The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for verifiable with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1974-1985 (18) 1986-1988 (15) 1989-1990 (16) 1991-1994 (19) 1995-1996 (21) 1997-1998 (30) 1999 (20) 2000 (27) 2001 (29) 2002 (48) 2003 (41) 2004 (76) 2005 (123) 2006 (89) 2007 (98) 2008 (111) 2009 (86) 2010 (46) 2011 (53) 2012 (62) 2013 (97) 2014 (116) 2015 (116) 2016 (135) 2017 (157) 2018 (177) 2019 (193) 2020 (218) 2021 (228) 2022 (331) 2023 (341) 2024 (96)
Publication types (Num. hits)
article(1550) book(4) incollection(13) inproceedings(1638) phdthesis(26) proceedings(2)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 786 occurrences of 511 keywords

Results
Found 3233 publication records. Showing 3233 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
92Helger Lipmaa Verifiable Homomorphic Oblivious Transfer and Private Equality Test. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptographic auctions, verifiable oblivious transfer, verifiable private equality test, homomorphic encryption
83Joseph K. Liu, Victor K. Wei, Duncan S. Wong Custodian-Hiding Verifiable Encryption. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Publicly Verifiable, Anonymity, Verifiable Encryption
83Sherman S. M. Chow Verifiable Pairing and Its Applications. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF verifiable pairing, threshold decryption, cryptographic protocols, Bilinear pairing, signcryption, undeniable signature, ID-based cryptography, cryptographic primitives, ID-based signature, exact security
72Johann van der Merwe, Dawoud S. Dawoud, Stephen McDonald A Fully Distributed Proactively Secure Threshold-Multisignature Scheme. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF threshold-multisignature, distributed-key management infrastructure, publicly verifiable distributed-key generation, publicly verifiable distributed-key update, publicly verifiable distributed-key redistribution, distributed systems, secret sharing, Security and protection, group-oriented cryptography
65C. Andrew Neff A verifiable secret shuffle and its application to e-voting. Search on Bibsonomy CCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF honest-verifier, universal verifiability, verifiable mix, verifiable shuffle, zeroknowledge, permutation, electronic voting, mix-net, anonymous credentials
65Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF verifiable shuffles, Paillier public-key system, Privacy, mix-nets, formal security model
56Yi Deng 0002, Dongdai Lin Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF instance-dependent verifiable random functions, simultaneous resettability, zero knowledge
56Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Verifiable shuffles, Paillier public-key system, Privacy, Mix-nets, Formal security model
56Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow An e-Lottery Scheme Using Verifiable Random Function. Search on Bibsonomy ICCSA (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF e-lottery, verifiable random function, applied cryptography
56Anna Lysyanskaya Unique Signatures and Verifiable Random Functions from the DH-DDH Separation. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Unique signatures, verifiable random functions, application of groups with DH-DDH separation
56Ran Canetti, Shai Halevi, Michael Steiner 0001 Hardness Amplification of Weakly Verifiable Puzzles. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
47Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF pre-distributed data, Verifiable secret sharing, multiparty protocols
47Ari Juels, Jorge Guajardo RSA Key Generation with Verifiable Randomness. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF verifiable randomness, public-key infrastructure, zero knowledge, non-repudiation, certificate authority, key generation
47Giuseppe Ateniese Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures. Search on Bibsonomy CCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF contract signing problem, digital signatures, public-key cryptography, fair exchange, proof of knowledge, verifiable encryption
47Ian F. Blake, Aldar C.-F. Chan Conditionally Verifiable Signature. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
47Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong, Robert W. Zhu Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
47Yevgeniy Dodis Efficient Construction of (Distributed) Verifiable Random Functions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
47Ming-Deh A. Huang, Shang-Hua Teng A Universal Problem in Secure and Verifiable Distributed Computation. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
38Edoardo Biagioni, Yingfei Dong, Wesley Peterson, Kazuo Sugihara Practical distributed voter-verifiable secret ballot system. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secret ballot, voter verifiable, end-to-end, voting systems
38Andreas Gampe, Jeffery von Ronne, David Niedzielski, Kleanthis Psarris Speculative improvements to verifiable bounds check elimination. Search on Bibsonomy PPPJ The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SafeTSA, array bounds check elimination, verifiable annotations, Java, optimization, just-in-time compilation
38Sheng Zhong 0002, Yang Richard Yang Verifiable Distributed Oblivious Transfer and Mobile Agent Security. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, mobile agent, oblivious transfer, verifiable secret sharing
38Sheng Zhong, Yang Richard Yang Verifiable distributed oblivious transfer and mobile agent security. Search on Bibsonomy DIALM-POMC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF resiliency to corruptions, secure mobile agents and mobile code, oblivious transfer, verifiable secret sharing
38Xiaoming Yu, Yinghua Min Design of delay-verifiable combinational logic by adding extra inputs. Search on Bibsonomy Asian Test Symposium The full citation details ... 1997 DBLP  DOI  BibTeX  RDF delay-verifiable combinational logic, delay testability, synthesis, combinational circuits, hardware overhead, temporal behavior
38Sebastiaan de Hoogh, Berry Schoenmakers, Boris Skoric, José Villegas Verifiable Rotation of Homomorphic Encryptions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong Efficient Verifiable Ring Encryption for Ad Hoc Groups. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
38Qiong Li, Xiamu Niu, Zhifang Wang, Yuhua Jiao, Sheng-He Sun A Verifiable Fingerprint Vault Scheme. Search on Bibsonomy KES (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
38Sangjin Kim, Heekuck Oh Fair Offline Payment Using Verifiable Encryption. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
38Macià Mut Puigserver, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger A Voting System with Trusted Verifiable Services. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Trust, Security Protocols, Security Services
38Jan Camenisch, Victor Shoup Practical Verifiable Encryption and Decryption of Discrete Logarithms. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
38Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl Asynchronous verifiable secret sharing and proactive cryptosystems. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF model, secret sharing, asynchronous, proactive
38Jun-Bum Shin, Kwangsu Lee, Kyungah Shim New DSA-Verifiable Signcryption Schemes. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
38Ayako Maeda, Atsuko Miyaji, Mitsuru Tada Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
38Berry Schoenmakers A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
38Eiichiro Fujisaki, Tatsuaki Okamoto A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
38Rosario Gennaro, Silvio Micali Verifiable Secret Sharing as Secure Computation. Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
38Thomas Beth, Hans-Joachim Knobloch, Marcus Otten Verifiable Secret Sharing for Monotone Access Structures. Search on Bibsonomy CCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
36Christian Cachin An asynchronous protocol for distributed computation of RSA inverses and its applications. Search on Bibsonomy PODC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF verifiable random functions, Cryptography, Byzantine agreement, threshold signatures, verifiable secret sharing
36E-yong Kim, Klara Nahrstedt, Li Xiao 0003, Kunsoo Park Identity-based registry for secure interdomain routing. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authorized search, identity-based registry, verifiable search
36Luciano Bononi, Carlo Tacconi A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Secure Clustering and Routing, Statistically Unique and Cryptographically Verifiable Identifiers, Mobile Ad Hoc Networks, Intrusion Detection System
35Wei Zhao, Changlu Lin, Dingfeng Ye Provably Secure Convertible Nominative Signature Scheme. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Nominative signature, Digital signature, Selectively, Universally, Convertible
35Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Wei Wu 0001 A Generic Construction for Universally-Convertible Undeniable Signatures. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Universally-Convertible, Provable Security, Undeniable Signature, Generic Construction
35Willy Susilo, Fangguo Zhang, Yi Mu 0001 Privacy-Enhanced Internet Storage. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Antoni Martínez-Ballesté, Francesc Sebé, Josep Domingo-Ferrer Large-Scale Pay-As-You-Watch for Unicast and Multicast Communications. Search on Bibsonomy TrustBus The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Pay-per-view systems, multicast, electronic payments
30Bo Sheng, Qun Li 0001 Verifiable Privacy-Preserving Sensor Network Storage for Range Query. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF verifiable reply, sensor networks, Privacy preserving, range query
30Pei-Yu Lin, Chi-Shiang Chan A Verifiable and Recoverable Secret Image Sharing Mechanism. Search on Bibsonomy ISPA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF camouflage, magic matrix, secret sharing, reversible, verifiable
30Cláudio T. Silva Applications of geometry and topology for quadrilateral meshprocessing and verifiable visualization. Search on Bibsonomy SCG The full citation details ... 2010 DBLP  DOI  BibTeX  RDF quadrilateral mesh processing, verifiable visualization, visualization, computer graphics
29David Niedzielski, Jeffery von Ronne, Andreas Gampe, Kleanthis Psarris A Verifiable, Control Flow Aware Constraint Analyzer for Bounds Check Elimination. Search on Bibsonomy SAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Ke Zeng Access with Fast Batch Verifiable Anonymous Credentials. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF fine-grained revocation, pairing, batch verification, anonymous credential
29Sebastian Fischmeister, Oleg Sokolsky, Insup Lee 0001 A Verifiable Language for Programming Real-Time Communication Schedules. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Time division multiaccess, Scheduling, Real time systems, Networks, Software verification and validation
29Christophe Tartary, Josef Pieprzyk, Huaxiong Wang Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Threshold Access Structures, Share Verifiability, Keyed One-Way Functions, Chinese Remainder Theorem, Secret Sharing Scheme
29Minos N. Garofalakis, Joseph M. Hellerstein, Petros Maniatis Proof Sketches: Verifiable In-Network Aggregation. Search on Bibsonomy ICDE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Jun Furukawa 0001, Kazue Sako An Efficient Publicly Verifiable Mix-Net for Long Inputs. Search on Bibsonomy Financial Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hybrid-mix, efficient, public verifiability, multiple encryption
29Matthias Fitzi, Juan A. Garay, Shyamnath Gollakota, C. Pandu Rangan, K. Srinathan Round-Optimal and Efficient Verifiable Secret Sharing. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Qianhong Wu, Changjie Wang, Xiaofeng Chen 0001, Yumin Wang Publicly Verifiable Auctions with Minimal Leakage. Search on Bibsonomy COMPSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Jun Furukawa 0001 Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar Easy Verifiable Primitives and Practical Public Key Cryptosystems. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Jan Camenisch, Ivan Damgård Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
29Andrew A. Adams, Hanne Gottliebsen, Steve Linton, Ursula Martin VSDITLU: a verifiable symbolic definite integral table look-up. Search on Bibsonomy CADE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
29Markus Stadler Publicly Verifiable Secret Sharing. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
29Mike Burmester Homomorphisms of Secret Sharing Schemes: A Tool for Verifiable Signature Sharing. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
29Claude Crépeau Verifiable Disclosure of Secrets and Applications (Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
27Jan Camenisch, Thomas Groß 0001, Thomas S. Heydt-Benjamin Rethinking accountable privacy supporting services: extended abstract. Search on Bibsonomy Digital Identity Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF time capsule, privacy, cryptographic protocols, accountability, verifiable encryption, anonymous credential systems
27Michael R. Clarkson, Stephen Chong, Andrew C. Myers Civitas: Toward a Secure Voting System. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF verifiable elections, voter registration, secure bulletin boards, cryptographic protocols, Electronic voting, coercion resistance
27Luciano Bononi, Carlo Tacconi Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secure clustering and routing, Statistically unique and cryptographically verifiable identifiers, Mobile Ad Hoc and Vehicular Networks, Intrusion detection system
27Sébastien Foulle, Steve A. Schneider, Jacques Traoré, Zhe Xia Threat Analysis of a Practical Voting Scheme with Receipts. Search on Bibsonomy VOTE-ID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Voter verifiable, voting ducks, electronic voting, threat analysis
27Marcin Gogolewski, Marek Klonowski, Przemyslaw Kubiak 0001, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski Kleptographic Attacks on E-Voting Schemes. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF receipt voting, election integrity, verifiable pseudo-randomness, electronic voting, coercion, kleptography
27Xiaojian Tian, Duncan S. Wong Session Corruption Attack and Improvements on Encryption Based MT-Authenticators. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MT-authenticator, BCK-model, CK-model, Verifiable Encryption
27Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. Search on Bibsonomy SOSP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF dynamic root of trust, self-check-summing code, software-based code attestation, verifiable code execution, rootkit detection
27Joonsang Baek, Yuliang Zheng 0001 Identity-Based Threshold Signature Scheme from the Bilinear Pairings. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Identity-based threshold signature, Generalized Bilinear Problem, Bilinear Pairing, Verifiable secret-sharing, Chosen message attack
27Ueli M. Maurer Secure Multi-party Computation Made Simple. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF adversary structures, secret-sharing, Secure multi-party computation, verifiable secret-sharing
27Pierre-Alain Fouque, Jacques Stern One Round Threshold Discrete-Log Key Generation without Private Channels. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Threshold DLK Generation, Publicly Verifiable Encryption, Adaptive and Concurrent Adversary
27Markus Jakobsson, David Pointcheval, Adam L. Young Secure Mobile Gambling. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Merkle, publicly verifiable, robust, Fair, lightweight, gambling
27Feng Bao 0001, Robert H. Deng, Khanh Quoc Nguyen, Vijay Varadharajan Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. Search on Bibsonomy DEXA Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF provable security, fair exchange, multi-party protocol, verifiable encryption
27Matthias Fitzi, Martin Hirt, Ueli M. Maurer Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Secure multi-party computation, threshold cryptography, unconditional security, verifiable secret sharing
27S. Crepaux-Motte, Mireille Jacomino, Rene David An algebraic method for delay fault testing. Search on Bibsonomy VTS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF input values, output function, robustly testable fault, nonrobustly testable fault, weakly verifiable, fault diagnosis, logic testing, delays, timing, Markov processes, random testing, delay fault testing, state transition, input vectors, algebraic method
27B. M. Subraya, Anshul Kumar, Shashi Kumar An HOL based framework for design of correct high level synthesizers. Search on Bibsonomy VLSI Design The full citation details ... 1995 DBLP  DOI  BibTeX  RDF HOL based framework, high level synthesizer design, design correctness guarantee, verifiable templates, synthesis module correctness, formal verification, high level synthesis, modularity, formal logic, higher order logic, verification process, formal framework
27Michael D. Schroeder, David D. Clark, Jerome H. Saltzer The Multics Kernel Design Project. Search on Bibsonomy SOSP The full citation details ... 1977 DBLP  DOI  BibTeX  RDF Multics, Type extension, Verifiable systems, MULTICS, Security, Operating systems, Protection, Security kernel, Supervisors
27Yevgeniy Dodis, Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets Security Amplification for InteractiveCryptographic Primitives. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Wei Wu 0001 Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Provable Security, Bilinear Pairings, Undeniable Signatures, Short Signature, Convertible
27Chik How Tan Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptography, public key encryption, bilinear map
27Samir Chouali, Jacques Julliand, Pierre-Alain Masson, Françoise Bellegarde PLTL-partitioned model checking for reactive systems under fairness assumptions. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF PLTL model checking, Refinement design, fairness assumptions, out-of-core model checking
27Rui Zhang 0002, Hideki Imai Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27Hiroaki Kikuchi Oblivious Counter and Majority Protocol. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Ronald Cramer Introduction to Secure Computation. Search on Bibsonomy Lectures on Data Security The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
23Masahito Hayashi, Takeshi Koshiba Universal Adaptive Construction of Verifiable Secret Sharing and Its Application to Verifiable Secure Distributed Data Storage. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
23Pham Nhat Minh, Chiro Hiro, Khuong Nguyen-An Orand - A Fast, Publicly Verifiable, Scalable Decentralized Random Number Generator Based on Distributed Verifiable Random Functions. Search on Bibsonomy IUKM (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Tal Derei, Benjamin Aulenbach, Victor Carolino, Caleb Geren, Michael Kaufman, Jonathan Klein, Rishad Islam Shanto, Henry F. Korth Scaling Zero-Knowledge to Verifiable Databases. Search on Bibsonomy VDBS@SIGMOD The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Matt Luckcuck, Marie Farrell (eds.) Proceedings Fourth International Workshop on Formal Methods for Autonomous Systems (FMAS) and Fourth International Workshop on Automated and verifiable Software sYstem DEvelopment (ASYDE), FMAS/ASYDE@SEFM 2022, and Fourth International Workshop on Automated and verifiable Software sYstem DEvelopment (ASYDE)Berlin, Germany, 26th and 27th of September 2022. Search on Bibsonomy FMAS/ASYDE@SEFM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Xiaojie Guo Fixing Issues and Achieving Maliciously Secure Verifiable Aggregation in "VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning". Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
23Abbass Madi Secure Machine Learning by means of Homomorphic Encryption and Verifiable Computing. (Apprentissage machine sécurisé à l'aide de chiffrement homomorphe et de calcul vérifiable). Search on Bibsonomy 2022   RDF
23Yi Yang 0034, Tom Holvoet Generating Safe Autonomous Decision-Making in ROS. Search on Bibsonomy FMAS/ASYDE@SEFM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Matteo Tadiello, Elena Troubitsyna Verifying Safety of Behaviour Trees in Event-B. Search on Bibsonomy FMAS/ASYDE@SEFM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Bernhard K. Aichernig, Edi Muskardin, Andrea Pferscher Active vs. Passive: A Comparison of Automata Learning Paradigms for Network Protocols. Search on Bibsonomy FMAS/ASYDE@SEFM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Joe Collenette, Louise A. Dennis, Michael Fisher 0001 Advising Autonomous Cars about the Rules of the Road. Search on Bibsonomy FMAS/ASYDE@SEFM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Maike Schwammberger, Verena Klös From Specification Models to Explanation Models: An Extraction and Refinement Process for Timed Automata. Search on Bibsonomy FMAS/ASYDE@SEFM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Jordan Hamilton, Ioannis Stefanakos, Radu Calinescu, Javier Cámara Towards Adaptive Planning of Assistive-care Robot Tasks. Search on Bibsonomy FMAS/ASYDE@SEFM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Gricel Vázquez, Radu Calinescu, Javier Cámara Scheduling of Missions with Constrained Tasks for Heterogeneous Robot Systems. Search on Bibsonomy FMAS/ASYDE@SEFM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Dominik Grundt, Anna Köhne, Ishan Saxena, Ralf Stemmer, Bernd Westphal, Eike Möhlmann Towards Runtime Monitoring of Complex System Requirements for Autonomous Driving Functions. Search on Bibsonomy FMAS/ASYDE@SEFM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Rafael C. Cardoso 0001, Angelo Ferrando 0001, Michael Fisher 0001 Extending Attack-Fault Trees with Runtime Verification. Search on Bibsonomy FMAS/ASYDE@SEFM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Predrag Filipovikj, Gustav Ung, Dilian Gurov, Mattias Nyberg Bounded Invariant Checking for Stateflow. Search on Bibsonomy FMAS/ASYDE@SEFM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 3233 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license