The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for honest with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1989 (21) 1990-1994 (17) 1995-1997 (20) 1998-1999 (19) 2000-2001 (28) 2002 (24) 2003 (28) 2004 (58) 2005 (50) 2006 (84) 2007 (84) 2008 (91) 2009 (66) 2010-2011 (22) 2012-2013 (24) 2014 (19) 2015-2016 (34) 2017 (20) 2018 (27) 2019 (29) 2020 (29) 2021 (33) 2022 (34) 2023 (37) 2024 (6)
Publication types (Num. hits)
article(254) book(1) incollection(4) inproceedings(643) proceedings(2)
Venues (Conferences, Journals, ...)
IACR Cryptol. ePrint Arch.(68) CoRR(40) CRYPTO(32) TCC(29) EUROCRYPT(27) STOC(18) CCS(17) ASIACRYPT(15) Financial Cryptography(14) FOCS(13) J. Cryptol.(13) ACNS(10) PODC(10) ACISP(8) ICALP(7) CT-RSA(6) More (+10 of total 374)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 575 occurrences of 355 keywords

Results
Found 907 publication records. Showing 904 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
79Temple H. Fay, Stephan V. Joubert Isolated Submodules and Skew Fields. Search on Bibsonomy Appl. Categorical Struct. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF honest, relatively divisible, skew field, isolated
64Baruch Awerbuch, Boaz Patt-Shamir, David Peleg, Mark R. Tuttle Adaptive Collaboration in Peer-to-Peer Systems. Search on Bibsonomy ICDCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
55Yuval Ishai, Manoj Prabhakaran 0001, Amit Sahai Founding Cryptography on Oblivious Transfer - Efficiently. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
55John Watrous imits on the Power of Quantum Statistical Zero-Knowledge. Search on Bibsonomy FOCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
55Sean Hallgren, Alexandra Kolla, Pranab Sen, Shengyu Zhang Making Classical Honest Verifier Zero Knowledge Protocols Secure against Quantum Attacks. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
55Tal Rabin Robust Sharing of Secrets When the Dealer is Honest or Cheating. Search on Bibsonomy J. ACM The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
52Yunlei Zhao, Chan H. Lee, Yiming Zhao, Hong Zhu 0004 Some Observations on Zap and Its Applications. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Zap, public-coin honest verifier zero-knowledge, deniable authentication, timed commitment, witness indistinguishability
51Radu Jurca, Boi Faltings Minimum payments that reward honest reputation feedback. Search on Bibsonomy EC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF honest feedback, mechanism design, reputation mechanisms
51Radu Jurca, Boi Faltings Using CHI-scores to reward honest feedback from repeated interactions. Search on Bibsonomy AAMAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF honest reporting, reputation mechanisms
46Ilya Mironov, Moni Naor, Gil Segev 0001 Sketching in adversarial environments. Search on Bibsonomy STOC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data stream model., sketch model, massive data sets
45Shien Jin Ong, David C. Parkes, Alon Rosen, Salil P. Vadhan Fairness with an Honest Minority and a Rational Majority. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF game theory, fairness, secret sharing
45Iftach Haitner Semi-honest to Malicious Oblivious Transfer - The Black-Box Way. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45Thanasis G. Papaioannou, George D. Stamoulis Achieving Honest Ratings with Reputation-Based Fines in Electronic Markets. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45Susan Hohenberger, Stephen A. Weis Honest-Verifier Private Disjointness Testing Without Random Oracles. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2006 DBLP  DOI  BibTeX  RDF private disjointness testing, private intersection cardinality, subgroup decision assumption, private data mining, anonymous login
45Lars Kristiansen A jump operator on honest subrecursive degrees. Search on Bibsonomy Arch. Math. Log. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
45Giovanni Di Crescenzo, Tatsuaki Okamoto, Moti Yung Keeping the SZK-Verifier Honest Unconditionally. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
45Ivan Damgård, Oded Goldreich 0001, Tatsuaki Okamoto, Avi Wigderson Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
42Shane Greenstein An Honest Policy Wonk. Search on Bibsonomy IEEE Micro The full citation details ... 2011 DBLP  DOI  BibTeX  RDF regulatory capture, honest policy wonks
37Edigar Myula Msangawale, Ellen Kalinga, Honest C. Kimaro, Faraja Igira Exploring the Challenges Facing the ICT Industry Innovation Processes in Tanzania. Search on Bibsonomy Int. J. ICT Res. Afr. Middle East The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
37Victor J. Leon, Noah Ford, Honest Mrema, Jeffrey Gilbert, Alexander New Ensemble models outperform single model uncertainties and predictions for operator-learning of hypersonic flows. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
37Noah Ford, Victor J. Leon, Honest Mrema, Jeffrey Gilbert, Alexander New Data-efficient operator learning for solving high Mach number fluid flow problems. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
37David Witman, Alexander New, Hicham Alkendry, Honest Mrema Neural Basis Functions for Accelerating Solutions to High Mach Euler Equations. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
37Regina Hebig, Truong Ho-Quang, Rodi Jolak, Jan Schröder, Humberto Linero, Magnus Ågren 0001, Salome Honest Maro How do Students Experience and Judge Software Comprehension Techniques? Search on Bibsonomy ICPC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
37Immaculate Ayebazibwe, Honest Christopher Kimaro, Jens Johan Kaasbøll System Use and User Satisfaction in the Adoption of Electronic Medical Records Systems: A Case of DHIS2 Tracker Implementation in Tanzania. Search on Bibsonomy ICT4D (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
37Hellen Maziku, Joseph Cosmas, Norah Maki, Honest C. Kimaro, Charles Otine The Role of Human Centered Design (HCD) and Challenge Driven Education in Enhancing the Innovation Capacity of Africa's Young People: Case of Youth for Children (Y4C) Innovation Hub in Tanzania. Search on Bibsonomy ICT4D (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
37Gilbert M. Gilbert, Shililiandumi Naiman, Honest Christopher Kimaro, Burchard Bagile A Critical Review of Edge and Fog Computing for Smart Grid Applications. Search on Bibsonomy ICT4D (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
37Betty Mbwilo, Honest C. Kimaro, Godfrey Justo Data Science Postgraduate Education at University of Dar es Salaam in Tanzania: Current Demands and Opportunities. Search on Bibsonomy ICT4D (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
37Petter Nielsen, Honest Christopher Kimaro (eds.) Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D - 15th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2019, Dar es Salaam, Tanzania, May 1-3, 2019, Proceedings, Part I Search on Bibsonomy ICT4D (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
37Petter Nielsen, Honest Christopher Kimaro (eds.) Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D - 15th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2019, Dar es Salaam, Tanzania, May 1-3, 2019, Proceedings, Part II Search on Bibsonomy ICT4D (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
37Jimmy T. Mbelwa, Honest Christopher Kimaro, Bernard Mussa Acceptability and Use of Mobile Health Applications in Health Information Systems: A Case of eIDSR and DHIS2 Touch Mobile Applications in Tanzania. Search on Bibsonomy ICT4D (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
37Jens Kaasbøll, Chipo Kanjo, Honest C. Kimaro Building Sustainable Collaborations and Academic Networks in Low Income Countries: Case of Master Programmes. Search on Bibsonomy ICT4D (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
37Wilfred F. Senyoni, Honest Christopher Kimaro, Jørn Braa, Claud Kumalija An Institutional Perspective on the Adoption of Open Dashboard for Health Information Systems in Tanzania. Search on Bibsonomy ICT4D (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
37Esther Mukasa, Honest C. Kimaro, Achilles Kiwanuka, Faraja Igira Challenges and Strategies for Standardizing Information Systems for Integrated TB/HIV Services in Tanzania: A Case Study of Kinondoni Municipality. Search on Bibsonomy Electron. J. Inf. Syst. Dev. Ctries. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
37Achilles Kiwanuka, Honest C. Kimaro, Wilfred Senyoni Analysis of the Acceptance Process of District Health Information Systems (DHIS) for Vertical Health Programmes: A Case Study of TB, HIV/AIDS and Malaria Programmes in Tanzania. Search on Bibsonomy Electron. J. Inf. Syst. Dev. Ctries. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
37Honest C. Kimaro Strategies for Developing Human Resource Capacity to Support Sustainability of ICT Based Health Information Systems: A Case Study from Tanzania. Search on Bibsonomy Electron. J. Inf. Syst. Dev. Ctries. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Honest C. Kimaro, José Leopoldo Nhampossa The challenges of sustainability of health information systems in developing countries: comparative case studies of Mozambique and Tanzania. Search on Bibsonomy ECIS The full citation details ... 2004 DBLP  BibTeX  RDF
37Shailesh Vaya Brief announcement: realizing secure multiparty computation on incomplete networks. Search on Bibsonomy PODC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF almost everywhere secure computation, hybrid argument, simulation paradigm, unconditional secure multiparty computation
37Andrew Y. Lindell Adaptively Secure Two-Party Computation with Erasures. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Jinshan Liu, Valérie Issarny An incentive compatible reputation mechanism for ubiquitous computing environments. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Ubiquitous computing, Mobile ad hoc networks, Incentive compatibility, Reputation mechanism
37Yevgeniy Dodis, Prashant Puniya On the Relation Between the Ideal Cipher and the Random Oracle Models. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Jinshan Liu, Valérie Issarny An incentive compatible reputation mechanism for ubiquitous computing environments. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ubiquitous computing, mobile ad hoc networks, incentive compatibility, reputation mechanism
37Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Anne Broadbent, Alain Tapp Information-Theoretic Security Without an Honest Majority. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anonymous message transmission, election protocols, dining cryptographers, collision detection, information-theoretic security, Multiparty computation
36Wei Jiang, Chris Clifton Transforming Semi-Honest Protocols to Ensure Accountability. Search on Bibsonomy ICDM Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Robert Lowe, Daniel Polani Preventing Bluff Agent Invasions in Honest Societies. Search on Bibsonomy ECAL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
36Jie Wang 0002, Jay Belanger Honest Iteration Schemes of Randomizing Algorithms. Search on Bibsonomy ISAAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
36Christopher Harth-Kitzerow Communication Efficient Semi-Honest Three-Party Secure Multiparty Computation with an Honest Majority. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Mauricio Elizalde, Carlos Escudero Short Communication: Chances for the Honest in Honest versus Insider Trading. Search on Bibsonomy SIAM J. Financial Math. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Jun Furukawa 0001, Yehuda Lindell Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
36Jun Furukawa 0001, Yehuda Lindell Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest. Search on Bibsonomy CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
36Toshinori Araki, Jun Furukawa 0001, Yehuda Lindell, Ariel Nof, Kazuma Ohara High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
36Toshinori Araki, Jun Furukawa 0001, Yehuda Lindell, Ariel Nof, Kazuma Ohara High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
36Ran Canetti, Rafail Ostrovsky Secure Computation with Honest-Looking Parties: What If Nobody Is Truly Honest? (Extended Abstract). Search on Bibsonomy STOC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
34Yehuda Lindell, Benny Pinkas A Proof of Security of Yao's Protocol for Two-Party Computation. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Semi-honest adversaries, Yao’s two-party protocol, Secure two-party computation, Proofs of security
34Jens Groth, Steve Lu 0001 Verifiable Shuffle of Large Size Ciphertexts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF homomorphic commitment, honest verifier zero-knowledge, homomorphic encryption, Shuffle, mix-net
34C. Andrew Neff A verifiable secret shuffle and its application to e-voting. Search on Bibsonomy CCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF honest-verifier, universal verifiability, verifiable mix, verifiable shuffle, zeroknowledge, permutation, electronic voting, mix-net, anonymous credentials
34Lawrence C. Paulson Mechanized proofs for a recursive authentication protocol. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF mechanized proofs, recursive authentication protocol, inductive approach, message nesting, basic security theorem, adjacent pairs, honest agents, protocol complexity, agents, protocols, specification, symmetry, mutual authentication, Isabelle/HOL, session keys
27Yael Tauman Kalai, Ran Raz Probabilistically Checkable Arguments. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Hugue Blier, Alain Tapp A Single Initialization Server for Multi-party Cryptography. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF two-party computation, initialization server, cryptography, zero-knowledge, multi-party computation
27Vipul Goyal, Jonathan Katz Universally Composable Multi-party Computation with an Unreliable Common Reference String. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Jie Zhang 0002, Robin Cohen Seller Bidding in a Trust-Based Incentive Mechanism for Dynamic E-Marketplaces. Search on Bibsonomy Canadian AI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Murat Kantarcioglu, Onur Kardes Privacy-Preserving Data Mining Applications in the Malicious Model. Search on Bibsonomy ICDM Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Yonatan Aumann, Yehuda Lindell Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Junsheng Chang, Huaimin Wang, Gang Yin, Yang-Bin Tang ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Baruch Awerbuch, Thomas P. Hayes Online collaborative filtering with nearly optimal dynamic regret. Search on Bibsonomy SPAA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF online decision making, regret, learning, collaborative filtering, multiagent systems
27Ran Canetti, Eyal Kushilevitz, Yehuda Lindell On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Universal composability, Secure two-party computation, Impossibility results
27Boaz Barak, Manoj Prabhakaran 0001, Amit Sahai Concurrent Non-Malleable Zero Knowledge. Search on Bibsonomy FOCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Danny Harnik, Moni Naor On Everlasting Security in the Hybrid Bounded Storage Model. Search on Bibsonomy ICALP (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Jerzy Konorski An Idea Bag Strategy to Discourage Selfish Behavior Under Random Token MAC Protocols for Wireless LANs. Search on Bibsonomy ICDCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF distributed MAC, random token, game theory, wireless LAN
27John Watrous Zero-knowledge against quantum attacks. Search on Bibsonomy STOC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF zero-knowledge proof systems, quantum cryptography
27Ran Canetti, Eyal Kushilevitz, Yehuda Lindell On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27Matthias Fitzi, Daniel Gottesman, Martin Hirt, Thomas Holenstein, Adam D. Smith Detectable byzantine agreement secure against faulty majorities. Search on Bibsonomy PODC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF quantum signatures, broadcast, public-key infrastructure, byzantine agreement, multi-party computation
27Oded Goldreich 0001, Salil P. Vadhan Comparing Entropies in Statistical Zero Knowledge with Applications to the Structure of SZK. Search on Bibsonomy CCC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Statistical Zero-Knowledge Proofs, Universal Hashing, Arthur-Merlin Games
27Osamu Watanabe 0001, Seinosuke Toda Structural Analyses on the Complexity of Inverting Functions. Search on Bibsonomy SIGAL International Symposium on Algorithms The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
27Ashish Kundu SN2K Attacks and Honest Services. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Davide Alessio, Marc Joye A simple construction for public-key encryption with revocable anonymity: the honest-sender case. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anonymity, public-key encryption, key-privacy
27Abdullah M. S. Alaraj, Malcolm Munro An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest. Search on Bibsonomy SAFECOMP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Qing Zhang 0014, Ting Yu 0001 On the Modeling of Honest Players in Reputation Systems. Search on Bibsonomy ICDCS Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Gregory J. Conti, Edward Sobiesk An honest man has nothing to fear: user perceptions on web-based information disclosure. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Yahoo!, data retention, privacy, anonymity, anonymization, web search, fingerprinting, usable security, Google, googling, information disclosure, MSN, AOL
27Abdullah M. S. Alaraj, Malcolm Munro An efficient fair exchange protocol that enforces the merchant to be honest. Search on Bibsonomy CollaborateCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Michael Ben-Or, Claude Crépeau, Daniel Gottesman, Avinatan Hassidim, Adam D. Smith Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority. Search on Bibsonomy FOCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Justin Brickell, Vitaly Shmatikov Privacy-Preserving Graph Algorithms in the Semi-honest Model. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Alberto Fernandes, Evangelos Kotsovinos, Sven Östring, Boris Dragovic Pinocchio: Incentives for Honest Participation in Distributed Trust Management. Search on Bibsonomy iTrust The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Alfred P. Maneki Honest Functions and their Application to the Analysis of Cryptographic Protocols. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
27Joe Kilian Interactive Proofs with Provable Security Against Honest Verifiers. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
24Jens Groth Linear Algebra with Sub-linear Zero-Knowledge Arguments. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Sub-linear size zero-knowledge arguments, public-coin special honest verifier zero-knowledge, Pedersen commitments, linear algebra, circuit satisfiability
24Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano, Moti Yung On Monotone Formula Closure of SZK Search on Bibsonomy FOCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF honest-verifier interactive SZK proof systems, monotone formula closure, SZK, statistical zero knowledge, monotone logical formula, protocol techniques, random self reducible languages, Boolean operations, structural properties, closure properties
24Adi Shamir IP=PSPACE Search on Bibsonomy FOCS The full citation details ... 1990 DBLP  DOI  BibTeX  RDF acceptance probability, honest provers, public coins, logarithmic workspace, two-way access, random tape, interaction, IP, randomization, polynomial time, one-way functions, zero-knowledge proofs, interactive proofs, PSPACE, polynomial space, proof verification
18Tal Moran, Moni Naor, Gil Segev 0001 An Optimally Fair Coin Toss. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Louis Salvail, Christian Schaffner, Miroslava Sotáková On the Power of Two-Party Quantum Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF two-party primitives, quantum protocols, oblivious transfer, quantum information theory
18Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Hossein Ghodosi, Josef Pieprzyk Multi-Party Computation with Omnipresent Adversary. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Omnipresent Adversary, Proactive Secret Sharing, t-resilient Protocols, t-private Protocols, Multi-Party Computation
18Jerzy Konorski Wireless multihoming modeled as a multi-WLAN game. Search on Bibsonomy MSWiM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF game theory, WLAN, MAC, multihoming, bandwidth sharing
18Andrew Y. Lindell Local Sequentiality Does Not Help for Concurrent Composition. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham D. Flaxman SybilGuard: defending against sybil attacks via social networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SybilGuard, sybil identity, social networks, sybil attack
18Nick S. Jones, Lluis Masanes Key Distillation and the Secret-Bit Fraction. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Eli Biham, Yaron J. Goren, Yuval Ishai Basing Weak Public-Key Cryptography on Strong One-Way Functions. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Merkle’s puzzles, quantum computing, Public-key cryptography, one-way functions, bounded storage model
18Dan Bogdanov, Sven Laur, Jan Willemson Sharemind: A Framework for Fast Privacy-Preserving Computations. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Huafei Zhu Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Black-box constructions, defensible adversary, malicious adversary, oblivious transfer protocols
18Andriy Panchenko 0001, Lexi Pimenidis Using Trust to Resist Censorship in the Presence of Collusion. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 904 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license