costin Grigoras, Alice Florenta Suiu, Latchezar Betev, Mihai Carabas, Nicolae Tapus Optimizing large data transfers for the ALICE experiment in Run 3. Search on Bibsonomy RoEduNet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Alice Florenta Suiu, Costin Grigoras, Nicolae Tapus, Latchezar Betev Automatic Data Workflow and Disk Management Tool for the ALICE Experiment. Search on Bibsonomy ICCP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Suin Kim, JinYeong Bak, Alice Oh "Discovering emotion influence patterns in online social network conversations" by Suin Kim, JinYeong Bak, and Alice Oh, with Ching-man Au Yeung as coordinator. Search on Bibsonomy SIGWEB Newsl. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
32Paul A. Gross, Micah S. Herstand, Jordana W. Hodges, Caitlin Kelleher A code reuse interface for non-programmer middle school students. Search on Bibsonomy IUI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF looking glass, non-programmer, storytelling alice, end user, code reuse, middle school
32Sally Fincher, Stephen Cooper, Michael Kölling, Ian Utting ILE-idol. Search on Bibsonomy ITiCSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Alice, Scratch, ILE, Greenfoot
32Debra L. Smarkusky, Sharon A. Toman An interdisciplinary approach in applying fundamental concepts. Search on Bibsonomy SIGITE Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF interdisciplinary course, sibelius, animation, music, flash, alice
32Amy J. Ko, Brad A. Myers Designing the whyline: a debugging interface for asking questions about program behavior. Search on Bibsonomy CHI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF debugging, program slicing, Alice
32Myungsook Klassen Another approach to teaching programming concept course with object first. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF attrition rate, innovative teaching, programming concepts, object oriented programming, problem solving, Alice, 3D animation, logical reasoning
32Mark Ginsburg The catacomb project: building a user-centered portal the conversational way. Search on Bibsonomy WIDM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF conversational portal, portal design, query routing, ALICE
30Ikpeme Erete, Vinod Yegneswaran, Phillip A. Porras ALICE@home: Distributed Framework for Detecting Malicious Sites. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Paul M. Mullins, Michael Conlon Engaging students in programming fundamentals using alice 2.0. Search on Bibsonomy SIGITE Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF it curricula, nifty assignments, programming fundamentals
30James Caristi, Stephen Cooper, Judy Mullins Alice Frenzy: an interactive group activity. Search on Bibsonomy SIGCSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF human-computer interaction, computer science education, objects
30Johan Alme, Matthias Richter, D. Larsen, Dieter Röhrich, K. Ullaland, K. Roed, S. Bablok, Ralf Keidel, Ch. Kofler, T. Krawutschke, T. Alt, D. Gottschalk, H. Hobbel, V. Kiworra, Volker Lindenstruth, M. R. Stockmeier, U. Frankenfeld, R. Campagnolo, C. Engster, C. Gonzalez Gutierrez, A. Junique, B. Mota, L. Musa A Distributed, Heterogeneous Control System for the ALICE TPC Electronics. Search on Bibsonomy ICPP Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Håvard Helstrup, J. Lien, Volker Lindenstruth, Dieter Röhrich, B. Skaali, Timm M. Steinbeck, K. Ullaland, Anders Strand Vestbø, Arne Wiebalck High Level Trigger System for the LHC ALICE Experiment. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Nicholas W. Landry, Maxime Lucas, Iacopo Iacopini, Giovanni Petri, Alice Schwarze, Alice Patania, Leo Torres 0003 XGI: A Python package for higher-order interaction networks. Search on Bibsonomy J. Open Source Softw. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Alice Ziegler, Hanna Meyer, Insa Otte, Marcell K. Peters, Tim Appelhans, Christina Behler, Katrin Böhning-Gaese, Alice Classen, Florian Detsch, Jürgen Deckert, Connal Eardley, Stefan W. Ferger, Markus Fischer, Friederike Gebert, Michael Haas, Maria Helbig-Bonitz, Andreas Hemp, Claudia Hemp, Victor Kakengi, Antonia V. Mayr, Christine Ngereza, Christoph Reudenbach, Juliane Röder, Gemma Rutten, David Schellenberger Costa, Matthias Schleuning, Axel Ssymank, Ingolf Steffan-Dewenter, Joseph Tardanico, Marco Tschapka, Maximilian G. R. Vollstädt, Stephan Wöllauer, Jie Zhang, Roland Brandl, Thomas Nauss Potential of Airborne LiDAR Derived Vegetation Structure for the Prediction of Animal Species Richness at Mount Kilimanjaro. Search on Bibsonomy Remote. Sens. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Alessia Silvia Ivani, Alice Giubergia, Laura Santos, Alice Geminiani, Silvia Annunziata, Arianna Caglio, Ivana Olivieri, Alessandra Pedrocchi A gesture recognition algorithm in a robot therapy for ASD children. Search on Bibsonomy Biomed. Signal Process. Control. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Alice Berthier, Alice Yalaoui, Hicham Chehade, Farouk Yalaoui, Lionel Amodeo, Christian Bouillot Unrelated parallel machines scheduling with dependent setup times in textile industry. Search on Bibsonomy Comput. Ind. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Alice Borges, Alice Lima, Kailany Ketulhe, Aleteia Araujo, Maristela Holanda Gender Diversity in the Graduate Program in Computing at the University of Brasilia. Search on Bibsonomy LAWCC@CLEI The full citation details ... 2022 DBLP  BibTeX  RDF
27Maristela Holanda, Alice Lima, Alice Borges, Kailany Ketulhe, Carla Koike, Roberta B. Oliveira, Aletéia P. F. Araújo Computing for girls in elementary school in Brazil: A mapping of literature. Search on Bibsonomy LAWCC@CLEI The full citation details ... 2021 DBLP  BibTeX  RDF
27Alice Berthier, Alice Yalaoui, Hicham Chehade, Farouk Yalaoui, Lionel Amodeo, Christian Bouillot An Unrelated Parallel Machines Rescheduling Problem: An Industrial Case Study. Search on Bibsonomy APMS (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Alice Ravizza, Federico Sternini, Alice Giannini, Filippo Molinari Methods for Preclinical Validation of Software as a Medical Device. Search on Bibsonomy HEALTHINF The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Maristela Holanda, Alice Lima, Alice Borges, Kailany Ketulhe, Aletéia P. F. Araújo, Carla Koike Iniciativas Educacionais para Permanência das Mulheres em Cursos de Graduação em Computação no Brasil (Educational Initiatives for Women's Permanence in Undergraduate Computing Courses in Brazil). Search on Bibsonomy LAWCC@CLEI The full citation details ... 2020 DBLP  BibTeX  RDF
27Federica Pallavicini, Silvia Serino, Pietro Cipresso, Elisa Pedroli, Irene Alice Chicchi Giglioli, Alice Chirico, Gian Mauro Manzoni, Gianluca Castelnuovo, Enrico Molinari, Giuseppe Riva 0001 Testing Augmented Reality for Cue Exposure in Obese Patients: An Exploratory Study. Search on Bibsonomy Cyberpsychology Behav. Soc. Netw. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Irene Alice Chicchi Giglioli, Alice Chirico, Pietro Cipresso, Silvia Serino, Elisa Pedroli, Federica Pallavicini, Giuseppe Riva 0001 Feeling Ghost Food as Real One: Psychometric Assessment of Presence Engagement Exposing to Food in Augmented Reality. Search on Bibsonomy MindCare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Rahul Jain 0001, Jaikumar Radhakrishnan, Pranab Sen A property of quantum relative entropy with an application to privacy in quantum communication. Search on Bibsonomy J. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF quantum communication complexity, Privacy, quantum information theory
22Omar Hasan, Lionel Brunie, Jean-Marc Pierson, Elisa Bertino L'Elimination de la subjectivité dans la recommandation de confiance. Search on Bibsonomy UbiMob The full citation details ... 2009 DBLP  DOI  BibTeX  RDF social networks, trust, ubiquitous environments, subjectivity
22Nagaraja Kaushik Gampa, Rohit Ashok Khot, Kannan Srinathan Let Only the Right One IN: Privacy Management Scheme for Social Network. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Privacy over social networks, preference based authentication, friend verification, challenge response schemes
22Julien Degorre, Marc Kaplan, Sophie Laplante, Jérémie Roland The Communication Complexity of Non-signaling Distributions. Search on Bibsonomy MFCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Gérald Gavin, Marine Minier Oblivious Multi-variate Polynomial Evaluation. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Homomorphic encryption schemes, Oblivious Polynomial Evaluation (OPE), semantic security
22Lihua Liu, Zhengjun Cao Security Analysis of One Verifiable Encryption Scheme. Search on Bibsonomy Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Eric Goles Ch., Cedric Little, Ivan Rapaport Understanding a Non-trivial Cellular Automaton by Finding Its Simplest Underlying Communication Protocol. Search on Bibsonomy ISAAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Benoît Libert, Damien Vergnaud Multi-use unidirectional proxy re-signatures. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multi-use proxy re-cryptography, unidirectionality, digital signatures
22Andreas Jakoby, Maciej Liskiewicz, Aleksander Madry Susceptible Two-Party Quantum Computations. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Hui Zhang 0002, Abhishek B. Sharma, Haifeng Chen, Guofei Jiang, Xiaoqiao Meng, Kenji Yoshihira Enabling Information Confidentiality in Publish/Subscribe Overlay Services. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Elaine Shi, Brent Waters Delegating Capabilities in Predicate Encryption Systems. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22N. R. Sunitha, B. B. Amberker Proxy Re-signature Schemes. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Signature conversion, Proxy re-signature, Proxy revocation, Proxy key, Proxy Signature
22Benoît Libert, Damien Vergnaud Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF unidirectionality, standard model, chosen-ciphertext security, proxy re-encryption
22Harry Buhrman, Michal Koucký 0001, Nikolai K. Vereshchagin Randomised Individual Communication Complexity. Search on Bibsonomy CCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF individual communication complexity, Kolmogorov complexity, rounds, randomized protocols
22Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew K. Franklin Secure Linear Algebra Using Linearly Recurrent Sequences. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secure Linear Algebra, Linearly Recurrent Sequences, Wiedemann’s Algorithm
22Matthias Christandl, Artur Ekert, Michal Horodecki, Pawel Horodecki, Jonathan Oppenheim, Renato Renner Unifying Classical and Quantum Key Distillation. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Rich Cosgriff Jr., Lori L. Monk, Mary Elizabeth Jones Wild Things. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Yao-Hsin Chou, I-Ming Tsai, Chin-Shyurng Fahn, Shi-Jinn Horng, Sy-Yen Kuo Dependabilities in a High-performance Quantum Real-time Distributed System. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Wei Yang 0011, Liusheng Huang, Yifei Yao, Zhili Chen Quantum Oblivious Transfer Using Tripartite Entangled States. Search on Bibsonomy FGCN (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao An Efficient Certified Email Protocol. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Certified Email Protocol, D Optimistic Fair Exchange Protocol, Fair Exchange Protocol
22Tijn Kooijmans, Matthias Rauterberg Cultural Computing and the Self Concept: Towards Unconscious Metamorphosis. Search on Bibsonomy ICEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF unconscious, selfconcept, interactive experience, cultural computing
22Dalia Khader Public Key Encryption with Keyword Search Based on K-Resilient IBE. Search on Bibsonomy ICCSA (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Stanislaw Jarecki, Jihye Kim, Gene Tsudik Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Michele Banko, Oren Etzioni Strategies for lifelong knowledge extraction from the web. Search on Bibsonomy K-CAP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF machine reading, lifelong learning
22Piotr Indyk, David P. Woodruff Polylogarithmic Private Approximations and Efficient Matching. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Dalia Khader Public Key Encryption with Keyword Search Based on K-Resilient IBE. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Aggelos Kiayias, Antonina Mitrofanova Testing Disjointness of Private Datasets. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Keith B. Frikken, Mikhail J. Atallah Achieving Fairness in Private Contract Negotiation. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar An Improved Secure Two-Party Computation Protocol. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Anshuman Singh, Siddharth Barman, Kaushal K. Shukla Secure Two-Party Context Free Language Recognition. Search on Bibsonomy ICDCIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Breno de Medeiros Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Rahul Jain 0001, Jaikumar Radhakrishnan, Pranab Sen Prior Entanglement, Message Compression and Privacy in Quantum Communication. Search on Bibsonomy CCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Zhide Chen, Hong Zhu 0004 Quantum m-out-of-n oblivious transfer. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Ivan Damgård, Thomas Pedersen, Louis Salvail On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Stefan Dziembowski, Ueli M. Maurer On Generating the Initial Key in the Bounded-Storage Model. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Vladimir Estivill-Castro Private Representative-Based Clustering for Vertically Partitioned Data. Search on Bibsonomy ENC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Jordi Castellà-Roca, Josep Domingo-Ferrer A Non-Repudiable Bitstring Commitment Scheme Based on a Public-Key Cryptosystem. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Bit commitment, Mental poker
22Zhide Chen, Hong Zhu 0004 General Public Key m-Out-of-n Oblivious Transfer. Search on Bibsonomy CIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF public key system, secure protocol, oblivious transfer
22John Marchesini, Sean W. Smith, Omen Wild, Joshua Stabiner, Alex Barsamian Open-Source Applications of TCPA Hardware. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Joseph Y. Halpern, Vicky Weissman Using First-Order Logic to Reason about Policies. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Keith B. Frikken, Mikhail J. Atallah Privacy preserving electronic surveillance. Search on Bibsonomy WPES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF privacy, security protocols, surveillance
22Geraint Price Client v. Server Side Protocols, Interfaces and Storage (Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Michael O. Rabin Hyper Encryption and Everlasting Secrets. Search on Bibsonomy CIAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Carlos Eisenberg, Boi Faltings, Lars Leistam A multiagent-system for integrating a large-scale project. Search on Bibsonomy AAMAS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF ontology, local search, project scheduling, distributed constraint satisfaction
22Jörg Rothe Kryptographische Protokolle und Null-Information. Search on Bibsonomy Inform. Spektrum The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Public-Key-Kryptosysteme, Protokolle für Schlüsseltausch und digitale Signaturen, Einwegfunktionen, Zero-Knowledge-Protokolle, interaktive Beweissysteme
22Radu Sion Power: A Metric for Evaluating Watermarking Algorithms. Search on Bibsonomy ITCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Watermarking Model, Information Hiding Metrics, Watermarking Algorithms
22Yan-Cheng Chang, Chi-Jen Lu Oblivious Polynomial Evaluation and Oblivious Neural Learning. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
22Valeri Korjik, Guillermo Morales-Luna, Vladimir B. Balakirsky Privacy Amplification Theorem for Noisy Main Channel. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Key-sharing, Rènyi information, error correcting codes, hashing, privacy amplification
22Ron Steinfeld, Laurence Bull, Yuliang Zheng 0001 Content Extraction Signatures. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF fragment-extraction, content blinding, fact verification, content verification, digital signatures, provable security, Content-extraction
22Wanda P. Dann, Stephen Cooper, Randy Pausch Making the connection: programming with animated small world. Search on Bibsonomy ITiCSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
22Yevgeniy Dodis, Shai Halevi, Tal Rabin A Cryptographic Solution to a Game Theoretic Problem. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
22Tomas Sander, Adam L. Young, Moti Yung Non-Interactive CryptoComputing For NC1. Search on Bibsonomy FOCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF cryptocomputing, cryptography, public key, complexity theory, homomorphic encryption, secure computation
22Amos Beimel, Tal Malkin, Silvio Micali The All-or-Nothing Nature of Two-Party Secure Computation. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
22Ueli M. Maurer, Stefan Wolf 0001 Privacy Amplification Secure Against Active Adversaries. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Unconditional secrecy, Information theory, Extractors, Privacy amplification, Authentication codes, Secret-key agreement
22Ueli M. Maurer, Stefan Wolf 0001 Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Cryptography, Information theory, Unconditional security, Secret key agreement
22Donald Beaver Equivocable Oblivious Transfer. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
22Claude Crépeau, Jeroen van de Graaf, Alain Tapp Committed Oblivious Transfer and Private Multi-Party Computation. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
22Donald Beaver Precomputing Oblivious Transfer. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
22Charles H. Bennett, Gilles Brassard, Claude Crépeau, Marie-Hélène Skubiszewska Practical Quantum Oblivious Transfer. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
22Yvo Desmedt Abuses in Cryptography and How to Fight Them. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
22Josh Cohen Benaloh Cryptographic Capsules: A Disjunctive Primative for Interactive Protocols. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
22Charles H. Bennett, Gilles Brassard, Jean-Marc Robert 0001 How to Reduce Your Enemy's Information (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
22Ian W. Moor An Applicative Compiler for a Parallel Machine. Search on Bibsonomy SIGPLAN Symposium on Compiler Construction The full citation details ... 1982 DBLP  DOI  BibTeX  RDF HOPE
21Mark K. Gardner, Wu-chun Feng Broadening accessibility to computer science for K-12 education. Search on Bibsonomy ITiCSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF live CD, storytelling alice, K-12, virtual computing
21Youwen Ouyang, Ursula Wolz, Susan H. Rodger Effective delivery of computing curriculum in middle school: challenges and solutions. Search on Bibsonomy SIGCSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF computing foundations, alice, scratch, middle school
21Stephen Cooper, Wanda P. Dann, John Harrison A k-12 college partnership. Search on Bibsonomy SIGCSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF object-oriented, programming, program visualization, alice, k-12
Displaying result #101 - #200 of 4791 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license