The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for collusion with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1998 (15) 1999-2001 (31) 2002 (26) 2003 (52) 2004 (39) 2005 (87) 2006 (89) 2007 (87) 2008 (86) 2009 (78) 2010 (49) 2011 (46) 2012 (34) 2013 (40) 2014 (41) 2015 (28) 2016 (63) 2017 (45) 2018 (48) 2019 (46) 2020 (65) 2021 (59) 2022 (64) 2023 (74) 2024 (21)
Publication types (Num. hits)
article(544) incollection(5) inproceedings(757) phdthesis(7)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 491 occurrences of 278 keywords

Results
Found 1313 publication records. Showing 1313 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Youwen Zhu, Zhikuan Wang, Jian Wang 0038 Collusion-resisting secure nearest neighbor query over encrypted data in cloud, revisited. Search on Bibsonomy IWQoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Yuhong Liu, Na Li 0008 An Advanced Collusion Attack against User Friendship Privacy in OSNs. Search on Bibsonomy COMPSAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Sai Samrat Malka, Na Li 0008, Venu Madhavi Doddapaneni, Yuhong Liu, Anil Kumar Pamulapati A Web Application For Studying Collusion Attacks Through Friend Search Engine. Search on Bibsonomy COMPSAC Workshops The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Linchao Zhang, Hua Ma, Zhenhua Liu 0001, Enting Dong Security Analysis and Improvement of A Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme. Search on Bibsonomy BWCCA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Anes Yessembayev, Dilip Sarkar Secure data aggregation algorithms for sensor networks in the presence of collusion attacks. Search on Bibsonomy PerCom Workshops The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Shahrzad Gholami, Bryan Wilder, Matthew Brown 0002, Dana Thomas, Nicole D. Sintov, Milind Tambe Toward Addressing Collusion Among Human Adversaries in Security Games. Search on Bibsonomy ECAI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Irina Mariuca Asavoae, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh Utilising $${\mathbb {K}}$$ Semantics for Collusion Detection in Android Applications. Search on Bibsonomy FMICS-AVoCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Xiaoming Duan, Nikolaos M. Freris, Peng Cheng 0001 Secure clock synchronization under collusion attacks. Search on Bibsonomy Allerton The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Tengteng Shen, WenAn Tan, Yong Sun, Li Huang Identifying Collusion Attack Based on Preference Similarity in Mixed Reputation Recommendation Model. Search on Bibsonomy HCC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15André Nasserala, Igor Monteiro Moraes Analyzing the producer-consumer collusion attack in Content-Centric Networks. Search on Bibsonomy CCNC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Emily Grace, Ankit Rai, Elissa M. Redmiles, Rayid Ghani Detecting fraud, corruption, and collusion in international development contracts: The design of a proof-of-concept automated system. Search on Bibsonomy IEEE BigData The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Liu Cao, Yuqing Sun 0001, Shaoqing Wang, Mingzhu Li Detecting Malicious Behavior and Collusion for Online Rating System. Search on Bibsonomy Trustcom/BigDataSE/ISPA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Weizhi Meng 0001, Xiapu Luo, Wenjuan Li 0001, Yan Li 0075 Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice. Search on Bibsonomy Trustcom/BigDataSE/ISPA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Irina Mariuca Asavoae, Jorge Blasco, Thomas M. Chen, Harsha Kumara Kalutarage, Igor Muttik, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh Towards Automated Android App Collusion Detection. Search on Bibsonomy IMPS@ESSoS The full citation details ... 2016 DBLP  BibTeX  RDF
15Shweta Bhandari, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur Intersection Automata Based Model for Android Application Collusion. Search on Bibsonomy AINA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15David Megías 0001, Amna Qureshi Enhanced Collusion Resistance for Segment-wise Recombined Fingerprinting in P2P Distribution Systems: [Extended Abstract]. Search on Bibsonomy IH&MMSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Md. Zakirul Alam Bhuiyan, Jie Wu 0001 Collusion Attack Detection in Networked Systems. Search on Bibsonomy DASC/PiCom/DataCom/CyberSciTech The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Qikun Xiang, Ido Nevat, Pengfei Zhang 0001, Jie Zhang 0002 Collusion-resistant Spatial Phenomena Crowdsourcing via Mixture of Gaussian Processes Regression. Search on Bibsonomy TRUST@AAMAS The full citation details ... 2016 DBLP  BibTeX  RDF
15Atsushi Iwasaki, Tadashi Sekiguchi, Shun Yamamoto, Makoto Yokoo How is Cooperation/collusion Sustained in Repeated Multimarket Contact with Observation Errors?: (Extended Abstract). Search on Bibsonomy AAMAS The full citation details ... 2016 DBLP  BibTeX  RDF
15Shahrzad Gholami, Bryan Wilder, Matthew Brown 0002, Arunesh Sinha, Nicole D. Sintov, Milind Tambe SPECTRE: A Game Theoretic Framework for Preventing Collusion in Security Games (Demonstration). Search on Bibsonomy AAMAS The full citation details ... 2016 DBLP  BibTeX  RDF
15Marcel Schäfer, Waldemar Berchtold, Teetje Stark, Nils Reimers 0001, Martin Steinebach A Novel Attack Model for Collusion Secure Fingerprinting Codes. Search on Bibsonomy Media Watermarking, Security, and Forensics The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Marcel Schäfer Collusion Secure Fingerprint Watermarking. Search on Bibsonomy 2016   RDF
15Daniel Friedman, Steffen Huck, Ryan Oprea, Simon Weidenholzer From imitation to collusion: Long-run learning in a low-information environment. Search on Bibsonomy J. Econ. Theory The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Jimmy Chan, Wenzhang Zhang Collusion enforcement with private information and private monitoring. Search on Bibsonomy J. Econ. Theory The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Myong-Son Sin, Ryul Kim Some new results on equivalency of collusion-secure properties for Reed-Solomon codes. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Mina Niknafs, Sadegh Dorri Nogoorani, Rasool Jalili A collusion mitigation scheme for reputation systems. Search on Bibsonomy ISC Int. J. Inf. Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Byung-Ho Cha, Sang-Il Choi Continuous media fingerprinting against time-varying collusion attacks. Search on Bibsonomy Inf. Sci. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Óscar García-Morchón, Ronald Rietman, Ludo Tolhuizen, Domingo Gómez, Jaime Gutierrez 0001 HIMMO: a collusion-resistant identity-based scheme for symmetric key generation. Search on Bibsonomy ACM Commun. Comput. Algebra The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Hui Feng 0002, Langxiong Gan, Hefei Ling, Fuhao Zou, Zhengding Lu A generic collusion attack optimization strategy for traditional spread-spectrum and quantization index modulation fingerprinting. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Jung Yeon Hwang, Ku-Young Chang, Hyun Sook Cho, Boyeon Song, Willy Susilo Collusion-resistant convertible ring signature schemes. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Suneel Sarswat, Kandathil Mathew Abraham, Subir Kumar Ghosh Identifying collusion groups using spectral clustering. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
15Omkar D. Palsule-Desai Complete Versus Partial Collusion in Competing Coalitions. Search on Bibsonomy IGTR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Iman Kashefi, Maryam Kassiri, Mazleena Salleh Preventing collusion attack in android. Search on Bibsonomy Int. Arab J. Inf. Technol. The full citation details ... 2015 DBLP  BibTeX  RDF
15Jikai Teng, Chuankun Wu A collusion attack on asymmetric group key exchange. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Rong Jiang 0001, Rongxing Lu, Jun Luo 0011, Chengzhe Lai, Xuemin Sherman Shen Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Jan Hajny, Petr Dzurenda, Lukas Malina Attribute-based credentials with cryptographic collusion prevention. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15 Collusion Resistant Aggregation from Convertible Tags. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
15Zhen Liu 0008, Duncan S. Wong Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
15En Zhang, Quandang Sun, Yapeng Liu 抗合谋理性多秘密共享方案 (Collusion-free Rational Multi-secret Sharing Scheme). Search on Bibsonomy 计算机科学 The full citation details ... 2015 DBLP  BibTeX  RDF
15Conny Kühne, Klemens Böhm Protecting the Dawid-Skene algorithm against low-competence raters and collusion attacks with gold-selection strategies. Search on Bibsonomy Soc. Netw. Anal. Min. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Ahmed Bendahmane, Mohamed Essaaidi, Ahmed El Moussaoui, Ali Younes The Effectiveness of Reputation-Based Voting for Collusion Tolerance in Large-Scale Grids. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Taeho Jung, Xiang-Yang Li 0001, Meng Wan Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Minoru Kuribayashi, Hans Georg Schaathun Image fingerprinting system based on collusion secure code and watermarking method. Search on Bibsonomy ICIP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Wei Yang 0011, Liusheng Huang, Lu Li, Mingjun Xiao, Xiaorong Lu, Yao Shen, Youwen Zhu Hamburger attack: A collusion attack against privacy-preserving data aggregation schemes. Search on Bibsonomy IWQoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Thach V. Bui, Thuc Dinh Nguyen, Noboru Sonehara, Isao Echizen Tradeoff Between the Price of Distributing a Database and Its Collusion Resistance Based on Concatenated Codes. Search on Bibsonomy ICA3PP (2) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Atsushi Iwasaki, Tadashi Sekiguchi, Shun Yamamoto, Makoto Yokoo How Is Cooperation/Collusion Sustained in Repeated Multimarket Contact with Observation Errors? Search on Bibsonomy AAAI Fall Symposia The full citation details ... 2015 DBLP  BibTeX  RDF
15Zhen Liu 0008, Duncan S. Wong Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-Resistant Blackbox Traceable. Search on Bibsonomy ICICS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Lei Dong, Xuan Chen, Jianxiang Zhu, Hong Chen 0001, Ke Wang 0001, Cuiping Li 0001 A Secure Collusion-Aware and Probability-Aware Range Query Processing in Tiered Sensor Networks. Search on Bibsonomy SRDS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Mohsen Rezvani Trust-Based Data Aggregation for WSNs in the Presence of Faults and Collusion Attacks. Search on Bibsonomy 2015   RDF
15Peter Kieseberg, Sebastian Schrittwieser, Martin Mulazzani, Isao Echizen, Edgar R. Weippl An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata. Search on Bibsonomy Electron. Mark. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Zichuan Xu, Weifa Liang Collusion-Resistant Repeated Double Auctions for Relay Assignment in Cooperative Networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Robert Fraser Collaboration, Collusion and Plagiarism in Computer Science Coursework. Search on Bibsonomy Informatics Educ. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Kentaro Kojima Collusion properties of coalition values for games in characteristic function form. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Youwen Zhu, Tsuyoshi Takagi, Rong Hu Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Michael Clear, Constantinos Patsakis, Paul Laird Lightweight Self-Bootstrapping Multiparty Computations of Time-Series Data with Custom Collusion Tolerance. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
15Vinod Kumar Verma, Surinder Singh, N. P. Pathak Collusion Based Realization of Trust and Reputation Models in Extreme Fraudulent Environment over Static and Dynamic Wireless Sensor Networks. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Mehmet Barlo, Ayça Özdogan Optimality of linearity with collusion and renegotiation. Search on Bibsonomy Math. Soc. Sci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Manoj Singh Gaur, Rajbir Kaur, P. Lalith Suresh, Vijay Laxmi Exploiting convergence characteristics to tackle collusion attacks in OLSR for Security and Communication Networks. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Yang Wang 0074, Willy Susilo, Man Ho Au, Guilin Wang Collusion-Resistance in Optimistic Fair Exchange. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Felix Günther 0001, Mark Manulis, Andreas Peter Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
15Ryotaro Hayashi 0001, Tatsuyuki Matsushita A Proxy Re-Encryption Scheme with the Unforgeability of Re-Encryption Keys against Collusion Attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
15Stefano Tessaro, David A. Wilson Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
15Zhen Liu 0008, Zhenfu Cao, Duncan S. Wong Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
15Oscar García Morchon, Ronald Rietman, Ludo Tolhuizen, Domingo Gómez-Pérez, Jaime Gutierrez 0001 HIMMO - A Lightweight, Fully Collusion Resistant Key Pre-Distribution Scheme. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
15Oscar García Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen, Jose Luis Torre-Arce DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
15Xiaoying Zhang, Lei Dong, Hui Peng 0002, Hong Chen 0001, Suyun Zhao, Cuiping Li 0001 Collusion-Aware Privacy-Preserving Range Query in Tiered Wireless Sensor Networks. Search on Bibsonomy Sensors The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Paolo Penna, Carmine Ventre Optimal collusion-resistant mechanisms with verification. Search on Bibsonomy Games Econ. Behav. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Shiran Rachmilevitch First-best collusion without communication. Search on Bibsonomy Games Econ. Behav. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15André Casajus Collusion, quarrel, and the Banzhaf value. Search on Bibsonomy Int. J. Game Theory The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15George P. Corser, Huirong Fu, Tao Shu, Patrick D'Errico, Warren Ma, Supeng Leng, Ye Zhu 0001 Privacy-by-Decoy: Protecting location privacy against collusion and deanonymization in vehicular location based services. Search on Bibsonomy Intelligent Vehicles Symposium The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Zhen Liu 0008, Zhenfu Cao, Duncan S. Wong Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Constantinos Patsakis, Michael Clear, Paul Laird Private Aggregation with Custom Collusion Tolerance. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Seyed Ali Mousavifar, Cyril Leung Centralized Collusion Attack in Cognitive Radio Collaborative Spectrum Sensing. Search on Bibsonomy VTC Fall The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Ashiqur R. KhudaBukhsh, Jaime G. Carbonell, Peter J. Jansen Detecting Non-Adversarial Collusion in Crowdsourcing. Search on Bibsonomy HCOMP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Qin Zhang, Loukas Lazos Collusion-resistant query anonymization for location-based services. Search on Bibsonomy ICC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi A Trust Management Based Security Mechanism against Collusion Attacks in a MANET Environment. Search on Bibsonomy ARES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Zhaohong Wang, Ying Luo 0008, Sen-ching Samson Cheung Efficient multi-party computation with collusion-deterred secret sharing. Search on Bibsonomy ICASSP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Juan J. Alcaraz, Mihaela van der Schaar Intervention framework for counteracting collusion in spectrum leasing systems. Search on Bibsonomy ICASSP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Jalal Etesami, Negar Kiyavash A novel collusion attack on finite alphabet digital fingerprinting systems. Search on Bibsonomy ISIT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Hiroki Koga On the capacity and the zero-error capacity of k-resilient AND anti-collusion codes. Search on Bibsonomy ITW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Yousef N. Shnaiwer, Salam A. Zummo The effect of collusion games on the profit of primary networks and secondary heterogeneous cognitive radio networks with femtocells. Search on Bibsonomy CrownCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Stefano Tessaro, David A. Wilson Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Zohre Fath Fathabadi, Sadegh Dorri Nogoorani, Ali Mohammad Afshin Hemmatyar CR-SMTC: Privacy preserving collusion-resistant multi-party trust computation. Search on Bibsonomy ISCISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Rubens Alexandre De Faria, Keiko Verônica Ono Fonseca, Bertoldo Schneider Jr., Sing Kiong Nguang Collusion and Fraud Detection on Electronic Energy Meters - A Use Case of Forensics Investigation Procedures. Search on Bibsonomy IEEE Symposium on Security and Privacy Workshops The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Minoru Kuribayashi Countermeasure to non-linear collusion attacks on spread spectrum fingerprinting. Search on Bibsonomy ISITA The full citation details ... 2014 DBLP  BibTeX  RDF
15Felix Günther 0001, Mark Manulis, Andreas Peter Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Hong Zhang, Xiaolei Dong, Zhenfu Cao, Jiachen Shen 4P_VES: A Collusion-Resistant Accountable Virtual Economy System. Search on Bibsonomy ICICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Tristan Ravitch, E. Rogan Creswick, Aaron Tomb, Adam Foltzer, Trevor Elliott, Ledah Casburn Multi-App Security Analysis with FUSE: Statically Detecting Android App Collusion. Search on Bibsonomy PPREW@ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Palash Dey, Y. Narahari Asymptotic collusion-proofness of voting rules: the case of large number of candidates. Search on Bibsonomy AAMAS The full citation details ... 2014 DBLP  BibTeX  RDF
15Zhen Xie, Sencun Zhu GroupTie: toward hidden collusion group discovery in app stores. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Sherman S. M. Chow, Man Ho Au, Willy Susilo Server-aided signatures verification secure against collusion attack. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Paolo D'Arco, Angel L. Pérez del Pozo Toward tracing and revoking schemes secure against collusion and any form of secret information leakage. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Zhichao Zhu, Guohong Cao Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Qiuhua Wang, Huifang Chen, Lei Xie 0003, Kuang Wang One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks. Search on Bibsonomy Ad Hoc Networks The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Basit Qureshi, Geyong Min, Demetres D. Kouvatsos Countering the collusion attack with a multidimensional decentralized trust and reputation model in disconnected MANETs. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Ze Li, Haiying Shen, Karan Sapra Leveraging Social Networks to Combat Collusion in Reputation Systems for Peer-to-Peer Networks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Chien-Chung Huang Collusion in Atomic Splittable Routing Games. Search on Bibsonomy Theory Comput. Syst. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Santi P. Maity, Seba Maity, Jaya Sil, Claude Delpha Optimized Spread Spectrum Watermarking for Fading-Like Collusion Attack with Improved Detection Performance. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Zhiguo Wan, Jun-e Liu, Rui Zhang 0002, Robert H. Deng A Collusion-Resistant Conditional Access System for Flexible-Pay-Per-Channel Pay-TV Broadcasting. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 1313 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license