Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
125 | Randall W. Lichota, Grace L. Hammonds, Stephen H. Brackin |
Verifying The Correctness Of Cryptographic Protocols Using "Convince". |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
Convince, theorem proving component, commercial computer aided software engineering tool, StP/OMT, textual notations, Higher Order Logic theorem prover, protocols, cryptographic protocols, authentication protocols, front-end, belief logic, correctness verification, automated support |
47 | Ching Yu Ng, Willy Susilo, Yi Mu 0001 |
Designated group credentials. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
designated, signature, bilinear pairings, credential |
47 | Willy Susilo, Yi Mu 0001 |
Non-interactive Deniable Ring Authentication. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
Ring signature schemes, non-interactive, ring-to-ring authentication, deniable |
47 | David Chaum, Sandra Roijakkers |
Unconditionally Secure Digital Signatures. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
47 | Gilles Brassard, Claude Crépeau |
Zero-Knowledge Simulation of Boolean Circuits. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
|
35 | Américo Nobre G. F. Amorim, Jairo S. Dornelas |
P2P Users: Important dimensions for changing to legal online music stores. |
I3E |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Aaquib Tabrez |
Effective Human-Machine Teaming through Communicative Autonomous Agents that Explain, Coach, and Convince. |
AAMAS |
2023 |
DBLP BibTeX RDF |
|
30 | Hannaneh Barahouei Pasandi, Tamer Nadeem |
CONVINCE: Collaborative Cross-Camera Video Analytics at the Edge. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
30 | Hannaneh Barahouei Pasandi, Tamer Nadeem |
CONVINCE: Collaborative Cross-Camera Video Analytics at the Edge. |
PerCom Workshops |
2020 |
DBLP DOI BibTeX RDF |
|
30 | Ethan Perez, Siddharth Karamcheti, Rob Fergus, Jason Weston, Douwe Kiela, Kyunghyun Cho |
Finding Generalizable Evidence by Learning to Convince Q&A Models. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
30 | Ethan Perez, Siddharth Karamcheti, Rob Fergus, Jason Weston, Douwe Kiela, Kyunghyun Cho |
Finding Generalizable Evidence by Learning to Convince Q&A Models. |
EMNLP/IJCNLP (1) |
2019 |
DBLP DOI BibTeX RDF |
|
30 | Vitobha Munigala, Srikanth Tamilselvam, Anush Sankaran |
"Let me convince you to buy my product ... ": A Case Study of an Automated Persuasive System for Fashion Products. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
30 | Juraj Hromkovic, Regula Lacher |
How to convince teachers to teach computer science even if informatics was never a part of their own studies. |
Bull. EATCS |
2017 |
DBLP BibTeX RDF |
|
30 | Isaac Persing, Vincent Ng 0001 |
Why Can't You Convince Me? Modeling Weaknesses in Unpersuasive Arguments. |
IJCAI |
2017 |
DBLP DOI BibTeX RDF |
|
30 | Raoul Monnier, Adrian Popescu 0002, Rickard Ljung |
CONVINcE: Towards Power-Optimized Video Distribution Networks. |
ICIN |
2016 |
DBLP BibTeX RDF |
|
30 | Bowen Zheng, Chung-Wei Lin, Huafeng Yu, Hengyi Liang, Qi Zhu 0002 |
CONVINCE: a cross-layer modeling, exploration and validation framework for next-generation connected vehicles. |
ICCAD |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Elmar Lins, Kaja J. Fietkiewicz, Eva Lutz |
How to Convince the Crowd: An Impression Management Approach. |
HICSS |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Radoslaw Michalski, Przemyslaw Kazienko, Jaroslaw Jankowski |
Convince a Dozen More and Succeed - The Influence in Multi-layered Social Networks. |
SITIS |
2013 |
DBLP DOI BibTeX RDF |
|
30 | Srihari Nelakuditi, Chase Gray, Romit Roy Choudhury |
Snap judgement of publication quality: how to convince a dean that you are a good researcher. |
ACM SIGMOBILE Mob. Comput. Commun. Rev. |
2011 |
DBLP DOI BibTeX RDF |
|
30 | Hans Muller, Christiaan Maasdorp |
The data, information, and knowledge hierarchy and its ability to convince. |
RCIS |
2011 |
DBLP DOI BibTeX RDF |
|
30 | Andreas Eckhardt, Tim Weitzel, Wolfgang König, Josef Buschbacher |
How to Convince People Who Don't Like IT to Use IT: A Case Study on E-Recruiting. |
AMCIS |
2007 |
DBLP BibTeX RDF |
|
30 | B. Bossard, Jean-Marie Renard, P. Capelle, P. Paradis, Marie-Catherine Beuscart |
How to convince your manager to invest in an HIS preimplementation methodology for appraisal of material, process and human costs and benefits. |
AMIA |
2000 |
DBLP BibTeX RDF |
|
30 | Shu-Heng Chen, Tzu-Wen Kuo |
Are Efficient Markets Really Efficient?: Can Financial Econometric Tests Convince Maching Learning People? |
IC-AI |
1999 |
DBLP BibTeX RDF |
|
30 | Patricia K. Schank, Michael Andrew Ranney |
Improved reasoning with Convince Me. |
CHI 95 Conference Companion |
1995 |
DBLP DOI BibTeX RDF |
|
30 | H. J. M. Rutten |
Evaluation of Broadband Based Multimedia Applications - how to convince the business. |
Broadband Islands |
1994 |
DBLP BibTeX RDF |
|
30 | Jin H. Kim, Judea Pearl |
Convince: A Conversational Inference Consolidation Engine. |
IEEE Trans. Syst. Man Cybern. |
1987 |
DBLP DOI BibTeX RDF |
|
23 | Pairat Thorncharoensri, Willy Susilo, Yi Mu 0001 |
Universal Designated Verifier Signatures with Threshold-Signers. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Ching-Lueh Chang, Yuh-Dauh Lyuu |
Spreading Messages. |
COCOON |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Gus Gutoski, John Watrous |
Quantum Interactive Proofs with Competing Provers. |
STACS |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Gus Gutoski |
Upper Bounds for Quantum Interactive Proofs with Competing Provers. |
CCC |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Willy Susilo, Yi Mu 0001 |
Deniable Ring Authentication Revisited. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Xiaofeng Chen 0001, Fangguo Zhang, Kwangjo Kim |
Limited Verifier Signature from Bilinear Pairings. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Paul E. Dunne, Peter McBurney |
Optimal utterances in dialogue protocols. |
AAMAS |
2003 |
DBLP DOI BibTeX RDF |
argumentation and persuasion, dialogue protocols, locution selection, computational complexity, agent communication languages |
23 | Moni Naor |
Deniable Ring Authentication. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Birgit Pfitzmann, Ahmad-Reza Sadeghi |
Anonymous Fingerprinting with Direct Non-repudiation. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
digital coin, anonymity, fingerprinting, restrictiveness |
23 | Josh Cohen Benaloh |
Cryptographic Capsules: A Disjunctive Primative for Interactive Protocols. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
|
23 | David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf, René Peralta 0001 |
Demonstrating Possession of a Discrete Logarithm Without Revealing It. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
|
12 | Ronen Gradwohl, Moni Naor, Benny Pinkas, Guy N. Rothblum |
Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles. |
Theory Comput. Syst. |
2009 |
DBLP DOI BibTeX RDF |
Cryptography, Zero-knowledge proofs, Puzzles |
12 | Yevgeniy Dodis, Jonathan Katz, Adam D. Smith, Shabsi Walfish |
Composability and On-Line Deniability of Authentication. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Marta Indulska, Peter F. Green, Jan Recker, Michael Rosemann |
Business Process Modeling: Perceived Benefits. |
ER |
2009 |
DBLP DOI BibTeX RDF |
modeling advantages, Delphi study, Business process modeling, benefits |
12 | Julien Cathalo, Benoît Libert, Moti Yung |
Group Encryption: Non-interactive Realization in the Standard Model. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Group encryption, anonymity, provable security |
12 | Magalie Ochs, Helmut Prendinger |
Emotional gaming: win by emotion expression. |
Advances in Computer Entertainment Technology |
2009 |
DBLP DOI BibTeX RDF |
|
12 | S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan |
Identity Based Aggregate Signcryption Schemes. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Aggregate Signcryption, Provable Security, Bilinear Pairings, Random Oracle Model, Identity Based Cryptography |
12 | David Galindo |
Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
non-interactive proofs, standard model, public key encryption, identity-based encryption |
12 | Manoj Prabhakaran 0001, Rui Xue 0001 |
Statistically Hiding Sets. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Hans Peter Jepsen, Danilo Beuche |
Running a software product line: standing still is going backwards. |
SPLC |
2009 |
DBLP BibTeX RDF |
|
12 | Peter Y. A. Ryan |
How Many Election Officials Does It Take to Change an Election? |
ARSPA-WITS |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Yitong Wang, Xiaojun Feng |
A Potential-Based Node Selection Strategy for Influence Maximization in a Social Network. |
ADMA |
2009 |
DBLP DOI BibTeX RDF |
social network, greedy algorithm, viral marketing, information diffusion, influence maximization |
12 | Markus Schweighofer |
Describing convex semialgebraic sets by linear matrix inequalities. |
ISSAC |
2009 |
DBLP DOI BibTeX RDF |
determinantal representation, moment relaxation, polynomial inequality, quadratic module, semialgebraic set, spectrahedron, semidefinite programming, linear matrix inequality, convex set, sums of squares, preordering |
12 | Balachandra Reddy Kandukuri, Ramakrishna Paturi V., Atanu Rakshit |
Cloud Security Issues. |
IEEE SCC |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Stuart Reges |
Marketing the programming languages course. |
ACM SIGPLAN Notices |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Philippe Golle, Frank McSherry, Ilya Mironov |
Data Collection with Self-Enforcing Privacy. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
privacy, data collection |
12 | Huan Wang 0004, Liang-Tien Chia, Song Liu 0001 |
Image retrieval ++ - web image retrieval with an enhanced multi-modality ontology. |
Multim. Tools Appl. |
2008 |
DBLP DOI BibTeX RDF |
Spearman’s rank correlation coefficient, Ontology, Web image retrieval |
12 | Luther Martin |
Key-Management Infrastructure for Protecting Stored Data. |
Computer |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Norman Jacobson, Suzanne K. Schaefer |
Pair programming in CS1: overcoming objections to its adoption. |
ACM SIGCSE Bull. |
2008 |
DBLP DOI BibTeX RDF |
lab exams, on-computer exams, CS1, pair programming |
12 | Tao Feng, Fenghua Li, Jianfeng Ma 0001, Sang-Jae Moon |
A new approach for UC security concurrent deniable authentication. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
concurrent deniable authentication, verifiably smooth projective hashing, the decisional composite residuosity assumption, information security, universally composable |
12 | Shou-De Lin, Hans Chalupsky |
Discovering and Explaining Abnormal Nodes in Semantic Graphs. |
IEEE Trans. Knowl. Data Eng. |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu 0001 |
Publicly Verifiable Privacy-Preserving Group Decryption. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Group decryption, Anonymity, Bilinear pairing, Group-oriented cryptography |
12 | Wei Zhao, Changlu Lin, Dingfeng Ye |
Provably Secure Convertible Nominative Signature Scheme. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Nominative signature, Digital signature, Selectively, Universally, Convertible |
12 | Pierre Baldi, Cristina Videira Lopes, Erik Linstead, Sushil Krishna Bajracharya |
A theory of aspects as latent topics. |
OOPSLA |
2008 |
DBLP DOI BibTeX RDF |
aspect-oriented programming, topic models, scattering, tangling |
12 | Yasuhiro Ohtaki |
Partial Disclosure of Searchable Encrypted Data with Support for Boolean Queries. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Secure logging, Partial disclosure, Searchable encryption |
12 | Atsushi Koide, Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
A Restricted Undeniable Designated Verifier Signature. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Qiong Huang 0001, Guomin Yang, Duncan S. Wong, Willy Susilo |
Ambiguous Optimistic Fair Exchange. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara |
Anonymous Fingerprinting for Predelivery of Contents. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Gilles Audemard, Laurent Simon |
Experimenting with Small Changes in Conflict-Driven Clause Learning Algorithms. |
CP |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Na Wang 0001, Xia Li 0006, Xuehui Luo |
Semi-supervised kernel-based fuzzy C-means with pairwise constraints. |
IJCNN |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Jan Kostka, Yvonne Anne Oswald, Roger Wattenhofer |
Word of Mouth: Rumor Dissemination in Social Networks. |
SIROCCO |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Jon G. Hall |
Requirements and architectures: two sides of the same coin. |
SHARK |
2008 |
DBLP DOI BibTeX RDF |
problem orientation, engineering design |
12 | Giuseppe Visaggio |
Knowledge Base and Experience Factory for Empowering Competitiveness. |
ISSSE |
2008 |
DBLP DOI BibTeX RDF |
knowledge management, knowledge transfer, Experience Factory, experience base |
12 | Ade Miller |
A Hundred Days of Continuous Integration. |
AGILE |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Paolo Tonella, Marco Torchiano, Bart Du Bois, Tarja Systä |
Empirical studies in reverse engineering: state of the art and future trends. |
Empir. Softw. Eng. |
2007 |
DBLP DOI BibTeX RDF |
State of art, Empirical framework, Reverse engineering, Taxonomy |
12 | Edward Sobiesk, Gregory J. Conti |
The Cost of Free Web Tools. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Bruce Schneier |
Nonsecurity Considerations in Security Decisions. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Renaud Ott, Daniel Thalmann, Frédéric Vexo |
Haptic feedback in mixed-reality environment. |
Vis. Comput. |
2007 |
DBLP DOI BibTeX RDF |
(Novel) User interfaces, Haptic, Mixed-reality |
12 | Tom J. Bang |
Introducing Agile Methods into a Project Organisation. |
XP |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Hojung Cha, Sukwon Choi, Inuk Jung, Hyoseung Kim 0001, Hyojeong Shin, Jaehyun Yoo, Chanmin Yoon |
The RETOS operating system: kernel, tools and applications. |
IPSN |
2007 |
DBLP DOI BibTeX RDF |
wireless sensor network, operating systems, multithreading |
12 | J. Alex Halderman, Brent Waters |
Harvesting verifiable challenges from oblivious online sources. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Jeff Lewis |
Cryptol: specification, implementation and verification of high-grade cryptographic applications. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
cryptography, specification language, certification, high assurance, symmetric key |
12 | Sagar Chaki, Christian Schallhart, Helmut Veith |
Verification Across Intellectual Property Boundaries. |
CAV |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Guilin Wang, Feng Bao 0001 |
Security Remarks on a Convertible Nominative Signature Scheme. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
Nominative signature, digital signature, information security, attacks |
12 | Román López-Cortijo García, Javier García Guzmán, Antonio de Amescua Seco |
iCharts: Charts for Software Process Improvement Value Management. |
EuroSPI |
2007 |
DBLP DOI BibTeX RDF |
Improvement Benefits, Improve-ment Monitoring, SPI value management, Software Process Improvement |
12 | Nigel Bevan, Helen Petrie, Nigel Claridge |
Tenuta: Strategies for Providing Guidance on Usability and Accessibility. |
HCI (7) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Chunbo Ma, Jun Ao, Jianhua Li 0001 |
Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery. |
HCI (15) |
2007 |
DBLP DOI BibTeX RDF |
Chameleon, Authentication, Key Agreement, Deniability |
12 | Erik Meijer 0001 |
Confessions of a used programming language salesman. |
OOPSLA |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Prateek Gupta, Vitaly Shmatikov |
Security Analysis of Voice-over-IP Protocols. |
CSF |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Fabien Laguillaumie, Damien Vergnaud |
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Universal designated verifier signatures, zero-knowledge proof, Elgamal signatures |
12 | Chengyu Hu, Daxing Li |
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity. |
SNPD (1) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Alain Forget, Sonia Chiasson, Robert Biddle |
Helping users create better passwords: is this the right approach? |
SOUPS |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Jianhong Zhang, Jane Mao |
Security Analysis of Two Signature Schemes and Their Improved Schemes. |
ICCSA (1) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Tobias Uldall-Espersen |
Exploring Multiple Usability Perspectives. |
INTERACT (1) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Neil C. Rowe |
Finding Logically Consistent Resource-Deception Plans for Defense in Cyberspace. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Jianhong Zhang |
A verifiably encrypted signature scheme with strong unforgeability. |
Infoscale |
2007 |
DBLP DOI BibTeX RDF |
security analysis, proof, verifiably encryption |
12 | Ronen Gradwohl, Moni Naor, Benny Pinkas, Guy N. Rothblum |
Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles. |
FUN |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Salima Benbernou, Hassina Meziane, Yin Hua Li, Mohand-Said Hacid |
A Privacy Agreement Model for Web Services. |
IEEE SCC |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Christophe Diot |
Editor's message. |
Comput. Commun. Rev. |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Thomas A. Standish, Norman Jacobson |
Using O(n) ProxmapSort and O(1) ProxmapSearch to motivate CS2 students, Part II. |
ACM SIGCSE Bull. |
2006 |
DBLP DOI BibTeX RDF |
ProxmapSearch, ProxmapSort, searching, sorting, CS2 |
12 | Philippe Golle, Frank McSherry, Ilya Mironov |
Data collection with self-enforcing privacy. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
privacy, data collection |
12 | J. William Murdock, Deborah L. McGuinness, Paulo Pinheiro da Silva, Christopher A. Welty, David A. Ferrucci |
Explaining Conclusions from Diverse Knowledge Sources. |
ISWC |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Minh-Huyen Nguyen, Shien Jin Ong, Salil P. Vadhan |
Statistical Zero-Knowledge Arguments for NP from Any One-Way Function. |
FOCS |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Zhongwei Zhang, Zhen Wang |
Assessing and Assuring Trust in E-Commerce Systems. |
CIMCA/IAWTIC |
2006 |
DBLP DOI BibTeX RDF |
|