The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cheating with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1989 (15) 1990-1995 (16) 1996-1999 (18) 2000-2001 (27) 2002 (16) 2003 (21) 2004 (25) 2005 (33) 2006 (41) 2007 (43) 2008 (50) 2009 (38) 2010 (19) 2011 (24) 2012 (17) 2013 (30) 2014 (31) 2015 (30) 2016 (18) 2017 (28) 2018 (37) 2019 (23) 2020 (29) 2021 (34) 2022 (35) 2023 (48) 2024 (9)
Publication types (Num. hits)
article(261) incollection(4) inproceedings(486) phdthesis(4)
Venues (Conferences, Journals, ...)
CoRR(46) NETGAMES(14) CRYPTO(12) EUROCRYPT(12) ITiCSE(10) SIGCSE(9) ACISP(8) ICALT(8) ASIACRYPT(7) Comput. Educ.(7) Comput. Hum. Behav.(7) DiGRA Conference(6) EDUCON(5) FIE(5) IACR Cryptol. ePrint Arch.(5) ICISC(5) More (+10 of total 428)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 379 occurrences of 238 keywords

Results
Found 755 publication records. Showing 755 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Yoram Moses, Danny Dolev, Joseph Y. Halpern Cheating Husbands and other Stories: A Case Study of Knowledge, Action, and Communication. Search on Bibsonomy Distributed Comput. The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
17Ian Bowler The Synthesis of Complex Audio Spectra by Cheating Quite a Lot. Search on Bibsonomy ICMC The full citation details ... 1985 DBLP  BibTeX  RDF
17Yoram Moses, Danny Dolev, Joseph Y. Halpern Cheating Husbands and Other Stories: A Case Study of Knowledge, Action, and Communication (Preliminary Version). Search on Bibsonomy PODC The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
17Mary Shaw, Anita Jones, Paul Knueven, John McDermott, Philip Miller 0001, David Notkin Cheating Policy in a Computer Science Department. Search on Bibsonomy ACM SIGCSE Bull. The full citation details ... 1980 DBLP  DOI  BibTeX  RDF
11Huawang Qin, Yuewei Dai, Zhiquan Wang A secret sharing scheme based on (t, n) threshold and adversary structure. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Adversary structure, Cryptography, Information security, Secret sharing, Threshold
11Lifeng Lai, Hesham El Gamal, H. Vincent Poor Authentication Over Noisy Channels. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11David Pinelle, Nelson Wong, Tadeusz Stach, Carl Gutwin Usability heuristics for networked multiplayer games. Search on Bibsonomy GROUP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF NGH, game usability, networked game heuristics, usability, heuristic evaluation, networked games, multiplayer games
11Chien-Ju Ho, Tao-Hsuan Chang, Jong-Chuan Lee, Jane Yung-jen Hsu, Kuan-Ta Chen KissKissBan: a competitive human computation game for image annotation. Search on Bibsonomy KDD Workshop on Human Computation The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Amazon Mechanical Turk, ESP game, image annotation, human computation, games with a purpose
11James B. Fenwick Jr., Cindy Norris, E. Frank Barry, Josh Rountree, Cole J. Spicer, Scott D. Cheek Another look at the behaviors of novice programmers. Search on Bibsonomy SIGCSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF compilation, pattern, cs1, behavior
11Benoît Libert, Damien Vergnaud Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF efficiency, traceability, Identity-based encryption
11Jing Li 0075, Dianfu Ma, Jun Han, Xiang Long Toward Trustworthy Semantic Web Service Discovery and Selection. Search on Bibsonomy ATC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Services, Service Discovery, Semantic Web Service, Trustworthy
11Martin Serrano, Sven van der Meer, John Strassner, Stefano De Paoli, Aphra Kerr, Cristiano Storni Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications. Search on Bibsonomy ATC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Pervasive Services, Social Networks, Pervasive Computing, Information Systems, Trust Management, Systems Management, Policy-Based Management, Autonomic Communications, Reputation Mechanisms
11Svend Rothmann Bonde, Lise Vestergaard Jensen, Emil Sellström, Stephan Suesmann Draw poker. Search on Bibsonomy SIGGRAPH ASIA Animations The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Rahul Jain 0001 New Binding-Concealing Trade-Offs for Quantum String Commitment. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF String commitment, Quantum channels, Observational divergence, Substate theorem, Relative entropy
11Han Yu 0001, Zhiqi Shen 0001, Chunyan Miao A goal-oriented development tool to automate the incorporation of intelligent agents into interactive digital media applications. Search on Bibsonomy Comput. Entertain. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distributed system, multi-agent system, intelligent agent, design tool, goal-oriented
11G. I. Ankoudinov, I. G. Ankoudinov, A. I. Strizhachenko Multi-Variant Assignment Generation and Assessment Techniques. Search on Bibsonomy Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Alison Gazzard Grand Theft algorithm: purposeful play, appropriated play and aberrant players. Search on Bibsonomy MindTrek The full citation details ... 2008 DBLP  DOI  BibTeX  RDF aberrant players, appropriated play, purposeful play, flow, videogame
11Xu An Wang 0001, Xinyi Huang 0001, Xiaoyuan Yang 0002 Further Observations on Certificateless Public Key Encryption. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Paolo Penna, Carmine Ventre Collusion-Resistant Mechanisms with Verification Yielding Optimal Solutions. Search on Bibsonomy ESA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Sean Hallgren, Alexandra Kolla, Pranab Sen, Shengyu Zhang Making Classical Honest Verifier Zero Knowledge Protocols Secure against Quantum Attacks. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu A game theoretic framework for incentive-based peer-to-peer live-streaming social networks. Search on Bibsonomy ICASSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Jing Xi, Pengpeng Nie, Jiande Lu A P2P Trust Model Based on Dynamic Fuzzy Theory -- BGTR. Search on Bibsonomy ISIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, p2p, trust, fuzzy
11Shaili Jain, David C. Parkes A Game-Theoretic Analysis of Games with a Purpose. Search on Bibsonomy WINE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Hamed Janzadeh, Kaveh Fayazbakhsh, Bahador Bakhshi, Mehdi Dehghan 0001 A Novel Incentive-Based and Hardware-Independent Cooperation Mechanism for MANETs. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Georgios Smaragdakis, Vassilis Lekakis, Nikolaos Laoutaris, Azer Bestavros, John W. Byers, Mema Roussopoulos EGOIST: overlay routing using selfish neighbor selection. Search on Bibsonomy CoNEXT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF overlay network creation and maintenance, selfish neighbor selection, overlay routing
11Éric Levieil, David Naccache Cryptographic Test Correction. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Lisha Chen-Wilson, Patrick Newcombe, Piers Royce, Samuel Ong, Timothy Wonnacott, Gary B. Wills, David Argles Secure Certification for ePortfolios. Search on Bibsonomy ICALT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Elisardo González-Agulla, Luis E. Anido-Rifón, José Luis Alba-Castro, Carmen García-Mateo Is My Student at the Other Side? Applying Biometric Web Authentication to E-Learning Environments. Search on Bibsonomy ICALT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Narayanan Kulathuramaiyer, Bilal Zaka, Denis Helic Integrated Copy-Paste Checking: Design and Services. Search on Bibsonomy ICALT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Ivan Damgård, Jesper Buus Nielsen, Daniel Wichs Isolated Proofs of Knowledge and Isolated Zero Knowledge. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Yuko Sakurai, Yasumasa Saito, Atsushi Iwasaki, Makoto Yokoo Beyond Quasi-linear Utility: Strategy/False-Name-Proof Multi-unit Auction Protocols. Search on Bibsonomy IAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Zhengfeng Hou, Jianghong Han, Donghui Hu A New Authentication Scheme Based on Verifiable Secret Sharing. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Qiang Zhang, Ying Zhuo, Zhenghu Gong A Trust Inspection Model Based on Society Behavior Similarity Rule in Dynamic Networks. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Qi Chen, Song-Nian Yu, Sisi Cheng Link Variable TrustRank for Fighting Web Spam. Search on Bibsonomy CSSE (4) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Carlos Eduardo Benevides Bezerra, Fábio Reis Cecin, Cláudio F. R. Geyer A3: A Novel Interest Management Algorithm for Distributed Simulations of MMOGs. Search on Bibsonomy DS-RT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Wiebren de Jonge, Bart Jacobs 0001 Privacy-Friendly Electronic Traffic Pricing via Commits. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Christoph Neumann, Nicolas Prigent, Matteo Varvello, Kyoungwon Suh Challenges in peer-to-peer gaming. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF overlay online-gaming, security, peer-to-peer
11Guang Tan, Stephen A. Jarvis Improving the Fault Resilience of Overlay Multicast for Media Streaming. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Reliability, peer-to-peer, multicast, overlay, media streaming, fault resilience
11Patric Kabus, Alejandro P. Buchmann Design of a cheat-resistant P2P online gaming system. Search on Bibsonomy DIMEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Melek Önen, Abdullatif Shikfa, Refik Molva Optimistic fair exchange for secure forwarding. Search on Bibsonomy MobiQuitous The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Yitao Duan, John F. Canny, Justin Z. Zhan Efficient Privacy-Preserving Association Rule Mining: P4P Style. Search on Bibsonomy CIDM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Yonatan Aumann, Yehuda Lindell Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Paul Rabinovich, Robert Simon Secure Aggregation in Sensor Networks Using Neighborhood Watch. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Gennaro Costagliola, Vittorio Fuccella, Massimiliano Giordano, Giuseppe Polese Logging and Visualization of Learner Behaviour in Web-Based E-Testing. Search on Bibsonomy ICWL The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Bogdan Carbunar, Brett Lindsley, Michael Pearce, Venu Vasudevan Verifiable Credit Based Transfers in Wireless Ad Hoc Networks. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Wun-She Yap, Swee-Huay Heng, Bok-Min Goi Cryptanalysis of Some Proxy Signature Schemes Without Certificates. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF attack, Proxy signature, identity-based, certificateless
11Shane Balfe, Anish Mohammed Final Fantasy - Securing On-Line Gaming with Trusted Computing. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Kristal T. Pollack, Darrell D. E. Long, Richard A. Golding, Ralph A. Becker-Szendy, Benjamin C. Reed Quota enforcement for high-performance distributed storage systems. Search on Bibsonomy MSST The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Souvik Ray, Giora Slutzki, Zhao Zhang Incentive-Driven P2P Anonymity System: A Game-Theoretic Approach. Search on Bibsonomy ICPP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Dong-Her Shih, Chih-Hung Cheng, Jui-Chi Shen A Secure Protocol of Reverse Discriminatory Auction with Bid Privacy. Search on Bibsonomy ICMB The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Li Zhang 0066, Ping-Ping Zhou, Gong-bin Qian, Zhen Ji A DWT Blind Image Watermarking Strategy with Secret Sharing. Search on Bibsonomy PCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF blind image watermarking, secret sharing, closed loop, Stirmark
11N. R. Sunitha, B. B. Amberker, Prashant Koulgi Controlled Delegation in e-cheques Using Proxy Signatures. Search on Bibsonomy EDOC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Se- curity, Digital Signature, Proxy Signature, DSA
11Akcell Motivate AI Class with Interactive Computer Game. Search on Bibsonomy DIGITEL The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Duen Horng Chau, Shashank Pandit, Christos Faloutsos Detecting Fraudulent Personalities in Networks of Online Auctioneers. Search on Bibsonomy PKDD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich How to win the clonewars: efficient periodic n-times anonymous authentication. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF n-anonymous authentication, credentials, clone detection
11Wei Zhou, Ke Xu, J. Liu, Chi-Hung Chi Truthful application-layer multicast in mesh-based selfish overlays. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Shunsaku Kato, Shuichi Miyazaki, Yusuke Nishimura, Yasuo Okabe Cheat-Proof Serverless Network Games. Search on Bibsonomy Computers and Games The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Tom R. Wielicki Integrity of Online Testing in E-Learning: Empirical Study. Search on Bibsonomy PerCom Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Qiming Li, Ee-Chien Chang Zero-knowledge watermark detection resistant to ambiguity attacks. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ambiguity attack, zero-knowledge proof, watermark detection
11Keiichi Endo, Minoru Kawahara, Yutaka Takahashi 0001 A proposal of encoded computations for distributed massively multiplayer online services. Search on Bibsonomy Advances in Computer Entertainment Technology The full citation details ... 2006 DBLP  DOI  BibTeX  RDF distributed massively multiplayer online services, encoded computations, interactive real-time applications, peer-to-peer
11Emmanuelle Anceaume, Aina Ravoaja Incentive-Based Robust Reputation Mechanism for P2P Services. Search on Bibsonomy OPODIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Reputation, peer-to-peer systems, credibility, free-riding, collusion
11Omkant Pandey, Julien Cathalo, Jean-Jacques Quisquater Fair Identification. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Spyridon Antonakopoulos Fast leader-election protocols with bounded cheaters' edge. Search on Bibsonomy STOC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF distributed computing, leader election, coin-flipping
11Mark Manulis, Ahmad-Reza Sadeghi Property-Based Taming of Lying Mobile Nodes. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Song Han 0004, Elizabeth Chang 0001, Tharam S. Dillon, Jie Wang 0038 Improvement of a Convertible Undeniable Partially Blind Signature Scheme. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Partially blind signature, Convertible undeniable signature, Security protocol, Blind signature, Undeniable signature
11Fábio Reis Cecin, Cláudio Fernando Resin Geyer, Solon Rabello, Jorge L. V. Barbosa A peer-to-peer simulation technique for instanced massively multiplayer games. Search on Bibsonomy DS-RT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Samarth Shetty, Patricio Galdames, Wallapak Tavanapong, Ying Cai Detecting Malicious Peers in Overlay Multicast Streaming. Search on Bibsonomy LCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Radu Jurca, Boi Faltings Using CHI-scores to reward honest feedback from repeated interactions. Search on Bibsonomy AAMAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF honest reporting, reputation mechanisms
11Kenneth A. Ross Academic dishonesty and the Internet. Search on Bibsonomy Commun. ACM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Philippe Golle, Nicolas Ducheneaut Preventing bots from playing online games. Search on Bibsonomy Comput. Entertain. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF reverse Turing test, agents, games, CAPTCHAs, bots
11Chrisantha Fernando The Good Symbiont. Search on Bibsonomy ECAL The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Matthew Yurkewych, Brian Neil Levine, Arnold L. Rosenberg On the cost-ineffectiveness of redundancy in commercial P2P computing. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF game theory, redundancy, P2P computing, collusion
11Li Tang, Jun Li 0003, Jin Zhou, Zhizhi Zhou, Hao Wang, Kai Li FreeRank: implementing independent ranking service for multiplayer online games. Search on Bibsonomy NETGAMES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF freerank, ranking service, multiplayer online games
11Guilin Wang An abuse-free fair contract signing protocol based on the RSA signature. Search on Bibsonomy WWW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, e-commerce, digital signatures, RSA, cryptographic protocols, fair-exchange, contract signing
11Matt Lepinski, Silvio Micali, Abhi Shelat Fair-Zero Knowledge. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Frank Stajano Repairing the Bluetooth Pairing Protocol. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Markus Jakobsson, Liu Yang Quantifying Security in Hybrid Cellular Networks. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Le-Hung Vu, Manfred Hauswirth, Karl Aberer QoS-Based Service Selection and Ranking with Trust and Reputation Management. Search on Bibsonomy OTM Conferences (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Alexei Tretiakov, Kinshuk An Allocation Model for Automatic Assignment Generation and Marking. Search on Bibsonomy ICALT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Wei Yu 0003, Yan Sun 0001, K. J. Ray Liu HADOF: defense against routing disruptions in mobile ad hoc networks. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Sandra M. Richardson, Kelly McNamara Hilmer, James F. Courtney Compliance with Codes of Ethical Conduct: The Effects of Authority and Proximity on Ethical Reasoning. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Maosheng Li, Shoubao Yang, Qianfei Fu, Yang Jin Research on Grid Resource Reliability Model Based on Promise. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF resource reliability, promise, signaling game, grid computing, market
11Joaquín García 0001, Frédéric Cuppens, Fabien Autrel, Jordi Castellà-Roca, Joan Borrell, Guillermo Navarro 0001, Jose A. Ortega-Ruiz Protecting On-Line Casinos against Fraudulent Player Drop-Out. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11MyungJoo Ham, Gul Agha ARA: A Robust Audit to Prevent Free-Riding in P2P Networks. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Doug Szajda, Barry Lawson 0001, Jason Owen Toward an Optimal Redundancy Strategy for Distributed Computations. Search on Bibsonomy CLUSTER The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Alfredo De Santis, Barbara Masucci Anonymous Membership Broadcast Schemes. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF anonymity, permutation groups, pseudorandom permutations
11Fábio Reis Cecin, Rafael de Oliveira Jannone, Cláudio F. R. Geyer, Márcio Garcia Martins 0002, Jorge L. V. Barbosa FreeMMG: a hybrid peer-to-peer and client-server model for massively multiplayer games. Search on Bibsonomy NETGAMES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cheat-proof games, peer-to-peer, massively multiplayer games
11Boaz Barak, Rafael Pass On the Possibility of One-Message Weak Zero-Knowledge. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Ivan Damgård, Serge Fehr, Kirill Morozov, Louis Salvail Unfair Noisy Channels and Oblivious Transfer. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Andris Ambainis, Markus Jakobsson, Helger Lipmaa Cryptographic Randomized Response Techniques. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF randomized response technique, privacy, privacy-preserving data-mining, oblivious transfer, polling, binary symmetric channel
11Ko-Kang Chu, Maiga Chang, Yen-Teh Hsia A hybrid training mechanism for applying neural networks to Web-based applications. Search on Bibsonomy SMC (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Feng Bao 0001, Guilin Wang, Jianying Zhou 0001, Huafei Zhu Analysis and Improvement of Micali's Fair Contract Signing Protocol. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Philippe Golle, Ari Juels Dining Cryptographers Revisited. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Chris GauthierDickey, Daniel Zappala, Virginia Mary Lo, James Marr Low latency and cheat-proof event ordering for peer-to-peer games. Search on Bibsonomy NOSSDAV The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cheat-proof, peer-to-peer, interactive, games, distributed, low-latency
11Jean-Pierre Hubaux Rational behaviors in hotspots and in ad hoc networks. Search on Bibsonomy MSWiM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Tianjie Cao, Dongdai Lin, Rui Xue 0001 Security Analysis of User Efficient Blind Signatures. Search on Bibsonomy AWCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Chunbo Ma, Dake He A New Chameleon Multi-signature Based on Bilinear Pairing. Search on Bibsonomy GCC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Kemal Bicakci, Nazife Baykal Server Assisted Signatures Revisited. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF server-assisted signature, pervasive computing, digital signature, one-time signature
11Adam Wierzbicki, Tomasz Kucharski P2P Scrabble. Can P2P Games Commence? Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2004 DBLP  DOI  BibTeX  RDF peer-to-peer, distributed hash tables, secret sharing, trust management, commitment protocols
11Markus Jakobsson, Jean-Pierre Hubaux, Levente Buttyán A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. Search on Bibsonomy Financial Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF multi-hop cellular networks, routing, collaboration, detection, Audit, rational, micro-payment
Displaying result #601 - #700 of 755 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license