|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 669 occurrences of 482 keywords
|
|
|
Results
Found 5904 publication records. Showing 4791 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
33 | Christian Cachin |
On the Foundations of Oblivious Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding, pp. 361-374, 1998, Springer, 3-540-64518-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Rényi Entropy, Statistical Security, Cryptographic Protocols, Oblivious Transfer, Multiparty Computation, Shannon Entropy |
33 | David P. Jablon |
Extended Password Key Exchange Protocols Immune to Dictionary Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 6th Workshop on Enabling Technologies (WET-ICE '97), Infrastructure for Collaborative Enterprises, 18-20 June 1997, MIT, Cambridge, MA, USA, Proceedings, pp. 248-255, 1997, IEEE Computer Society, 0-8186-7967-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
extended password key exchange protocols, stored password-verifier, Simple Password Exponential Key Exchange, intranet use, Internet, Internet, authentication, dictionary attack |
33 | László Babai, Peter G. Kimmel |
Randomized Simultaneous Messages: Solution of a Problem of Yao in Communication Complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCC ![In: Proceedings of the Twelfth Annual IEEE Conference on Computational Complexity, Ulm, Germany, June 24-27, 1997, pp. 239-246, 1997, IEEE Computer Society, 0-8186-7907-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
randomized simultaneous messages, two-player communication model, deterministic SM complexity, quadratic reduction, lower bound proof, computational complexity, communication complexity, linear algebra |
33 | Gilles Brassard, Louis Salvail |
Secret-Key Reconciliation by Public Discussion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings, pp. 410-423, 1993, Springer, 3-540-57600-2. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
33 | Chao-Huang Chang, Gilbert K. Krulee |
Resolution of ambiguity in Chinese and its application to machine translation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mach. Transl. ![In: Mach. Transl. 6(4), pp. 279-315, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
ambiguity typology, serial verb construction, predication ambiguity, semantic functional grammar, disambiguation, Chinese |
33 | Gerrit Bleumer, Birgit Pfitzmann, Michael Waidner |
A Remark on a Signature Scheme Where Forgery Can Be Proved. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings, pp. 441-445, 1990, Springer, 3-540-53587-X. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
33 | Marc Girault |
Hash-Functions Using Modulo-N Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings, pp. 217-226, 1987, Springer, 3-540-19102-X. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
33 | Gilles Brassard, Claude Crépeau, Jean-Marc Robert 0001 |
All-or-Nothing Disclosure of Secrets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings, pp. 234-238, 1986, Springer. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
33 | Gilles Brassard, Claude Crépeau |
Zero-Knowledge Simulation of Boolean Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings, pp. 223-233, 1986, Springer. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
33 | Sergiu Weisz, Costin Grigoras, Alice Florenta Suiu, Latchezar Betev, Mihai Carabas, Nicolae Tapus |
Optimizing large data transfers for the ALICE experiment in Run 3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RoEduNet ![In: 22nd RoEduNet Conference: Networking in Education and Research, RoEduNet 2023, Craiova, Romania, September 21-22, 2023, pp. 1-8, 2023, IEEE, 979-8-3503-9366-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Alice Florenta Suiu, Costin Grigoras, Nicolae Tapus, Latchezar Betev |
Automatic Data Workflow and Disk Management Tool for the ALICE Experiment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCP ![In: 19th IEEE International Conference on Intelligent Computer Communication and Processing, ICCP 2023, Cluj-Napoca, Romania, October 26-28, 2023, pp. 137-143, 2023, IEEE, 979-8-3503-7035-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Suin Kim, JinYeong Bak, Alice Oh |
"Discovering emotion influence patterns in online social network conversations" by Suin Kim, JinYeong Bak, and Alice Oh, with Ching-man Au Yeung as coordinator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGWEB Newsl. ![In: SIGWEB Newsl. 2012(Autumn), pp. 3:1-3:6, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
32 | Paul A. Gross, Micah S. Herstand, Jordana W. Hodges, Caitlin Kelleher |
A code reuse interface for non-programmer middle school students. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IUI ![In: Proceedings of the 15th International Conference on Intelligent User Interfaces, IUI 2010, Hong Kong, China, February 7-10, 2010, pp. 219-228, 2010, ACM, 978-1-60558-515-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
looking glass, non-programmer, storytelling alice, end user, code reuse, middle school |
32 | Sally Fincher, Stephen Cooper, Michael Kölling, Ian Utting |
ILE-idol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 14th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2009, Paris, France, July 6-9, 2009, pp. 4-5, 2009, ACM, 978-1-60558-381-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Alice, Scratch, ILE, Greenfoot |
32 | Debra L. Smarkusky, Sharon A. Toman |
An interdisciplinary approach in applying fundamental concepts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 10th Conference on Information Technology Education, SIGITE 2009, Fairfax, Virginia, USA, October 22-24, 2009, pp. 224-228, 2009, ACM, 978-1-60558-765-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
interdisciplinary course, sibelius, animation, music, flash, alice |
32 | Amy J. Ko, Brad A. Myers |
Designing the whyline: a debugging interface for asking questions about program behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2004 Conference on Human Factors in Computing Systems, CHI 2004, Vienna, Austria, April 24 - 29, 2004, pp. 151-158, 2004, ACM, 1-58113-702-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
debugging, program slicing, Alice |
32 | Myungsook Klassen |
Another approach to teaching programming concept course with object first. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 5th Conference on Information Technology Education, SIGITE 2004, 2004, Salt Lake City, UT, USA, October 28-30, 2004, pp. 277, 2004, ACM, 1-58113-936-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
attrition rate, innovative teaching, programming concepts, object oriented programming, problem solving, Alice, 3D animation, logical reasoning |
32 | Mark Ginsburg |
The catacomb project: building a user-centered portal the conversational way. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WIDM ![In: Fourth ACM CIKM International Workshop on Web Information and Data Management (WIDM 2002), SAIC Headquaters, McLean, Virginia, USA, November 8, 2002, pp. 84-87, 2002, ACM. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
conversational portal, portal design, query routing, ALICE |
30 | Ikpeme Erete, Vinod Yegneswaran, Phillip A. Porras |
ALICE@home: Distributed Framework for Detecting Malicious Sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 362-364, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Paul M. Mullins, Michael Conlon |
Engaging students in programming fundamentals using alice 2.0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 9th Conference on Information Technology Education, SIGITE 2008, Cincinnati, OH, USA, October 16-18, 2008, pp. 81-88, 2008, ACM, 978-1-60558-329-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
it curricula, nifty assignments, programming fundamentals |
30 | James Caristi, Stephen Cooper, Judy Mullins |
Alice Frenzy: an interactive group activity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2007, Covington, Kentucky, USA, March 7-11, 2007, pp. 394, 2007, ACM, 1-59593-361-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
human-computer interaction, computer science education, objects |
30 | Johan Alme, Matthias Richter, D. Larsen, Dieter Röhrich, K. Ullaland, K. Roed, S. Bablok, Ralf Keidel, Ch. Kofler, T. Krawutschke, T. Alt, D. Gottschalk, H. Hobbel, V. Kiworra, Volker Lindenstruth, M. R. Stockmeier, U. Frankenfeld, R. Campagnolo, C. Engster, C. Gonzalez Gutierrez, A. Junique, B. Mota, L. Musa |
A Distributed, Heterogeneous Control System for the ALICE TPC Electronics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: 34th International Conference on Parallel Processing Workshops (ICPP 2005 Workshops), 14-17 June 2005, Oslo, Norway, pp. 265-272, 2005, IEEE Computer Society, 0-7695-2381-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Håvard Helstrup, J. Lien, Volker Lindenstruth, Dieter Röhrich, B. Skaali, Timm M. Steinbeck, K. Ullaland, Anders Strand Vestbø, Arne Wiebalck |
High Level Trigger System for the LHC ALICE Experiment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (1) ![In: Computational Science - ICCS 2002, International Conference, Amsterdam, The Netherlands, April 21-24, 2002. Proceedings, Part I, pp. 494-502, 2002, Springer, 3-540-43591-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Nicholas W. Landry, Maxime Lucas, Iacopo Iacopini, Giovanni Petri, Alice Schwarze, Alice Patania, Leo Torres 0003 |
XGI: A Python package for higher-order interaction networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Open Source Softw. ![In: J. Open Source Softw. 8(86), pp. 5162, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Alice Ziegler, Hanna Meyer, Insa Otte, Marcell K. Peters, Tim Appelhans, Christina Behler, Katrin Böhning-Gaese, Alice Classen, Florian Detsch, Jürgen Deckert, Connal Eardley, Stefan W. Ferger, Markus Fischer, Friederike Gebert, Michael Haas, Maria Helbig-Bonitz, Andreas Hemp, Claudia Hemp, Victor Kakengi, Antonia V. Mayr, Christine Ngereza, Christoph Reudenbach, Juliane Röder, Gemma Rutten, David Schellenberger Costa, Matthias Schleuning, Axel Ssymank, Ingolf Steffan-Dewenter, Joseph Tardanico, Marco Tschapka, Maximilian G. R. Vollstädt, Stephan Wöllauer, Jie Zhang, Roland Brandl, Thomas Nauss |
Potential of Airborne LiDAR Derived Vegetation Structure for the Prediction of Animal Species Richness at Mount Kilimanjaro. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 14(3), pp. 786, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Alessia Silvia Ivani, Alice Giubergia, Laura Santos, Alice Geminiani, Silvia Annunziata, Arianna Caglio, Ivana Olivieri, Alessandra Pedrocchi |
A gesture recognition algorithm in a robot therapy for ASD children. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biomed. Signal Process. Control. ![In: Biomed. Signal Process. Control. 74, pp. 103512, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Alice Berthier, Alice Yalaoui, Hicham Chehade, Farouk Yalaoui, Lionel Amodeo, Christian Bouillot |
Unrelated parallel machines scheduling with dependent setup times in textile industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Ind. Eng. ![In: Comput. Ind. Eng. 174, pp. 108736, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Alice Borges, Alice Lima, Kailany Ketulhe, Aleteia Araujo, Maristela Holanda |
Gender Diversity in the Graduate Program in Computing at the University of Brasilia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LAWCC@CLEI ![In: Proceedings of the XIV Latin American Women in Computing 2022 co-located with XLVIII Latin American Computer Conference 2022 (CLEI 2022), Antioquia, Colombia, October 19-20, 2022., pp. 77-87, 2022, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
27 | Maristela Holanda, Alice Lima, Alice Borges, Kailany Ketulhe, Carla Koike, Roberta B. Oliveira, Aletéia P. F. Araújo |
Computing for girls in elementary school in Brazil: A mapping of literature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LAWCC@CLEI ![In: Proceedings of the XIII Congress of Latin American Women in Computing 2021 (LAWCC 2021) co-located with XLVII Latin American Computer Conference (CLEI 2021), San José, Costa Rica, October 28, 2021., pp. 47-56, 2021, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
27 | Alice Berthier, Alice Yalaoui, Hicham Chehade, Farouk Yalaoui, Lionel Amodeo, Christian Bouillot |
An Unrelated Parallel Machines Rescheduling Problem: An Industrial Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APMS (1) ![In: Advances in Production Management Systems. Artificial Intelligence for Sustainable and Resilient Production Systems - IFIP WG 5.7 International Conference, APMS 2021, Nantes, France, September 5-9, 2021, Proceedings, Part I, pp. 81-91, 2021, Springer, 978-3-030-85873-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Alice Ravizza, Federico Sternini, Alice Giannini, Filippo Molinari |
Methods for Preclinical Validation of Software as a Medical Device. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HEALTHINF ![In: Proceedings of the 13th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2020) - Volume 5: HEALTHINF, Valletta, Malta, February 24-26, 2020., pp. 648-655, 2020, SCITEPRESS, 978-989-758-398-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Maristela Holanda, Alice Lima, Alice Borges, Kailany Ketulhe, Aletéia P. F. Araújo, Carla Koike |
Iniciativas Educacionais para Permanência das Mulheres em Cursos de Graduação em Computação no Brasil (Educational Initiatives for Women's Permanence in Undergraduate Computing Courses in Brazil). ![Search on Bibsonomy](Pics/bibsonomy.png) |
LAWCC@CLEI ![In: Proceedings of the XII Latin American Women in Computing Congress 2020 (LAWCC 2020) co-located with XLVI Latin American Computer Conference (CLEI 2020), Loja, Ecuador, October 19, 2020., pp. 13-24, 2020, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
27 | Federica Pallavicini, Silvia Serino, Pietro Cipresso, Elisa Pedroli, Irene Alice Chicchi Giglioli, Alice Chirico, Gian Mauro Manzoni, Gianluca Castelnuovo, Enrico Molinari, Giuseppe Riva 0001 |
Testing Augmented Reality for Cue Exposure in Obese Patients: An Exploratory Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyberpsychology Behav. Soc. Netw. ![In: Cyberpsychology Behav. Soc. Netw. 19(2), pp. 107-114, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Irene Alice Chicchi Giglioli, Alice Chirico, Pietro Cipresso, Silvia Serino, Elisa Pedroli, Federica Pallavicini, Giuseppe Riva 0001 |
Feeling Ghost Food as Real One: Psychometric Assessment of Presence Engagement Exposing to Food in Augmented Reality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MindCare ![In: Pervasive Computing Paradigms for Mental Health - 5th International Conference, MindCare 2015, Milan, Italy, September 24-25, 2015, Revised Selected Papers, pp. 99-109, 2015, Springer, 978-3-319-32269-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Rahul Jain 0001, Jaikumar Radhakrishnan, Pranab Sen |
A property of quantum relative entropy with an application to privacy in quantum communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 56(6), pp. 33:1-33:32, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
quantum communication complexity, Privacy, quantum information theory |
22 | Omar Hasan, Lionel Brunie, Jean-Marc Pierson, Elisa Bertino |
L'Elimination de la subjectivité dans la recommandation de confiance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiMob ![In: Actes des 5èmes journées francophones Mobilité et Ubiquité 2009, UBIMOB'09, 7-8 Juillet 2009, Lille, France, pp. 3-10, 2009, ACM, 978-1-60558-622-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
social networks, trust, ubiquitous environments, subjectivity |
22 | Nagaraja Kaushik Gampa, Rohit Ashok Khot, Kannan Srinathan |
Let Only the Right One IN: Privacy Management Scheme for Social Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 310-317, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy over social networks, preference based authentication, friend verification, challenge response schemes |
22 | Julien Degorre, Marc Kaplan, Sophie Laplante, Jérémie Roland |
The Communication Complexity of Non-signaling Distributions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MFCS ![In: Mathematical Foundations of Computer Science 2009, 34th International Symposium, MFCS 2009, Novy Smokovec, High Tatras, Slovakia, August 24-28, 2009. Proceedings, pp. 270-281, 2009, Springer, 978-3-642-03815-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Gérald Gavin, Marine Minier |
Oblivious Multi-variate Polynomial Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings, pp. 430-442, 2009, Springer, 978-3-642-10627-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Homomorphic encryption schemes, Oblivious Polynomial Evaluation (OPE), semantic security |
22 | Lihua Liu, Zhengjun Cao |
Security Analysis of One Verifiable Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing ![In: Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, pp. 181-187, 2008, Springer, 978-3-540-70559-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Eric Goles Ch., Cedric Little, Ivan Rapaport |
Understanding a Non-trivial Cellular Automaton by Finding Its Simplest Underlying Communication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISAAC ![In: Algorithms and Computation, 19th International Symposium, ISAAC 2008, Gold Coast, Australia, December 15-17, 2008. Proceedings, pp. 592-604, 2008, Springer, 978-3-540-92181-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Benoît Libert, Damien Vergnaud |
Multi-use unidirectional proxy re-signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 511-520, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
multi-use proxy re-cryptography, unidirectionality, digital signatures |
22 | Andreas Jakoby, Maciej Liskiewicz, Aleksander Madry |
Susceptible Two-Party Quantum Computations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITS ![In: Information Theoretic Security, Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings, pp. 121-136, 2008, Springer, 978-3-540-85092-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Hui Zhang 0002, Abhishek B. Sharma, Haifeng Chen, Guofei Jiang, Xiaoqiao Meng, Kenji Yoshihira |
Enabling Information Confidentiality in Publish/Subscribe Overlay Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 5624-5628, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Elaine Shi, Brent Waters |
Delegating Capabilities in Predicate Encryption Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP (2) ![In: Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations, pp. 560-578, 2008, Springer, 978-3-540-70582-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | N. R. Sunitha, B. B. Amberker |
Proxy Re-signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings, pp. 156-157, 2008, Springer, 978-3-540-89861-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Signature conversion, Proxy re-signature, Proxy revocation, Proxy key, Proxy Signature |
22 | Benoît Libert, Damien Vergnaud |
Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings, pp. 360-379, 2008, Springer, 978-3-540-78439-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
unidirectionality, standard model, chosen-ciphertext security, proxy re-encryption |
22 | Harry Buhrman, Michal Koucký 0001, Nikolai K. Vereshchagin |
Randomised Individual Communication Complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCC ![In: Proceedings of the 23rd Annual IEEE Conference on Computational Complexity, CCC 2008, 23-26 June 2008, College Park, Maryland, USA, pp. 321-331, 2008, IEEE Computer Society, 978-0-7695-3169-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
individual communication complexity, Kolmogorov complexity, rounds, randomized protocols |
22 | Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew K. Franklin |
Secure Linear Algebra Using Linearly Recurrent Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings, pp. 291-310, 2007, Springer, 3-540-70935-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Secure Linear Algebra, Linearly Recurrent Sequences, Wiedemann’s Algorithm |
22 | Matthias Christandl, Artur Ekert, Michal Horodecki, Pawel Horodecki, Jonathan Oppenheim, Renato Renner |
Unifying Classical and Quantum Key Distillation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings, pp. 456-478, 2007, Springer, 3-540-70935-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Rich Cosgriff Jr., Lori L. Monk, Mary Elizabeth Jones |
Wild Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 45th Annual Southeast Regional Conference, 2007, Winston-Salem, North Carolina, USA, March 23-24, 2007, pp. 553, 2007, ACM, 978-1-59593-629-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Yao-Hsin Chou, I-Ming Tsai, Chin-Shyurng Fahn, Shi-Jinn Horng, Sy-Yen Kuo |
Dependabilities in a High-performance Quantum Real-time Distributed System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 1107-1112, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Wei Yang 0011, Liusheng Huang, Yifei Yao, Zhili Chen |
Quantum Oblivious Transfer Using Tripartite Entangled States. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (1) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 464-468, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao |
An Efficient Certified Email Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 145-157, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Certified Email Protocol, D Optimistic Fair Exchange Protocol, Fair Exchange Protocol |
22 | Tijn Kooijmans, Matthias Rauterberg |
Cultural Computing and the Self Concept: Towards Unconscious Metamorphosis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Entertainment Computing - ICEC 2007, 6th International Conference, Shanghai, China, September 15-17, 2007, Proceedings, pp. 171-181, 2007, Springer, 978-3-540-74872-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
unconscious, selfconcept, interactive experience, cultural computing |
22 | Dalia Khader |
Public Key Encryption with Keyword Search Based on K-Resilient IBE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings. Part III, pp. 1086-1095, 2007, Springer, 978-3-540-74482-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Stanislaw Jarecki, Jihye Kim, Gene Tsudik |
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings, pp. 287-308, 2007, Springer, 3-540-69327-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Michele Banko, Oren Etzioni |
Strategies for lifelong knowledge extraction from the web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
K-CAP ![In: Proceedings of the 4th International Conference on Knowledge Capture (K-CAP 2007), October 28-31, 2007, Whistler, BC, Canada, pp. 95-102, 2007, ACM, 978-1-59593-643-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
machine reading, lifelong learning |
22 | Piotr Indyk, David P. Woodruff |
Polylogarithmic Private Approximations and Efficient Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings, pp. 245-264, 2006, Springer, 3-540-32731-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Dalia Khader |
Public Key Encryption with Keyword Search Based on K-Resilient IBE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 298-308, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Aggelos Kiayias, Antonina Mitrofanova |
Testing Disjointness of Private Datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 109-124, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Keith B. Frikken, Mikhail J. Atallah |
Achieving Fairness in Private Contract Negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 270-284, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar |
An Improved Secure Two-Party Computation Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 221-232, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Anshuman Singh, Siddharth Barman, Kaushal K. Shukla |
Secure Two-Party Context Free Language Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, Second International Conference, ICDCIT 2005, Bhubaneswar, India, December 22-24, 2005, Proceedings, pp. 117-124, 2005, Springer, 3-540-30999-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Breno de Medeiros |
Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 238-244, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Rahul Jain 0001, Jaikumar Radhakrishnan, Pranab Sen |
Prior Entanglement, Message Compression and Privacy in Quantum Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCC ![In: 20th Annual IEEE Conference on Computational Complexity (CCC 2005), 11-15 June 2005, San Jose, CA, USA, pp. 285-296, 2005, IEEE Computer Society, 0-7695-2364-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Zhide Chen, Hong Zhu 0004 |
Quantum m-out-of-n oblivious transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt, pp. 375-380, 2004, IEEE Computer Society, 0-7803-8623-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Ivan Damgård, Thomas Pedersen, Louis Salvail |
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 91-108, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Stefan Dziembowski, Ueli M. Maurer |
On Generating the Initial Key in the Bounded-Storage Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 126-137, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Vladimir Estivill-Castro |
Private Representative-Based Clustering for Vertically Partitioned Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ENC ![In: 5th Mexican International Conference on Computer Science (ENC 2004), 20-24 September 2004, Colima, Mexico, pp. 160-167, 2004, IEEE Computer Society, 0-7695-2160-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Jordi Castellà-Roca, Josep Domingo-Ferrer |
A Non-Repudiable Bitstring Commitment Scheme Based on a Public-Key Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (2) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 778-780, 2004, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Bit commitment, Mental poker |
22 | Zhide Chen, Hong Zhu 0004 |
General Public Key m-Out-of-n Oblivious Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational and Information Science, First International Symposium, CIS 2004, Shanghai, China, December 16-18, 2004, Proceedings, pp. 888-894, 2004, Springer, 3-540-24127-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
public key system, secure protocol, oblivious transfer |
22 | John Marchesini, Sean W. Smith, Omen Wild, Joshua Stabiner, Alex Barsamian |
Open-Source Applications of TCPA Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 294-303, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Joseph Y. Halpern, Vicky Weissman |
Using First-Order Logic to Reason about Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June - 2 July 2003, Pacific Grove, CA, USA, pp. 187-201, 2003, IEEE Computer Society, 0-7695-1927-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Keith B. Frikken, Mikhail J. Atallah |
Privacy preserving electronic surveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003, pp. 45-52, 2003, ACM, 1-58113-776-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
privacy, security protocols, surveillance |
22 | Geraint Price |
Client v. Server Side Protocols, Interfaces and Storage (Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 74-79, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Michael O. Rabin |
Hyper Encryption and Everlasting Secrets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIAC ![In: Algorithms and Complexity, 5th Italian Conference, CIAC 2003, Rome, Italy, May 28-30, 2003, Proceedings, pp. 7-10, 2003, Springer, 3-540-40176-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Carlos Eisenberg, Boi Faltings, Lars Leistam |
A multiagent-system for integrating a large-scale project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: The Second International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS 2003, July 14-18, 2003, Melbourne, Victoria, Australia, Proceedings, pp. 980-981, 2003, ACM, 1-58113-683-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
ontology, local search, project scheduling, distributed constraint satisfaction |
22 | Jörg Rothe |
Kryptographische Protokolle und Null-Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inform. Spektrum ![In: Inform. Spektrum 25(2), pp. 120-131, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Public-Key-Kryptosysteme, Protokolle für Schlüsseltausch und digitale Signaturen, Einwegfunktionen, Zero-Knowledge-Protokolle, interaktive Beweissysteme |
22 | Radu Sion |
Power: A Metric for Evaluating Watermarking Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC ![In: 2002 International Symposium on Information Technology (ITCC 2002), 8-10 April 2002, Las Vegas, NV, USA, pp. 95-99, 2002, IEEE Computer Society, 0-7695-1506-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Watermarking Model, Information Hiding Metrics, Watermarking Algorithms |
22 | Yan-Cheng Chang, Chi-Jen Lu |
Oblivious Polynomial Evaluation and Oblivious Neural Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 369-384, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Valeri Korjik, Guillermo Morales-Luna, Vladimir B. Balakirsky |
Privacy Amplification Theorem for Noisy Main Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings, pp. 18-26, 2001, Springer, 3-540-42662-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Key-sharing, Rènyi information, error correcting codes, hashing, privacy amplification |
22 | Ron Steinfeld, Laurence Bull, Yuliang Zheng 0001 |
Content Extraction Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 285-304, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
fragment-extraction, content blinding, fact verification, content verification, digital signatures, provable security, Content-extraction |
22 | Wanda P. Dann, Stephen Cooper, Randy Pausch |
Making the connection: programming with animated small world. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 5th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2000, Helsinki, Finland, June 11-13, 2000, pp. 41-44, 2000, ACM, 1-58113-207-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
22 | Yevgeniy Dodis, Shai Halevi, Tal Rabin |
A Cryptographic Solution to a Game Theoretic Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, pp. 112-130, 2000, Springer, 3-540-67907-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
22 | Tomas Sander, Adam L. Young, Moti Yung |
Non-Interactive CryptoComputing For NC1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 40th Annual Symposium on Foundations of Computer Science, FOCS '99, 17-18 October, 1999, New York, NY, USA, pp. 554-567, 1999, IEEE Computer Society, 0-7695-0409-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
cryptocomputing, cryptography, public key, complexity theory, homomorphic encryption, secure computation |
22 | Amos Beimel, Tal Malkin, Silvio Micali |
The All-or-Nothing Nature of Two-Party Secure Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, pp. 80-97, 1999, Springer, 3-540-66347-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
22 | Ueli M. Maurer, Stefan Wolf 0001 |
Privacy Amplification Secure Against Active Adversaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 307-321, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Unconditional secrecy, Information theory, Extractors, Privacy amplification, Authentication codes, Secret-key agreement |
22 | Ueli M. Maurer, Stefan Wolf 0001 |
Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings, pp. 196-209, 1996, Springer, 3-540-61872-4. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Cryptography, Information theory, Unconditional security, Secret key agreement |
22 | Donald Beaver |
Equivocable Oblivious Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding, pp. 119-130, 1996, Springer, 3-540-61186-X. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
22 | Claude Crépeau, Jeroen van de Graaf, Alain Tapp |
Committed Oblivious Transfer and Private Multi-Party Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings, pp. 110-123, 1995, Springer, 3-540-60221-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
22 | Donald Beaver |
Precomputing Oblivious Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings, pp. 97-109, 1995, Springer, 3-540-60221-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
22 | Charles H. Bennett, Gilles Brassard, Claude Crépeau, Marie-Hélène Skubiszewska |
Practical Quantum Oblivious Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings, pp. 351-366, 1991, Springer, 3-540-55188-3. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
22 | Yvo Desmedt |
Abuses in Cryptography and How to Fight Them. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings, pp. 375-389, 1988, Springer, 3-540-97196-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
22 | Josh Cohen Benaloh |
Cryptographic Capsules: A Disjunctive Primative for Interactive Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings, pp. 213-222, 1986, Springer. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
22 | Charles H. Bennett, Gilles Brassard, Jean-Marc Robert 0001 |
How to Reduce Your Enemy's Information (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings, pp. 468-476, 1985, Springer, 3-540-16463-4. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
22 | Ian W. Moor |
An Applicative Compiler for a Parallel Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGPLAN Symposium on Compiler Construction ![In: Proceedings of the SIGPLAN '82 Symposium on Compiler Construction, Boston, Massachusetts, USA, June 23-25, 1982, pp. 284-293, 1982, ACM, 0-89791-074-5. The full citation details ...](Pics/full.jpeg) |
1982 |
DBLP DOI BibTeX RDF |
HOPE |
21 | Mark K. Gardner, Wu-chun Feng |
Broadening accessibility to computer science for K-12 education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2010, Bilkent, Ankara, Turkey, June 26-30, 2010, pp. 229-233, 2010, ACM, 978-1-60558-729-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
live CD, storytelling alice, K-12, virtual computing |
21 | Youwen Ouyang, Ursula Wolz, Susan H. Rodger |
Effective delivery of computing curriculum in middle school: challenges and solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 41st ACM technical symposium on Computer science education, SIGCSE 2010, Milwaukee, Wisconsin, USA, March 10-13, 2010, pp. 327-328, 2010, ACM, 978-1-4503-0006-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
computing foundations, alice, scratch, middle school |
21 | Stephen Cooper, Wanda P. Dann, John Harrison |
A k-12 college partnership. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 41st ACM technical symposium on Computer science education, SIGCSE 2010, Milwaukee, Wisconsin, USA, March 10-13, 2010, pp. 320-324, 2010, ACM, 978-1-4503-0006-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
object-oriented, programming, program visualization, alice, k-12 |
Displaying result #101 - #200 of 4791 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|