|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 379 occurrences of 238 keywords
|
|
|
Results
Found 755 publication records. Showing 755 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Yoram Moses, Danny Dolev, Joseph Y. Halpern |
Cheating Husbands and other Stories: A Case Study of Knowledge, Action, and Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Comput. ![In: Distributed Comput. 1(3), pp. 167-176, 1986. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
17 | Ian Bowler |
The Synthesis of Complex Audio Spectra by Cheating Quite a Lot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMC ![In: Proceedings of the 1985 International Computer Music Conference, ICMC 1985, Burnaby, BC, Canada, August 19-22, 1985, 1985, Michigan Publishing. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP BibTeX RDF |
|
17 | Yoram Moses, Danny Dolev, Joseph Y. Halpern |
Cheating Husbands and Other Stories: A Case Study of Knowledge, Action, and Communication (Preliminary Version). ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Fourth Annual ACM Symposium on Principles of Distributed Computing, Minaki, Ontario, Canada, August 5-7, 1985, pp. 215-223, 1985, ACM, 0-89791-167-9. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
17 | Mary Shaw, Anita Jones, Paul Knueven, John McDermott, Philip Miller 0001, David Notkin |
Cheating Policy in a Computer Science Department. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGCSE Bull. ![In: ACM SIGCSE Bull. 12(2), pp. 72-76, 1980. The full citation details ...](Pics/full.jpeg) |
1980 |
DBLP DOI BibTeX RDF |
|
11 | Huawang Qin, Yuewei Dai, Zhiquan Wang |
A secret sharing scheme based on (t, n) threshold and adversary structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(5), pp. 379-385, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Adversary structure, Cryptography, Information security, Secret sharing, Threshold |
11 | Lifeng Lai, Hesham El Gamal, H. Vincent Poor |
Authentication Over Noisy Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 55(2), pp. 906-916, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
11 | David Pinelle, Nelson Wong, Tadeusz Stach, Carl Gutwin |
Usability heuristics for networked multiplayer games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GROUP ![In: Proceedings of the 2009 International ACM SIGGROUP Conference on Supporting Group Work, GROUP 2009, Sanibel Island, Florida, USA, May 10-13, 2009, pp. 169-178, 2009, ACM, 978-1-60558-500-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
NGH, game usability, networked game heuristics, usability, heuristic evaluation, networked games, multiplayer games |
11 | Chien-Ju Ho, Tao-Hsuan Chang, Jong-Chuan Lee, Jane Yung-jen Hsu, Kuan-Ta Chen |
KissKissBan: a competitive human computation game for image annotation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD Workshop on Human Computation ![In: Proceedings of the ACM SIGKDD Workshop on Human Computation, Paris, France, June 28, 2009, pp. 11-14, 2009, ACM, 978-1-60558-672-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Amazon Mechanical Turk, ESP game, image annotation, human computation, games with a purpose |
11 | James B. Fenwick Jr., Cindy Norris, E. Frank Barry, Josh Rountree, Cole J. Spicer, Scott D. Cheek |
Another look at the behaviors of novice programmers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 40th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2009, Chattanooga, TN, USA, March 4-7, 2009, pp. 296-300, 2009, ACM, 978-1-60558-183-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
compilation, pattern, cs1, behavior |
11 | Benoît Libert, Damien Vergnaud |
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 235-255, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
efficiency, traceability, Identity-based encryption |
11 | Jing Li 0075, Dianfu Ma, Jun Han, Xiang Long |
Toward Trustworthy Semantic Web Service Discovery and Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 6th International Conference, ATC 2009, Brisbane, Australia, July 7-9, 2009, Proceedings, pp. 209-220, 2009, Springer, 978-3-642-02703-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Services, Service Discovery, Semantic Web Service, Trustworthy |
11 | Martin Serrano, Sven van der Meer, John Strassner, Stefano De Paoli, Aphra Kerr, Cristiano Storni |
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 6th International Conference, ATC 2009, Brisbane, Australia, July 7-9, 2009, Proceedings, pp. 249-267, 2009, Springer, 978-3-642-02703-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Pervasive Services, Social Networks, Pervasive Computing, Information Systems, Trust Management, Systems Management, Policy-Based Management, Autonomic Communications, Reputation Mechanisms |
11 | Svend Rothmann Bonde, Lise Vestergaard Jensen, Emil Sellström, Stephan Suesmann |
Draw poker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGGRAPH ASIA Animations ![In: International Conference on Computer Graphics and Interactive Techniques, SIGGRAPH ASIA 2009, Yokohama, Japan, December 16-19, 2009, Computer Animation Festival Proceedings, pp. 46, 2009, ACM. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Rahul Jain 0001 |
New Binding-Concealing Trade-Offs for Quantum String Commitment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 21(4), pp. 579-592, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
String commitment, Quantum channels, Observational divergence, Substate theorem, Relative entropy |
11 | Han Yu 0001, Zhiqi Shen 0001, Chunyan Miao |
A goal-oriented development tool to automate the incorporation of intelligent agents into interactive digital media applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Entertain. ![In: Comput. Entertain. 6(2), pp. 24:1-24:15, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
distributed system, multi-agent system, intelligent agent, design tool, goal-oriented |
11 | G. I. Ankoudinov, I. G. Ankoudinov, A. I. Strizhachenko |
Multi-Variant Assignment Generation and Assessment Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education ![In: Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education, Proceedings of the 2007 International Conference on Engineering Education, Instructional Technology, Assessment, and E-learning (EIAE 2007), part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2007), Bridgeport, CT, USA, December 3-12, 2007, pp. 166-170, 2008, Springer, 978-1-4020-8738-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Alison Gazzard |
Grand Theft algorithm: purposeful play, appropriated play and aberrant players. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MindTrek ![In: Proceedings of the 12th international conference on Entertainment and media in the ubiquitous era, Mindtrek 2008, Tampere, Finland, October 7-9, 2008, pp. 3-7, 2008, ACM, 978-1-60558-197-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
aberrant players, appropriated play, purposeful play, flow, videogame |
11 | Xu An Wang 0001, Xinyi Huang 0001, Xiaoyuan Yang 0002 |
Further Observations on Certificateless Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 217-239, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Paolo Penna, Carmine Ventre |
Collusion-Resistant Mechanisms with Verification Yielding Optimal Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESA ![In: Algorithms - ESA 2008, 16th Annual European Symposium, Karlsruhe, Germany, September 15-17, 2008. Proceedings, pp. 708-719, 2008, Springer, 978-3-540-87743-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Sean Hallgren, Alexandra Kolla, Pranab Sen, Shengyu Zhang |
Making Classical Honest Verifier Zero Knowledge Protocols Secure against Quantum Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP (2) ![In: Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations, pp. 592-603, 2008, Springer, 978-3-540-70582-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu |
A game theoretic framework for incentive-based peer-to-peer live-streaming social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2008, March 30 - April 4, 2008, Caesars Palace, Las Vegas, Nevada, USA, pp. 2141-2144, 2008, IEEE, 1-4244-1484-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Jing Xi, Pengpeng Nie, Jiande Lu |
A P2P Trust Model Based on Dynamic Fuzzy Theory -- BGTR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIP ![In: International Symposium on Information Processing, ISIP 2008 / International Pacific Workshop on Web Mining, and Web-Based Application, WMWA 2008, Moscow, Russia, 23-25 May 2008, pp. 187-191, 2008, IEEE Computer Society, 978-0-7695-3151-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, p2p, trust, fuzzy |
11 | Shaili Jain, David C. Parkes |
A Game-Theoretic Analysis of Games with a Purpose. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WINE ![In: Internet and Network Economics, 4th International Workshop, WINE 2008, Shanghai, China, December 17-20, 2008. Proceedings, pp. 342-350, 2008, Springer, 978-3-540-92184-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Hamed Janzadeh, Kaveh Fayazbakhsh, Bahador Bakhshi, Mehdi Dehghan 0001 |
A Novel Incentive-Based and Hardware-Independent Cooperation Mechanism for MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings, pp. 2462-2467, 2008, IEEE, 978-1-4244-1997-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Georgios Smaragdakis, Vassilis Lekakis, Nikolaos Laoutaris, Azer Bestavros, John W. Byers, Mema Roussopoulos |
EGOIST: overlay routing using selfish neighbor selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoNEXT ![In: Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2008, Madrid, Spain, December 9-12, 2008, pp. 6, 2008, ACM, 978-1-60558-210-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
overlay network creation and maintenance, selfish neighbor selection, overlay routing |
11 | Éric Levieil, David Naccache |
Cryptographic Test Correction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings, pp. 85-100, 2008, Springer, 978-3-540-78439-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Lisha Chen-Wilson, Patrick Newcombe, Piers Royce, Samuel Ong, Timothy Wonnacott, Gary B. Wills, David Argles |
Secure Certification for ePortfolios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALT ![In: The 8th IEEE International Conference on Advanced Learning Technologies, ICALT 2008, Santander, Cantabria, Spain, July 1-5, 2008, pp. 744-745, 2008, IEEE Computer Society, 978-0-7695-3167-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Elisardo González-Agulla, Luis E. Anido-Rifón, José Luis Alba-Castro, Carmen García-Mateo |
Is My Student at the Other Side? Applying Biometric Web Authentication to E-Learning Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALT ![In: The 8th IEEE International Conference on Advanced Learning Technologies, ICALT 2008, Santander, Cantabria, Spain, July 1-5, 2008, pp. 551-553, 2008, IEEE Computer Society, 978-0-7695-3167-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Narayanan Kulathuramaiyer, Bilal Zaka, Denis Helic |
Integrated Copy-Paste Checking: Design and Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALT ![In: The 8th IEEE International Conference on Advanced Learning Technologies, ICALT 2008, Santander, Cantabria, Spain, July 1-5, 2008, pp. 519-523, 2008, IEEE Computer Society, 978-0-7695-3167-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Ivan Damgård, Jesper Buus Nielsen, Daniel Wichs |
Isolated Proofs of Knowledge and Isolated Zero Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings, pp. 509-526, 2008, Springer, 978-3-540-78966-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Yuko Sakurai, Yasumasa Saito, Atsushi Iwasaki, Makoto Yokoo |
Beyond Quasi-linear Utility: Strategy/False-Name-Proof Multi-unit Auction Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAT ![In: Proceedings of the 2008 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, Sydney, NSW, Australia, December 9-12, 2008, pp. 417-423, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Zhengfeng Hou, Jianghong Han, Donghui Hu |
A New Authentication Scheme Based on Verifiable Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 1028-1030, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Qiang Zhang, Ying Zhuo, Zhenghu Gong |
A Trust Inspection Model Based on Society Behavior Similarity Rule in Dynamic Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 970-973, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Qi Chen, Song-Nian Yu, Sisi Cheng |
Link Variable TrustRank for Fighting Web Spam. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (4) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 4: Embedded Programming / Database Technology / Neural Networks and Applications / Other Applications, December 12-14, 2008, Wuhan, China, pp. 1004-1007, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Carlos Eduardo Benevides Bezerra, Fábio Reis Cecin, Cláudio F. R. Geyer |
A3: A Novel Interest Management Algorithm for Distributed Simulations of MMOGs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DS-RT ![In: 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 27-29 October 2008, Vancouver, BC, Canada, Proceedings, pp. 35-42, 2008, IEEE Computer Society, 978-0-7695-3425-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Wiebren de Jonge, Bart Jacobs 0001 |
Privacy-Friendly Electronic Traffic Pricing via Commits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust, 5th International Workshop, FAST 2008, Malaga, Spain, October 9-10, 2008, Revised Selected Papers, pp. 143-161, 2008, Springer. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Christoph Neumann, Nicolas Prigent, Matteo Varvello, Kyoungwon Suh |
Challenges in peer-to-peer gaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 37(1), pp. 79-82, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
overlay online-gaming, security, peer-to-peer |
11 | Guang Tan, Stephen A. Jarvis |
Improving the Fault Resilience of Overlay Multicast for Media Streaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 18(6), pp. 721-734, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Reliability, peer-to-peer, multicast, overlay, media streaming, fault resilience |
11 | Patric Kabus, Alejandro P. Buchmann |
Design of a cheat-resistant P2P online gaming system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMEA ![In: Proceedings of the Second International Conference on Digital Interactive Media in Entertainment and Arts, DIMEA 2007, 19-21 September 2007, Perth, Western Australia, pp. 113-120, 2007, ACM, 978-1-59593-708-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Melek Önen, Abdullatif Shikfa, Refik Molva |
Optimistic fair exchange for secure forwarding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), August 6-10, 2007, Philadelphia, PA, USA, pp. 1-5, 2007, IEEE Computer Society, 978-1-4244-1024-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Yitao Duan, John F. Canny, Justin Z. Zhan |
Efficient Privacy-Preserving Association Rule Mining: P4P Style. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIDM ![In: Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2007, part of the IEEE Symposium Series on Computational Intelligence 2007, Honolulu, Hawaii, USA, 1-5 April 2007, pp. 654-660, 2007, IEEE, 1-4244-0705-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Yonatan Aumann, Yehuda Lindell |
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings, pp. 137-156, 2007, Springer, 3-540-70935-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Paul Rabinovich, Robert Simon |
Secure Aggregation in Sensor Networks Using Neighborhood Watch. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, UK, 24-28 June 2007, pp. 1484-1491, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Gennaro Costagliola, Vittorio Fuccella, Massimiliano Giordano, Giuseppe Polese |
Logging and Visualization of Learner Behaviour in Web-Based E-Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWL ![In: Advances in Web Based Learning - ICWL 2007, 6th International Conference, Edinburgh, UK, August 15-17, 2007, Revised Papers, pp. 452-463, 2007, Springer, 978-3-540-78138-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Bogdan Carbunar, Brett Lindsley, Michael Pearce, Venu Vasudevan |
Verifiable Credit Based Transfers in Wireless Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), Proceedings, 26-30 March 2007, Long Beach, California, USA, pp. 1-10, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Wun-She Yap, Swee-Huay Heng, Bok-Min Goi |
Cryptanalysis of Some Proxy Signature Schemes Without Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings, pp. 115-126, 2007, Springer, 978-3-540-72353-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
attack, Proxy signature, identity-based, certificateless |
11 | Shane Balfe, Anish Mohammed |
Final Fantasy - Securing On-Line Gaming with Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 123-134, 2007, Springer, 978-3-540-73546-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Kristal T. Pollack, Darrell D. E. Long, Richard A. Golding, Ralph A. Becker-Szendy, Benjamin C. Reed |
Quota enforcement for high-performance distributed storage systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSST ![In: 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007), 24-27 September 2007, San Diego, California, USA, pp. 72-86, 2007, IEEE Computer Society, 0-7695-3025-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Souvik Ray, Giora Slutzki, Zhao Zhang |
Incentive-Driven P2P Anonymity System: A Game-Theoretic Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP ![In: 2007 International Conference on Parallel Processing (ICPP 2007), September 10-14, 2007, Xi-An, China, pp. 63, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Dong-Her Shih, Chih-Hung Cheng, Jui-Chi Shen |
A Secure Protocol of Reverse Discriminatory Auction with Bid Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMB ![In: International Conference on Mobile Business (ICMB 2007), July 9-11, 2007, Toronto, Ontario, Canada, pp. 52, 2007, IEEE Computer Society, 0-7695-2803-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Li Zhang 0066, Ping-Ping Zhou, Gong-bin Qian, Zhen Ji |
A DWT Blind Image Watermarking Strategy with Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM ![In: Advances in Multimedia Information Processing - PCM 2007, 8th Pacific Rim Conference on Multimedia, Hong Kong, China, December 11-14, 2007, Proceedings, pp. 377-384, 2007, Springer, 978-3-540-77254-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
blind image watermarking, secret sharing, closed loop, Stirmark |
11 | N. R. Sunitha, B. B. Amberker, Prashant Koulgi |
Controlled Delegation in e-cheques Using Proxy Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 15-19 October 2007, Annapolis, Maryland, USA, pp. 414-422, 2007, IEEE Computer Society, 0-7695-2891-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Se- curity, Digital Signature, Proxy Signature, DSA |
11 | Akcell |
Motivate AI Class with Interactive Computer Game. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIGITEL ![In: DIGITEL 2007, The First IEEE International Workshop on Digital Game and Intelligent Toy Enhanced Learning, Proceedings, 26-28 March 2007, Jhongli, Taiwan, pp. 109-113, 2007, IEEE Computer Society, 978-0-7695-2801-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Duen Horng Chau, Shashank Pandit, Christos Faloutsos |
Detecting Fraudulent Personalities in Networks of Online Auctioneers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PKDD ![In: Knowledge Discovery in Databases: PKDD 2006, 10th European Conference on Principles and Practice of Knowledge Discovery in Databases, Berlin, Germany, September 18-22, 2006, Proceedings, pp. 103-114, 2006, Springer, 3-540-45374-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich |
How to win the clonewars: efficient periodic n-times anonymous authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 201-210, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
n-anonymous authentication, credentials, clone detection |
11 | Wei Zhou, Ke Xu, J. Liu, Chi-Hung Chi |
Truthful application-layer multicast in mesh-based selfish overlays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 25th IEEE International Performance Computing and Communications Conference, IPCCC 2006, April 10-12, 2006, Phoenix, Arizona, USA, 2006, IEEE, 1-4244-0198-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Shunsaku Kato, Shuichi Miyazaki, Yusuke Nishimura, Yasuo Okabe |
Cheat-Proof Serverless Network Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computers and Games ![In: Computers and Games, 5th International Conference, CG 2006, Turin, Italy, May 29-31, 2006. Revised Papers, pp. 234-243, 2006, Springer, 978-3-540-75537-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Tom R. Wielicki |
Integrity of Online Testing in E-Learning: Empirical Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 13-17 March 2006, Pisa, Italy, pp. 206-210, 2006, IEEE Computer Society, 0-7695-2520-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Qiming Li, Ee-Chien Chang |
Zero-knowledge watermark detection resistant to ambiguity attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 8th workshop on Multimedia & Security, MM&Sec 2006, Geneva, Switzerland, September 26-27, 2006, pp. 158-163, 2006, ACM, 1-59593-493-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ambiguity attack, zero-knowledge proof, watermark detection |
11 | Keiichi Endo, Minoru Kawahara, Yutaka Takahashi 0001 |
A proposal of encoded computations for distributed massively multiplayer online services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Advances in Computer Entertainment Technology ![In: Proceedings of the International Conference on Advances in Computer Entertainment Technology, ACE 2006, Hollywood, California, USA, June 14-16, 2006, pp. 72, 2006, ACM, 1-59593-380-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
distributed massively multiplayer online services, encoded computations, interactive real-time applications, peer-to-peer |
11 | Emmanuelle Anceaume, Aina Ravoaja |
Incentive-Based Robust Reputation Mechanism for P2P Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OPODIS ![In: Principles of Distributed Systems, 10th International Conference, OPODIS 2006, Bordeaux, France, December 12-15, 2006, Proceedings, pp. 305-319, 2006, Springer, 3-540-49990-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Reputation, peer-to-peer systems, credibility, free-riding, collusion |
11 | Omkant Pandey, Julien Cathalo, Jean-Jacques Quisquater |
Fair Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, pp. 52-63, 2006, Springer, 3-540-31033-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Spyridon Antonakopoulos |
Fast leader-election protocols with bounded cheaters' edge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 38th Annual ACM Symposium on Theory of Computing, Seattle, WA, USA, May 21-23, 2006, pp. 187-196, 2006, ACM, 1-59593-134-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
distributed computing, leader election, coin-flipping |
11 | Mark Manulis, Ahmad-Reza Sadeghi |
Property-Based Taming of Lying Mobile Nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 476-480, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Song Han 0004, Elizabeth Chang 0001, Tharam S. Dillon, Jie Wang 0038 |
Improvement of a Convertible Undeniable Partially Blind Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 875-882, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Partially blind signature, Convertible undeniable signature, Security protocol, Blind signature, Undeniable signature |
11 | Fábio Reis Cecin, Cláudio Fernando Resin Geyer, Solon Rabello, Jorge L. V. Barbosa |
A peer-to-peer simulation technique for instanced massively multiplayer games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DS-RT ![In: 10th IEEE International Symposium on Distributed Simulation and Real-Time Applications (DS-RT 2006), 2-4 October 2006, Malaga, Spain, pp. 43-50, 2006, IEEE Computer Society, 0-7695-2697-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Samarth Shetty, Patricio Galdames, Wallapak Tavanapong, Ying Cai |
Detecting Malicious Peers in Overlay Multicast Streaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2006, The 31st Annual IEEE Conference on Local Computer Networks, Tampa, Florida, USA, 14-16 November 2006, pp. 499-506, 2006, IEEE Computer Society, 1-4244-0418-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Radu Jurca, Boi Faltings |
Using CHI-scores to reward honest feedback from repeated interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), Hakodate, Japan, May 8-12, 2006, pp. 1233-1240, 2006, ACM, 1-59593-303-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
honest reporting, reputation mechanisms |
11 | Kenneth A. Ross |
Academic dishonesty and the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 48(10), pp. 29-31, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Philippe Golle, Nicolas Ducheneaut |
Preventing bots from playing online games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Entertain. ![In: Comput. Entertain. 3(3), pp. 3, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
reverse Turing test, agents, games, CAPTCHAs, bots |
11 | Chrisantha Fernando |
The Good Symbiont. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECAL ![In: Advances in Artificial Life, 8th European Conference, ECAL 2005, Canterbury, UK, September 5-9, 2005, Proceedings, pp. 695-704, 2005, Springer, 3-540-28848-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Matthew Yurkewych, Brian Neil Levine, Arnold L. Rosenberg |
On the cost-ineffectiveness of redundancy in commercial P2P computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 280-288, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
game theory, redundancy, P2P computing, collusion |
11 | Li Tang, Jun Li 0003, Jin Zhou, Zhizhi Zhou, Hao Wang, Kai Li |
FreeRank: implementing independent ranking service for multiplayer online games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETGAMES ![In: Proceedings of the 4th Workshop on Network and System Support for Games, NETGAMES 2005, Hawthorne, New York, USA, October 10-11, 2005, pp. 1-7, 2005, ACM, 1-59593-156-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
freerank, ranking service, multiplayer online games |
11 | Guilin Wang |
An abuse-free fair contract signing protocol based on the RSA signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 14th international conference on World Wide Web, WWW 2005, Chiba, Japan, May 10-14, 2005, pp. 412-421, 2005, ACM, 1-59593-046-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, e-commerce, digital signatures, RSA, cryptographic protocols, fair-exchange, contract signing |
11 | Matt Lepinski, Silvio Micali, Abhi Shelat |
Fair-Zero Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings, pp. 245-263, 2005, Springer, 3-540-24573-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Frank Stajano |
Repairing the Bluetooth Pairing Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 46-50, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Markus Jakobsson, Liu Yang |
Quantifying Security in Hybrid Cellular Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 350-363, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Le-Hung Vu, Manfred Hauswirth, Karl Aberer |
QoS-Based Service Selection and Ranking with Trust and Reputation Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (1) ![In: On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE, OTM Confederated International Conferences CoopIS, DOA, and ODBASE 2005, Agia Napa, Cyprus, October 31 - November 4, 2005, Proceedings, Part I, pp. 466-483, 2005, Springer, 3-540-29736-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Alexei Tretiakov, Kinshuk |
An Allocation Model for Automatic Assignment Generation and Marking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALT ![In: Proceedings of the 5th IEEE International Conference on Advanced Learning Technologies, ICALT 2005, Kaohsiung, Taiwan, July 5-8, 2005, pp. 133-137, 2005, IEEE Computer Society, 0-7695-2338-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Wei Yu 0003, Yan Sun 0001, K. J. Ray Liu |
HADOF: defense against routing disruptions in mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA, pp. 1252-1261, 2005, IEEE, 0-7803-8968-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Sandra M. Richardson, Kelly McNamara Hilmer, James F. Courtney |
Compliance with Codes of Ethical Conduct: The Effects of Authority and Proximity on Ethical Reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Maosheng Li, Shoubao Yang, Qianfei Fu, Yang Jin |
Research on Grid Resource Reliability Model Based on Promise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 310-315, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
resource reliability, promise, signaling game, grid computing, market |
11 | Joaquín García 0001, Frédéric Cuppens, Fabien Autrel, Jordi Castellà-Roca, Joan Borrell, Guillermo Navarro 0001, Jose A. Ortega-Ruiz |
Protecting On-Line Casinos against Fraudulent Player Drop-Out. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 500-505, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | MyungJoo Ham, Gul Agha |
ARA: A Robust Audit to Prevent Free-Riding in P2P Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Computing ![In: Fifth IEEE International Conference on Peer-to-Peer Computing (P2P 2005), 31 August - 2 September 2005, Konstanz, Germany, pp. 125-132, 2005, IEEE Computer Society, 0-7695-2376-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Doug Szajda, Barry Lawson 0001, Jason Owen |
Toward an Optimal Redundancy Strategy for Distributed Computations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLUSTER ![In: 2005 IEEE International Conference on Cluster Computing (CLUSTER 2005), September 26 - 30, 2005, Boston, Massachusetts, USA, pp. 1-11, 2005, IEEE Computer Society, 0-7803-9485-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Alfredo De Santis, Barbara Masucci |
Anonymous Membership Broadcast Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 32(1-3), pp. 135-151, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
anonymity, permutation groups, pseudorandom permutations |
11 | Fábio Reis Cecin, Rafael de Oliveira Jannone, Cláudio F. R. Geyer, Márcio Garcia Martins 0002, Jorge L. V. Barbosa |
FreeMMG: a hybrid peer-to-peer and client-server model for massively multiplayer games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETGAMES ![In: Proceedings of the 3rd Workshop on Network and System Support for Games, NETGAMES 2004, Portland, Oregon, USA, August 30, 2004, pp. 172, 2004, ACM, 1-58113-942-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
cheat-proof games, peer-to-peer, massively multiplayer games |
11 | Boaz Barak, Rafael Pass |
On the Possibility of One-Message Weak Zero-Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings, pp. 121-132, 2004, Springer, 3-540-21000-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Ivan Damgård, Serge Fehr, Kirill Morozov, Louis Salvail |
Unfair Noisy Channels and Oblivious Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings, pp. 355-373, 2004, Springer, 3-540-21000-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Andris Ambainis, Markus Jakobsson, Helger Lipmaa |
Cryptographic Randomized Response Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 425-438, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
randomized response technique, privacy, privacy-preserving data-mining, oblivious transfer, polling, binary symmetric channel |
11 | Ko-Kang Chu, Maiga Chang, Yen-Teh Hsia |
A hybrid training mechanism for applying neural networks to Web-based applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (4) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 3543-3547, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Feng Bao 0001, Guilin Wang, Jianying Zhou 0001, Huafei Zhu |
Analysis and Improvement of Micali's Fair Contract Signing Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 176-187, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Philippe Golle, Ari Juels |
Dining Cryptographers Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 456-473, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Chris GauthierDickey, Daniel Zappala, Virginia Mary Lo, James Marr |
Low latency and cheat-proof event ordering for peer-to-peer games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOSSDAV ![In: Network and Operating System Support for Digital Audio and Video, 14th International Workshop, NOSSDAV 2004, Cork, Ireland, June 16-18, 2004, Proceedings, pp. 134-139, 2004, ACM, 1-58113-801-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
cheat-proof, peer-to-peer, interactive, games, distributed, low-latency |
11 | Jean-Pierre Hubaux |
Rational behaviors in hotspots and in ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSWiM ![In: Proceedings of the 7th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2004, Venice, Italy, October 4-6, 2004, pp. 115-116, 2004, ACM, 1-58113-953-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Tianjie Cao, Dongdai Lin, Rui Xue 0001 |
Security Analysis of User Efficient Blind Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AWCC ![In: Content Computing, Advanced Workshop on Content Computing, AWCC 2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings, pp. 167-172, 2004, Springer, 3-540-23898-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Chunbo Ma, Dake He |
A New Chameleon Multi-signature Based on Bilinear Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC Workshops ![In: Grid and Cooperative Computing - GCC 2004 Workshops: GCC 2004 International Workshops, IGKG, SGT, GISS, AAC-GEVO, and VVS, Wuhan, China, October 21-24, 2004. Proceedings, pp. 329-334, 2004, Springer, 3-540-23578-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Kemal Bicakci, Nazife Baykal |
Server Assisted Signatures Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings, pp. 143-156, 2004, Springer, 3-540-20996-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
server-assisted signature, pervasive computing, digital signature, one-time signature |
11 | Adam Wierzbicki, Tomasz Kucharski |
P2P Scrabble. Can P2P Games Commence? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Computing ![In: 4th International Conference on Peer-to-Peer Computing (P2P 2004), 15-17 August 2004, Zurich, Switzerland, pp. 100-107, 2004, IEEE Computer Society, 0-7695-2156-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
peer-to-peer, distributed hash tables, secret sharing, trust management, commitment protocols |
11 | Markus Jakobsson, Jean-Pierre Hubaux, Levente Buttyán |
A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers, pp. 15-33, 2003, Springer, 3-540-40663-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
multi-hop cellular networks, routing, collaboration, detection, Audit, rational, micro-payment |
Displaying result #601 - #700 of 755 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ >>] |
|