|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 379 occurrences of 238 keywords
|
|
|
Results
Found 755 publication records. Showing 755 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
11 | Kemal Bicakci, Nazife Baykal |
Design and Performance Evaluation of a Flexible and Efficient Server Assisted Signature Protocol. |
ISCC |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Qiming Li, Ee-Chien Chang |
Public Watermark Detection Using Multiple Proxies and Secret Sharing. |
IWDW |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Yvo Desmedt, Kaoru Kurosawa, Tri Van Le |
Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Qingtang Liu, Zongkai Yang |
An Evaluating Strategy for Student Assessment in E-Learning Qingtang L. |
ICALT |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Jeffrey Shneidman, David C. Parkes |
Using redundancy to improve robustness of distributed mechanism implementations. |
EC |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Atsushi Iwasaki, Makoto Yokoo, Kenji Terada |
A robust open ascending-price multi-unit auction protocol against false-name bids. |
EC |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Daniele Micciancio, Erez Petrank |
Simulatable Commitments and Efficient Concurrent Zero-Knowledge. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Doug Szajda, Barry G. Lawson, Jason Owen |
Hardening Functions for Large Scale Distributed Computations. |
S&P |
2003 |
DBLP DOI BibTeX RDF |
ringers, distributed computation, probabilistic verification |
11 | Rosaria Conte, Mario Paolucci |
Social Cognitive Factors of Unfair Ratings in Reputation Reporting Systems. |
Web Intelligence |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Germano Caronni, Marcel Waldvogel |
Establishing Trust in Distributed Storage Providers. |
Peer-to-Peer Computing |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Kenji Terada, Makoto Yokoo |
False-name-proof multi-unit auction protocol utilizing greedy allocation based on approximate evaluation values. |
AAMAS |
2003 |
DBLP DOI BibTeX RDF |
false-name-proof, multi-unit auction, mechanism design |
11 | Carlo Blundo, Stelvio Cimato |
SAWM: a tool for secure and authenticated web metering. |
SEKE |
2002 |
DBLP DOI BibTeX RDF |
secure metering, e-commerce, auditing |
11 | Wangping, Chengfang, Wanghao, Jiangjin, Meihaijun |
Goods sending authentification system adapting to e-commerce environment. |
ICARCV |
2002 |
DBLP DOI BibTeX RDF |
|
11 | Ivan Damgård, Eiichiro Fujisaki |
A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
11 | Philippe Golle, Sheng Zhong 0002, Dan Boneh, Markus Jakobsson, Ari Juels |
Optimistic Mixing for Exit-Polls. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
11 | Wai Han Soo, Azman Samsudin, Alwyn Goh |
Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
mental card game, Benes permutation network, Shuffle, mix-net |
11 | Kenji Terada, Makoto Yokoo |
False-Name-Proof Multi-unit Auction Protocol Utilizing Greedy Allocation Based on Approximate Evaluation Values. |
PRIMA |
2002 |
DBLP DOI BibTeX RDF |
|
11 | Claude Crépeau, Daniel Gottesman, Adam D. Smith |
Secure multi-party quantum computation. |
STOC |
2002 |
DBLP DOI BibTeX RDF |
distributed computing, quantum cryptography, secure function evaluation, multi-party protocols |
11 | Boaz Barak, Oded Goldreich 0001 |
Universal Arguments and their Applications. |
CCC |
2002 |
DBLP DOI BibTeX RDF |
Probabilistic proof systems, computationally-sound proof systems, zero-knowledge proof systems, probabilistic checkable proofs (PCP), collision-free hashing, witness indistinguishable proof systems, error-correcting codes, proofs of knowledge |
11 | Philippe Golle, Stuart G. Stubblebine |
Secure Distributed Computing in a Commercial Environment. |
Financial Cryptography |
2001 |
DBLP BibTeX RDF |
Distributed computing |
11 | Olivier Baudron, Jacques Stern |
Non-interactive Private Auctions. |
Financial Cryptography |
2001 |
DBLP BibTeX RDF |
secure circuit evaluation, Auctions, homomorphic encryption, bidding |
11 | David W. Kravitz |
Aspects of Digital Rights Management and the Use of Hardware Security Devices. |
Financial Cryptography |
2001 |
DBLP BibTeX RDF |
|
11 | Lisa C. Kaczmarczyk |
Accreditation and student assessment in distance education: why we all need to pay attention. |
ITiCSE |
2001 |
DBLP DOI BibTeX RDF |
|
11 | Levente Buttyán, Naouel Ben Salem |
A Payment Scheme for Broadcast Multimedia Streams. |
ISCC |
2001 |
DBLP DOI BibTeX RDF |
|
11 | Emmanuel Bresson, Jacques Stern |
Efficient Revocation in Group Signatures. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
11 | Makoto Yokoo, Yuko Sakurai, Shigeo Matsubara |
Robust Double Auction Protocol against False-Name Bids. |
ICDCS |
2001 |
DBLP DOI BibTeX RDF |
|
11 | Joy Algesheimer, Christian Cachin, Jan Camenisch, Günter Karjoth |
Cryptographic Security for Mobile Code. |
S&P |
2001 |
DBLP DOI BibTeX RDF |
|
11 | Yan Zong Ding |
Oblivious Transfer in the Bounded Storage Model. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
11 | Ding Peng, Shi Jun, Sheng Huan Ye, Liming Li |
MA/LMA Architecture for Dealing with Malicious Agents in Agent-Mediated Electronic Markets. |
E-Commerce Agents |
2001 |
DBLP DOI BibTeX RDF |
|
11 | Jian-Zhu Lu, Huo Yan Chen |
Improvement of authenticated encryption scheme with (t, n) shared verification. |
COMPSAC |
2000 |
DBLP DOI BibTeX RDF |
Factoring and discrete logarithms, Network security, Signature verification, Secret-sharing scheme, Authenticated encryption, Message recovery |
11 | Louise E. Moses, Sally Fincher, James Caristi |
Teams work (panel session). |
SIGCSE |
2000 |
DBLP DOI BibTeX RDF |
|
11 | Douglas R. Stinson, Ruizhong Wei |
Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures. |
Selected Areas in Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
11 | Sergio Cabello, Carles Padró, Germán Sáez |
Secret Sharing Schemes with Detection of Cheaters for a General Access Structure. |
FCT |
1999 |
DBLP DOI BibTeX RDF |
Detection of cheaters, Robust and secure schemes, Cryptography, Secret sharing schemes |
11 | Dingyi Pei, Yuqiang Li, Yejing Wang, Reihaneh Safavi-Naini |
Characterization of Optimal Authentication Codes with Arbitration. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
11 | Stephen M. Matyas, Allen Roginsky |
An Effective Defense Against First Party Attacks in Public-Key Algorithms. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
Encryption, Hash function, Public key |
11 | Moni Naor, Avishai Wool |
Access Control and Signatures via Quorum Secret Sharing. |
IEEE Trans. Parallel Distributed Syst. |
1998 |
DBLP DOI BibTeX RDF |
security, cryptography, replication, secret sharing, Quorum systems |
11 | Markus Jakobsson |
A Practical Mix. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
privacy, robustness, error detection, Mix-network, decryption |
11 | Owen L. Astrachan, Robert F. Smith, James T. Wilkes |
Application-based modules using apprentice learning for CS 2. |
SIGCSE |
1997 |
DBLP DOI BibTeX RDF |
|
11 | Kouichi Sakurai |
A Hidden Cryptographic Assunmption in No-Transferable Indentification Schemes. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
11 | Markus Stadler |
Publicly Verifiable Secret Sharing. |
EUROCRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
11 | Ueli M. Maurer |
A Unified and Generalized Treatment of Authentification Theory. |
STACS |
1996 |
DBLP DOI BibTeX RDF |
unconditionally-secure authentication, Cryptography, information theory |
11 | Kaoru Kurosawa, Satoshi Obana |
Combinatorial Bounds for Authentication Codes with Arbitration. |
EUROCRYPT |
1995 |
DBLP DOI BibTeX RDF |
|
11 | Kaoru Kurosawa, Satoshi Obana, Wakaha Ogata |
t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
11 | Kaoru Kurosawa |
New Bound on Authentication Code with Arbitration. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
11 | Olivier Delos, Jean-Jacques Quisquater |
Efficient multi-signature schemes for cooperating entities. |
Algebraic Coding |
1993 |
DBLP DOI BibTeX RDF |
|
11 | Peter Gemmell, Moni Naor |
Codes for Interactive Authentication. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
11 | Hung-Yu Lin, Lein Harn |
A Generalized Secret Sharing Scheme With Cheater Detection. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
11 | Scott Moore, Ronald Curtis |
A Study of the Prather Software Metric (Abstract). |
ACM Conference on Computer Science |
1990 |
DBLP DOI BibTeX RDF |
Pascal |
11 | Gilles Brassard, Claude Crépeau, Moti Yung |
Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds. |
ICALP |
1989 |
DBLP DOI BibTeX RDF |
|
11 | Gilles Brassard, Claude Crépeau, Moti Yung |
Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds (Extended Abstract). |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
11 | Mihir Bellare, Lenore Cowen, Shafi Goldwasser |
On the Structure of Secret Key Exchange Protocols. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
11 | Donald Beaver, Shafi Goldwasser |
Multiparty Computation with Faulty Majority. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
11 | Ernest F. Brickell, Douglas R. Stinson |
The Detection of Cheaters in Threshold Schemes. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
11 | David Chaum, Jan-Hendrik Evertse |
A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
|
11 | Claude Crépeau |
A Zero-Knowledge Poker Protocol That Achieves Confidentiality of the Players' Strategy or How to Achieve an Electronic Poker Face. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
|
Displaying result #701 - #755 of 755 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8] |
|