The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cheating with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1989 (15) 1990-1995 (16) 1996-1999 (18) 2000-2001 (27) 2002 (16) 2003 (21) 2004 (25) 2005 (33) 2006 (41) 2007 (43) 2008 (50) 2009 (38) 2010 (19) 2011 (24) 2012 (17) 2013 (30) 2014 (31) 2015 (30) 2016 (18) 2017 (28) 2018 (37) 2019 (23) 2020 (29) 2021 (34) 2022 (35) 2023 (48) 2024 (9)
Publication types (Num. hits)
article(261) incollection(4) inproceedings(486) phdthesis(4)
Venues (Conferences, Journals, ...)
CoRR(46) NETGAMES(14) CRYPTO(12) EUROCRYPT(12) ITiCSE(10) SIGCSE(9) ACISP(8) ICALT(8) ASIACRYPT(7) Comput. Educ.(7) Comput. Hum. Behav.(7) DiGRA Conference(6) EDUCON(5) FIE(5) IACR Cryptol. ePrint Arch.(5) ICISC(5) More (+10 of total 428)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 379 occurrences of 238 keywords

Results
Found 755 publication records. Showing 755 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
11Kemal Bicakci, Nazife Baykal Design and Performance Evaluation of a Flexible and Efficient Server Assisted Signature Protocol. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Qiming Li, Ee-Chien Chang Public Watermark Detection Using Multiple Proxies and Secret Sharing. Search on Bibsonomy IWDW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Yvo Desmedt, Kaoru Kurosawa, Tri Van Le Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Qingtang Liu, Zongkai Yang An Evaluating Strategy for Student Assessment in E-Learning Qingtang L. Search on Bibsonomy ICALT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Jeffrey Shneidman, David C. Parkes Using redundancy to improve robustness of distributed mechanism implementations. Search on Bibsonomy EC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Atsushi Iwasaki, Makoto Yokoo, Kenji Terada A robust open ascending-price multi-unit auction protocol against false-name bids. Search on Bibsonomy EC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Daniele Micciancio, Erez Petrank Simulatable Commitments and Efficient Concurrent Zero-Knowledge. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Doug Szajda, Barry G. Lawson, Jason Owen Hardening Functions for Large Scale Distributed Computations. Search on Bibsonomy S&P The full citation details ... 2003 DBLP  DOI  BibTeX  RDF ringers, distributed computation, probabilistic verification
11Rosaria Conte, Mario Paolucci Social Cognitive Factors of Unfair Ratings in Reputation Reporting Systems. Search on Bibsonomy Web Intelligence The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Germano Caronni, Marcel Waldvogel Establishing Trust in Distributed Storage Providers. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Kenji Terada, Makoto Yokoo False-name-proof multi-unit auction protocol utilizing greedy allocation based on approximate evaluation values. Search on Bibsonomy AAMAS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF false-name-proof, multi-unit auction, mechanism design
11Carlo Blundo, Stelvio Cimato SAWM: a tool for secure and authenticated web metering. Search on Bibsonomy SEKE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF secure metering, e-commerce, auditing
11Wangping, Chengfang, Wanghao, Jiangjin, Meihaijun Goods sending authentification system adapting to e-commerce environment. Search on Bibsonomy ICARCV The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Ivan Damgård, Eiichiro Fujisaki A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Philippe Golle, Sheng Zhong 0002, Dan Boneh, Markus Jakobsson, Ari Juels Optimistic Mixing for Exit-Polls. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Wai Han Soo, Azman Samsudin, Alwyn Goh Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF mental card game, Benes permutation network, Shuffle, mix-net
11Kenji Terada, Makoto Yokoo False-Name-Proof Multi-unit Auction Protocol Utilizing Greedy Allocation Based on Approximate Evaluation Values. Search on Bibsonomy PRIMA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Claude Crépeau, Daniel Gottesman, Adam D. Smith Secure multi-party quantum computation. Search on Bibsonomy STOC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF distributed computing, quantum cryptography, secure function evaluation, multi-party protocols
11Boaz Barak, Oded Goldreich 0001 Universal Arguments and their Applications. Search on Bibsonomy CCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Probabilistic proof systems, computationally-sound proof systems, zero-knowledge proof systems, probabilistic checkable proofs (PCP), collision-free hashing, witness indistinguishable proof systems, error-correcting codes, proofs of knowledge
11Philippe Golle, Stuart G. Stubblebine Secure Distributed Computing in a Commercial Environment. Search on Bibsonomy Financial Cryptography The full citation details ... 2001 DBLP  BibTeX  RDF Distributed computing
11Olivier Baudron, Jacques Stern Non-interactive Private Auctions. Search on Bibsonomy Financial Cryptography The full citation details ... 2001 DBLP  BibTeX  RDF secure circuit evaluation, Auctions, homomorphic encryption, bidding
11David W. Kravitz Aspects of Digital Rights Management and the Use of Hardware Security Devices. Search on Bibsonomy Financial Cryptography The full citation details ... 2001 DBLP  BibTeX  RDF
11Lisa C. Kaczmarczyk Accreditation and student assessment in distance education: why we all need to pay attention. Search on Bibsonomy ITiCSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11Levente Buttyán, Naouel Ben Salem A Payment Scheme for Broadcast Multimedia Streams. Search on Bibsonomy ISCC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11Emmanuel Bresson, Jacques Stern Efficient Revocation in Group Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11Makoto Yokoo, Yuko Sakurai, Shigeo Matsubara Robust Double Auction Protocol against False-Name Bids. Search on Bibsonomy ICDCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11Joy Algesheimer, Christian Cachin, Jan Camenisch, Günter Karjoth Cryptographic Security for Mobile Code. Search on Bibsonomy S&P The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11Yan Zong Ding Oblivious Transfer in the Bounded Storage Model. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11Ding Peng, Shi Jun, Sheng Huan Ye, Liming Li MA/LMA Architecture for Dealing with Malicious Agents in Agent-Mediated Electronic Markets. Search on Bibsonomy E-Commerce Agents The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11Jian-Zhu Lu, Huo Yan Chen Improvement of authenticated encryption scheme with (t, n) shared verification. Search on Bibsonomy COMPSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Factoring and discrete logarithms, Network security, Signature verification, Secret-sharing scheme, Authenticated encryption, Message recovery
11Louise E. Moses, Sally Fincher, James Caristi Teams work (panel session). Search on Bibsonomy SIGCSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
11Douglas R. Stinson, Ruizhong Wei Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
11Sergio Cabello, Carles Padró, Germán Sáez Secret Sharing Schemes with Detection of Cheaters for a General Access Structure. Search on Bibsonomy FCT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Detection of cheaters, Robust and secure schemes, Cryptography, Secret sharing schemes
11Dingyi Pei, Yuqiang Li, Yejing Wang, Reihaneh Safavi-Naini Characterization of Optimal Authentication Codes with Arbitration. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
11Stephen M. Matyas, Allen Roginsky An Effective Defense Against First Party Attacks in Public-Key Algorithms. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Encryption, Hash function, Public key
11Moni Naor, Avishai Wool Access Control and Signatures via Quorum Secret Sharing. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF security, cryptography, replication, secret sharing, Quorum systems
11Markus Jakobsson A Practical Mix. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF privacy, robustness, error detection, Mix-network, decryption
11Owen L. Astrachan, Robert F. Smith, James T. Wilkes Application-based modules using apprentice learning for CS 2. Search on Bibsonomy SIGCSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
11Kouichi Sakurai A Hidden Cryptographic Assunmption in No-Transferable Indentification Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
11Markus Stadler Publicly Verifiable Secret Sharing. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
11Ueli M. Maurer A Unified and Generalized Treatment of Authentification Theory. Search on Bibsonomy STACS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF unconditionally-secure authentication, Cryptography, information theory
11Kaoru Kurosawa, Satoshi Obana Combinatorial Bounds for Authentication Codes with Arbitration. Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
11Kaoru Kurosawa, Satoshi Obana, Wakaha Ogata t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
11Kaoru Kurosawa New Bound on Authentication Code with Arbitration. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
11Olivier Delos, Jean-Jacques Quisquater Efficient multi-signature schemes for cooperating entities. Search on Bibsonomy Algebraic Coding The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
11Peter Gemmell, Moni Naor Codes for Interactive Authentication. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
11Hung-Yu Lin, Lein Harn A Generalized Secret Sharing Scheme With Cheater Detection. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
11Scott Moore, Ronald Curtis A Study of the Prather Software Metric (Abstract). Search on Bibsonomy ACM Conference on Computer Science The full citation details ... 1990 DBLP  DOI  BibTeX  RDF Pascal
11Gilles Brassard, Claude Crépeau, Moti Yung Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds. Search on Bibsonomy ICALP The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
11Gilles Brassard, Claude Crépeau, Moti Yung Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds (Extended Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
11Mihir Bellare, Lenore Cowen, Shafi Goldwasser On the Structure of Secret Key Exchange Protocols. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
11Donald Beaver, Shafi Goldwasser Multiparty Computation with Faulty Majority. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
11Ernest F. Brickell, Douglas R. Stinson The Detection of Cheaters in Threshold Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
11David Chaum, Jan-Hendrik Evertse A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
11Claude Crépeau A Zero-Knowledge Poker Protocol That Achieves Confidentiality of the Players' Strategy or How to Achieve an Electronic Poker Face. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #755 of 755 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license