|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 575 occurrences of 355 keywords
|
|
|
Results
Found 907 publication records. Showing 904 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
79 | Temple H. Fay, Stephan V. Joubert |
Isolated Submodules and Skew Fields. |
Appl. Categorical Struct. |
2000 |
DBLP DOI BibTeX RDF |
honest, relatively divisible, skew field, isolated |
64 | Baruch Awerbuch, Boaz Patt-Shamir, David Peleg, Mark R. Tuttle |
Adaptive Collaboration in Peer-to-Peer Systems. |
ICDCS |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Yuval Ishai, Manoj Prabhakaran 0001, Amit Sahai |
Founding Cryptography on Oblivious Transfer - Efficiently. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
55 | John Watrous |
imits on the Power of Quantum Statistical Zero-Knowledge. |
FOCS |
2002 |
DBLP DOI BibTeX RDF |
|
55 | Sean Hallgren, Alexandra Kolla, Pranab Sen, Shengyu Zhang |
Making Classical Honest Verifier Zero Knowledge Protocols Secure against Quantum Attacks. |
ICALP (2) |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Tal Rabin |
Robust Sharing of Secrets When the Dealer is Honest or Cheating. |
J. ACM |
1994 |
DBLP DOI BibTeX RDF |
|
52 | Yunlei Zhao, Chan H. Lee, Yiming Zhao, Hong Zhu 0004 |
Some Observations on Zap and Its Applications. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
Zap, public-coin honest verifier zero-knowledge, deniable authentication, timed commitment, witness indistinguishability |
51 | Radu Jurca, Boi Faltings |
Minimum payments that reward honest reputation feedback. |
EC |
2006 |
DBLP DOI BibTeX RDF |
honest feedback, mechanism design, reputation mechanisms |
51 | Radu Jurca, Boi Faltings |
Using CHI-scores to reward honest feedback from repeated interactions. |
AAMAS |
2006 |
DBLP DOI BibTeX RDF |
honest reporting, reputation mechanisms |
46 | Ilya Mironov, Moni Naor, Gil Segev 0001 |
Sketching in adversarial environments. |
STOC |
2008 |
DBLP DOI BibTeX RDF |
data stream model., sketch model, massive data sets |
45 | Shien Jin Ong, David C. Parkes, Alon Rosen, Salil P. Vadhan |
Fairness with an Honest Minority and a Rational Majority. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
game theory, fairness, secret sharing |
45 | Iftach Haitner |
Semi-honest to Malicious Oblivious Transfer - The Black-Box Way. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Thanasis G. Papaioannou, George D. Stamoulis |
Achieving Honest Ratings with Reputation-Based Fines in Electronic Markets. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Susan Hohenberger, Stephen A. Weis |
Honest-Verifier Private Disjointness Testing Without Random Oracles. |
Privacy Enhancing Technologies |
2006 |
DBLP DOI BibTeX RDF |
private disjointness testing, private intersection cardinality, subgroup decision assumption, private data mining, anonymous login |
45 | Lars Kristiansen |
A jump operator on honest subrecursive degrees. |
Arch. Math. Log. |
1998 |
DBLP DOI BibTeX RDF |
|
45 | Giovanni Di Crescenzo, Tatsuaki Okamoto, Moti Yung |
Keeping the SZK-Verifier Honest Unconditionally. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
45 | Ivan Damgård, Oded Goldreich 0001, Tatsuaki Okamoto, Avi Wigderson |
Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
42 | Shane Greenstein |
An Honest Policy Wonk. |
IEEE Micro |
2011 |
DBLP DOI BibTeX RDF |
regulatory capture, honest policy wonks |
37 | Edigar Myula Msangawale, Ellen Kalinga, Honest C. Kimaro, Faraja Igira |
Exploring the Challenges Facing the ICT Industry Innovation Processes in Tanzania. |
Int. J. ICT Res. Afr. Middle East |
2023 |
DBLP DOI BibTeX RDF |
|
37 | Victor J. Leon, Noah Ford, Honest Mrema, Jeffrey Gilbert, Alexander New |
Ensemble models outperform single model uncertainties and predictions for operator-learning of hypersonic flows. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
37 | Noah Ford, Victor J. Leon, Honest Mrema, Jeffrey Gilbert, Alexander New |
Data-efficient operator learning for solving high Mach number fluid flow problems. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
37 | David Witman, Alexander New, Hicham Alkendry, Honest Mrema |
Neural Basis Functions for Accelerating Solutions to High Mach Euler Equations. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
37 | Regina Hebig, Truong Ho-Quang, Rodi Jolak, Jan Schröder, Humberto Linero, Magnus Ågren 0001, Salome Honest Maro |
How do Students Experience and Judge Software Comprehension Techniques? |
ICPC |
2020 |
DBLP DOI BibTeX RDF |
|
37 | Immaculate Ayebazibwe, Honest Christopher Kimaro, Jens Johan Kaasbøll |
System Use and User Satisfaction in the Adoption of Electronic Medical Records Systems: A Case of DHIS2 Tracker Implementation in Tanzania. |
ICT4D (1) |
2019 |
DBLP DOI BibTeX RDF |
|
37 | Hellen Maziku, Joseph Cosmas, Norah Maki, Honest C. Kimaro, Charles Otine |
The Role of Human Centered Design (HCD) and Challenge Driven Education in Enhancing the Innovation Capacity of Africa's Young People: Case of Youth for Children (Y4C) Innovation Hub in Tanzania. |
ICT4D (2) |
2019 |
DBLP DOI BibTeX RDF |
|
37 | Gilbert M. Gilbert, Shililiandumi Naiman, Honest Christopher Kimaro, Burchard Bagile |
A Critical Review of Edge and Fog Computing for Smart Grid Applications. |
ICT4D (1) |
2019 |
DBLP DOI BibTeX RDF |
|
37 | Betty Mbwilo, Honest C. Kimaro, Godfrey Justo |
Data Science Postgraduate Education at University of Dar es Salaam in Tanzania: Current Demands and Opportunities. |
ICT4D (2) |
2019 |
DBLP DOI BibTeX RDF |
|
37 | Petter Nielsen, Honest Christopher Kimaro (eds.) |
Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D - 15th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2019, Dar es Salaam, Tanzania, May 1-3, 2019, Proceedings, Part I |
ICT4D (1) |
2019 |
DBLP DOI BibTeX RDF |
|
37 | Petter Nielsen, Honest Christopher Kimaro (eds.) |
Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D - 15th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2019, Dar es Salaam, Tanzania, May 1-3, 2019, Proceedings, Part II |
ICT4D (2) |
2019 |
DBLP DOI BibTeX RDF |
|
37 | Jimmy T. Mbelwa, Honest Christopher Kimaro, Bernard Mussa |
Acceptability and Use of Mobile Health Applications in Health Information Systems: A Case of eIDSR and DHIS2 Touch Mobile Applications in Tanzania. |
ICT4D (1) |
2019 |
DBLP DOI BibTeX RDF |
|
37 | Jens Kaasbøll, Chipo Kanjo, Honest C. Kimaro |
Building Sustainable Collaborations and Academic Networks in Low Income Countries: Case of Master Programmes. |
ICT4D (2) |
2019 |
DBLP DOI BibTeX RDF |
|
37 | Wilfred F. Senyoni, Honest Christopher Kimaro, Jørn Braa, Claud Kumalija |
An Institutional Perspective on the Adoption of Open Dashboard for Health Information Systems in Tanzania. |
ICT4D (1) |
2019 |
DBLP DOI BibTeX RDF |
|
37 | Esther Mukasa, Honest C. Kimaro, Achilles Kiwanuka, Faraja Igira |
Challenges and Strategies for Standardizing Information Systems for Integrated TB/HIV Services in Tanzania: A Case Study of Kinondoni Municipality. |
Electron. J. Inf. Syst. Dev. Ctries. |
2017 |
DBLP DOI BibTeX RDF |
|
37 | Achilles Kiwanuka, Honest C. Kimaro, Wilfred Senyoni |
Analysis of the Acceptance Process of District Health Information Systems (DHIS) for Vertical Health Programmes: A Case Study of TB, HIV/AIDS and Malaria Programmes in Tanzania. |
Electron. J. Inf. Syst. Dev. Ctries. |
2015 |
DBLP DOI BibTeX RDF |
|
37 | Honest C. Kimaro |
Strategies for Developing Human Resource Capacity to Support Sustainability of ICT Based Health Information Systems: A Case Study from Tanzania. |
Electron. J. Inf. Syst. Dev. Ctries. |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Honest C. Kimaro, José Leopoldo Nhampossa |
The challenges of sustainability of health information systems in developing countries: comparative case studies of Mozambique and Tanzania. |
ECIS |
2004 |
DBLP BibTeX RDF |
|
37 | Shailesh Vaya |
Brief announcement: realizing secure multiparty computation on incomplete networks. |
PODC |
2010 |
DBLP DOI BibTeX RDF |
almost everywhere secure computation, hybrid argument, simulation paradigm, unconditional secure multiparty computation |
37 | Andrew Y. Lindell |
Adaptively Secure Two-Party Computation with Erasures. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Jinshan Liu, Valérie Issarny |
An incentive compatible reputation mechanism for ubiquitous computing environments. |
Int. J. Inf. Sec. |
2007 |
DBLP DOI BibTeX RDF |
Ubiquitous computing, Mobile ad hoc networks, Incentive compatibility, Reputation mechanism |
37 | Yevgeniy Dodis, Prashant Puniya |
On the Relation Between the Ideal Cipher and the Random Oracle Models. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Jinshan Liu, Valérie Issarny |
An incentive compatible reputation mechanism for ubiquitous computing environments. |
PST |
2006 |
DBLP DOI BibTeX RDF |
ubiquitous computing, mobile ad hoc networks, incentive compatibility, reputation mechanism |
37 | Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank |
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Anne Broadbent, Alain Tapp |
Information-Theoretic Security Without an Honest Majority. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
anonymous message transmission, election protocols, dining cryptographers, collision detection, information-theoretic security, Multiparty computation |
36 | Wei Jiang, Chris Clifton |
Transforming Semi-Honest Protocols to Ensure Accountability. |
ICDM Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Robert Lowe, Daniel Polani |
Preventing Bluff Agent Invasions in Honest Societies. |
ECAL |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Jie Wang 0002, Jay Belanger |
Honest Iteration Schemes of Randomizing Algorithms. |
ISAAC |
1992 |
DBLP DOI BibTeX RDF |
|
36 | Christopher Harth-Kitzerow |
Communication Efficient Semi-Honest Three-Party Secure Multiparty Computation with an Honest Majority. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
36 | Mauricio Elizalde, Carlos Escudero |
Short Communication: Chances for the Honest in Honest versus Insider Trading. |
SIAM J. Financial Math. |
2022 |
DBLP DOI BibTeX RDF |
|
36 | Jun Furukawa 0001, Yehuda Lindell |
Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
36 | Jun Furukawa 0001, Yehuda Lindell |
Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest. |
CCS |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Toshinori Araki, Jun Furukawa 0001, Yehuda Lindell, Ariel Nof, Kazuma Ohara |
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
36 | Toshinori Araki, Jun Furukawa 0001, Yehuda Lindell, Ariel Nof, Kazuma Ohara |
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority. |
CCS |
2016 |
DBLP DOI BibTeX RDF |
|
36 | Ran Canetti, Rafail Ostrovsky |
Secure Computation with Honest-Looking Parties: What If Nobody Is Truly Honest? (Extended Abstract). |
STOC |
1999 |
DBLP DOI BibTeX RDF |
|
34 | Yehuda Lindell, Benny Pinkas |
A Proof of Security of Yao's Protocol for Two-Party Computation. |
J. Cryptol. |
2009 |
DBLP DOI BibTeX RDF |
Semi-honest adversaries, Yao’s two-party protocol, Secure two-party computation, Proofs of security |
34 | Jens Groth, Steve Lu 0001 |
Verifiable Shuffle of Large Size Ciphertexts. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
homomorphic commitment, honest verifier zero-knowledge, homomorphic encryption, Shuffle, mix-net |
34 | C. Andrew Neff |
A verifiable secret shuffle and its application to e-voting. |
CCS |
2001 |
DBLP DOI BibTeX RDF |
honest-verifier, universal verifiability, verifiable mix, verifiable shuffle, zeroknowledge, permutation, electronic voting, mix-net, anonymous credentials |
34 | Lawrence C. Paulson |
Mechanized proofs for a recursive authentication protocol. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
mechanized proofs, recursive authentication protocol, inductive approach, message nesting, basic security theorem, adjacent pairs, honest agents, protocol complexity, agents, protocols, specification, symmetry, mutual authentication, Isabelle/HOL, session keys |
27 | Yael Tauman Kalai, Ran Raz |
Probabilistically Checkable Arguments. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Hugue Blier, Alain Tapp |
A Single Initialization Server for Multi-party Cryptography. |
ICITS |
2008 |
DBLP DOI BibTeX RDF |
two-party computation, initialization server, cryptography, zero-knowledge, multi-party computation |
27 | Vipul Goyal, Jonathan Katz |
Universally Composable Multi-party Computation with an Unreliable Common Reference String. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Jie Zhang 0002, Robin Cohen |
Seller Bidding in a Trust-Based Incentive Mechanism for Dynamic E-Marketplaces. |
Canadian AI |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Murat Kantarcioglu, Onur Kardes |
Privacy-Preserving Data Mining Applications in the Malicious Model. |
ICDM Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Yonatan Aumann, Yehuda Lindell |
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Junsheng Chang, Huaimin Wang, Gang Yin, Yang-Bin Tang |
ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Baruch Awerbuch, Thomas P. Hayes |
Online collaborative filtering with nearly optimal dynamic regret. |
SPAA |
2007 |
DBLP DOI BibTeX RDF |
online decision making, regret, learning, collaborative filtering, multiagent systems |
27 | Ran Canetti, Eyal Kushilevitz, Yehuda Lindell |
On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
Universal composability, Secure two-party computation, Impossibility results |
27 | Boaz Barak, Manoj Prabhakaran 0001, Amit Sahai |
Concurrent Non-Malleable Zero Knowledge. |
FOCS |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Danny Harnik, Moni Naor |
On Everlasting Security in the Hybrid Bounded Storage Model. |
ICALP (2) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Jerzy Konorski |
An Idea Bag Strategy to Discourage Selfish Behavior Under Random Token MAC Protocols for Wireless LANs. |
ICDCN |
2006 |
DBLP DOI BibTeX RDF |
distributed MAC, random token, game theory, wireless LAN |
27 | John Watrous |
Zero-knowledge against quantum attacks. |
STOC |
2006 |
DBLP DOI BibTeX RDF |
zero-knowledge proof systems, quantum cryptography |
27 | Ran Canetti, Eyal Kushilevitz, Yehuda Lindell |
On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Matthias Fitzi, Daniel Gottesman, Martin Hirt, Thomas Holenstein, Adam D. Smith |
Detectable byzantine agreement secure against faulty majorities. |
PODC |
2002 |
DBLP DOI BibTeX RDF |
quantum signatures, broadcast, public-key infrastructure, byzantine agreement, multi-party computation |
27 | Oded Goldreich 0001, Salil P. Vadhan |
Comparing Entropies in Statistical Zero Knowledge with Applications to the Structure of SZK. |
CCC |
1999 |
DBLP DOI BibTeX RDF |
Statistical Zero-Knowledge Proofs, Universal Hashing, Arthur-Merlin Games |
27 | Osamu Watanabe 0001, Seinosuke Toda |
Structural Analyses on the Complexity of Inverting Functions. |
SIGAL International Symposium on Algorithms |
1990 |
DBLP DOI BibTeX RDF |
|
27 | Ashish Kundu |
SN2K Attacks and Honest Services. |
COMPSAC (2) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Davide Alessio, Marc Joye |
A simple construction for public-key encryption with revocable anonymity: the honest-sender case. |
Digital Rights Management Workshop |
2009 |
DBLP DOI BibTeX RDF |
anonymity, public-key encryption, key-privacy |
27 | Abdullah M. S. Alaraj, Malcolm Munro |
An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest. |
SAFECOMP |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Qing Zhang 0014, Ting Yu 0001 |
On the Modeling of Honest Players in Reputation Systems. |
ICDCS Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Gregory J. Conti, Edward Sobiesk |
An honest man has nothing to fear: user perceptions on web-based information disclosure. |
SOUPS |
2007 |
DBLP DOI BibTeX RDF |
Yahoo!, data retention, privacy, anonymity, anonymization, web search, fingerprinting, usable security, Google, googling, information disclosure, MSN, AOL |
27 | Abdullah M. S. Alaraj, Malcolm Munro |
An efficient fair exchange protocol that enforces the merchant to be honest. |
CollaborateCom |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Michael Ben-Or, Claude Crépeau, Daniel Gottesman, Avinatan Hassidim, Adam D. Smith |
Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority. |
FOCS |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Justin Brickell, Vitaly Shmatikov |
Privacy-Preserving Graph Algorithms in the Semi-honest Model. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Alberto Fernandes, Evangelos Kotsovinos, Sven Östring, Boris Dragovic |
Pinocchio: Incentives for Honest Participation in Distributed Trust Management. |
iTrust |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Alfred P. Maneki |
Honest Functions and their Application to the Analysis of Cryptographic Protocols. |
CSFW |
1999 |
DBLP DOI BibTeX RDF |
|
27 | Joe Kilian |
Interactive Proofs with Provable Security Against Honest Verifiers. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
24 | Jens Groth |
Linear Algebra with Sub-linear Zero-Knowledge Arguments. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
Sub-linear size zero-knowledge arguments, public-coin special honest verifier zero-knowledge, Pedersen commitments, linear algebra, circuit satisfiability |
24 | Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano, Moti Yung |
On Monotone Formula Closure of SZK |
FOCS |
1994 |
DBLP DOI BibTeX RDF |
honest-verifier interactive SZK proof systems, monotone formula closure, SZK, statistical zero knowledge, monotone logical formula, protocol techniques, random self reducible languages, Boolean operations, structural properties, closure properties |
24 | Adi Shamir |
IP=PSPACE |
FOCS |
1990 |
DBLP DOI BibTeX RDF |
acceptance probability, honest provers, public coins, logarithmic workspace, two-way access, random tape, interaction, IP, randomization, polynomial time, one-way functions, zero-knowledge proofs, interactive proofs, PSPACE, polynomial space, proof verification |
18 | Tal Moran, Moni Naor, Gil Segev 0001 |
An Optimally Fair Coin Toss. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Louis Salvail, Christian Schaffner, Miroslava Sotáková |
On the Power of Two-Party Quantum Cryptography. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
two-party primitives, quantum protocols, oblivious transfer, quantum information theory |
18 | Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Hossein Ghodosi, Josef Pieprzyk |
Multi-Party Computation with Omnipresent Adversary. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Omnipresent Adversary, Proactive Secret Sharing, t-resilient Protocols, t-private Protocols, Multi-Party Computation |
18 | Jerzy Konorski |
Wireless multihoming modeled as a multi-WLAN game. |
MSWiM |
2009 |
DBLP DOI BibTeX RDF |
game theory, WLAN, MAC, multihoming, bandwidth sharing |
18 | Andrew Y. Lindell |
Local Sequentiality Does Not Help for Concurrent Composition. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham D. Flaxman |
SybilGuard: defending against sybil attacks via social networks. |
IEEE/ACM Trans. Netw. |
2008 |
DBLP DOI BibTeX RDF |
SybilGuard, sybil identity, social networks, sybil attack |
18 | Nick S. Jones, Lluis Masanes |
Key Distillation and the Secret-Bit Fraction. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Eli Biham, Yaron J. Goren, Yuval Ishai |
Basing Weak Public-Key Cryptography on Strong One-Way Functions. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
Merkle’s puzzles, quantum computing, Public-key cryptography, one-way functions, bounded storage model |
18 | Dan Bogdanov, Sven Laur, Jan Willemson |
Sharemind: A Framework for Fast Privacy-Preserving Computations. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Huafei Zhu |
Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Black-box constructions, defensible adversary, malicious adversary, oblivious transfer protocols |
18 | Andriy Panchenko 0001, Lexi Pimenidis |
Using Trust to Resist Censorship in the Presence of Collusion. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 904 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|