|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 669 occurrences of 482 keywords
|
|
|
Results
Found 5904 publication records. Showing 4791 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
183 | Caitlin Kelleher, Randy F. Pausch, Sara B. Kiesler |
Storytelling alice motivates middle school girls to learn computer programming. |
CHI |
2007 |
DBLP DOI BibTeX RDF |
children, programming, computer science education, programming environments, motivation, gender, Alice |
150 | Susan H. Rodger, Jenna Hayes, Gaetjens Lezin, Henry Qin, Deborah Nelson, Ruth Tucker, Mercedes Lopez, Stephen Cooper, Wanda P. Dann, Don Slater |
Engaging middle school teachers and students with alice in a diverse set of subjects. |
SIGCSE |
2009 |
DBLP DOI BibTeX RDF |
virtual worlds, alice, introductory computer science, middle school, k-12 education, under-represented groups |
139 | Randy Pausch |
Alice: a dying man's passion. |
SIGCSE |
2008 |
DBLP DOI BibTeX RDF |
alice |
110 | Claude Castelluccia, Pars Mutaf |
Shake them up!: a movement-based pairing protocol for CPU-constrained devices. |
MobiSys |
2005 |
DBLP DOI BibTeX RDF |
|
107 | Jeffrey S. Pierce |
Introducing Alice to a Squeak Wonderland. |
C5 |
2003 |
DBLP DOI BibTeX RDF |
|
95 | Ryan Garlick, Ebru Celikel Cankaya |
Using alice in CS1: a quantitative experiment. |
ITiCSE |
2010 |
DBLP DOI BibTeX RDF |
pedagogy, CS1, retention, alice, CS0 |
88 | Yael Tauman Kalai, Ran Raz |
Succinct Non-Interactive Zero-Knowledge Proofs with Preprocessing for LOGSNP. |
FOCS |
2006 |
DBLP DOI BibTeX RDF |
|
88 | Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski |
Conditional Digital Signatures. |
TrustBus |
2005 |
DBLP DOI BibTeX RDF |
|
85 | Karin Johnsgard, James McDonald |
Using Alice in Overview Courses to Improve Success Rates in Programming I. |
CSEE&T |
2008 |
DBLP DOI BibTeX RDF |
|
85 | John Domingue, Maria Martins, Jiacheng Tan, Arthur Stutt, Helgi Petursson |
Alice: Assisting Online Shoppers through Ontologies and Novel Interface Metaphors. |
EKAW |
2002 |
DBLP DOI BibTeX RDF |
|
84 | Susan H. Rodger, Maggie Bashford, Lana Dyck, Jenna Hayes, Liz Liang, Deborah Nelson, Henry Qin |
Enhancing K-12 education with alice programming adventures. |
ITiCSE |
2010 |
DBLP DOI BibTeX RDF |
virtual worlds, alice, introductory computer science, middle school, K-12 education |
77 | Surendra Boppana, John M. Shea |
Overlapped Carrier-Sense Multiple Access (OCSMA) in Wireless Ad Hoc Networks. |
IEEE Trans. Mob. Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
77 | Thomas Holenstein |
Parallel repetition: simplifications and the no-signaling case. |
STOC |
2007 |
DBLP DOI BibTeX RDF |
probabilistically checkable proofs, parallel repetition |
77 | Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III |
Public Key Encryption That Allows PIR Queries. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
Public-key Encryption with special properties, Database security, Private Information Retrieval, Searching on encrypted data |
77 | Olivier Markowitch, Steve Kremer |
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|
77 | Michael Roe |
Authentication and Naming (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
77 | Gábor Tardos, Uri Zwick |
The Communication Complexity of the Universal Relation. |
CCC |
1997 |
DBLP DOI BibTeX RDF |
protocols, communication complexity |
66 | Josef Cibulka, Jan Kyncl, Viola Mészáros, Rudolf Stolar, Pavel Valtr 0001 |
Solution of Peter Winkler's Pizza Problem. |
IWOCA |
2009 |
DBLP DOI BibTeX RDF |
|
66 | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia |
Private Information: To Reveal or not to Reveal. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
authorization, policies, secure multi-party computation |
66 | Prahladh Harsha, Rahul Jain 0001, David A. McAllester, Jaikumar Radhakrishnan |
The Communication Complexity of Correlation. |
CCC |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Marco Meoni |
Interactive Parallel Analysis on the ALICE Grid with the PROOF Framework. |
ICCS (1) |
2009 |
DBLP DOI BibTeX RDF |
interactive parallel distributed processing, task colocation, Grid, PROOF, ALICE, resource availability, data movement |
57 | Elizabeth K. Hawthorne |
Alice grows up: transitioning from Alice 2 to Alice 3 in community college programming courses. |
Inroads |
2011 |
DBLP DOI BibTeX RDF |
|
55 | Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li 0001 |
Attribute-Based Access Control with Hidden Policies and Hidden Credentials. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
Electronic commerce-security, hidden credentials, privacy, authentication, access control, trust negotiation, security and protection, management of computing and information systems |
55 | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia |
Point-Based Trust: Define How Much Privacy Is Worth. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
private multi-party computation, Trust management, knapsack problem |
55 | Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li 0001 |
Hidden access control policies with hidden credentials. |
WPES |
2004 |
DBLP DOI BibTeX RDF |
hidden credentials, privacy, access control, secure multi-party computation, trust negotiation |
55 | Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano |
Public Key Encryption with Keyword Search. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
55 | Christian Cachin, Jan Camenisch, Joe Kilian, Joy Müller |
One-Round Secure Computation and Secure Autonomous Mobile Agents. |
ICALP |
2000 |
DBLP DOI BibTeX RDF |
|
55 | Richard Cleve |
Controlled Gradual Disclosure Schemes for Random Bits and Their Applications. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
52 | Adam Martinez, Terrance Tornberg |
Lighting and rendering Alice in Wonderland. |
SIGGRAPH Talks |
2010 |
DBLP DOI BibTeX RDF |
|
52 | Briana Lowe Wellman, James E. Davis, Monica Anderson 0001 |
Alice and robotics in introductory CS courses. |
Richard Tapia Celebration of Diversity in Computing Conference |
2009 |
DBLP DOI BibTeX RDF |
education, diversity, computer science |
51 | Sally Fincher, Stephen Cooper, Michael Kölling, John Maloney |
Comparing alice, greenfoot & scratch. |
SIGCSE |
2010 |
DBLP DOI BibTeX RDF |
alice, scratch, ile, greenfoot |
51 | Robert H. Seidman |
Alice first: 3D interactive game programming. |
ITiCSE |
2009 |
DBLP DOI BibTeX RDF |
devlopment, java, algorithm, animation, CS1, virtual worlds, objects, 3D, alice, game programming |
51 | Linda L. Werner, Jill Denner, Michelle Bliesner, Pat Rex |
Can middle-schoolers use Storytelling Alice to make games?: results of a pilot study. |
FDG |
2009 |
DBLP DOI BibTeX RDF |
Storytelling Alice, pair programming, middle-school, IT fluency |
51 | Torben Lorenzen, Abdul Sattar 0002 |
Objects first using Alice to introduce object constructs in CS1. |
ACM SIGCSE Bull. |
2008 |
DBLP DOI BibTeX RDF |
Java, object-oriented programming, objects, methods, classes, Alice |
51 | Joel C. Adams |
Alice, middle schoolers & the imaginary worlds camps. |
SIGCSE |
2007 |
DBLP DOI BibTeX RDF |
3-D animation, camp, single-sex classes, programming, computer science, objects, gender, Alice, movies, middle school |
44 | Stefan Dziembowski, Ueli M. Maurer |
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Yasuhiro Ohtaki |
Partial Disclosure of Searchable Encrypted Data with Support for Boolean Queries. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Secure logging, Partial disclosure, Searchable encryption |
44 | Jiangtao Li 0001, Ninghui Li |
OACerts: Oblivious Attribute Certificates. |
IEEE Trans. Dependable Secur. Comput. |
2006 |
DBLP DOI BibTeX RDF |
privacy, access controls, Security and privacy protection, cryptographic controls |
44 | Alberto Trombetta, Elisa Bertino |
Private Updates to Anonymous Databases. |
ICDE |
2006 |
DBLP DOI BibTeX RDF |
Privacy, anonymity, data management, secure computation |
44 | Audun Jøsang, Stephen Marsh 0001, Simon Pope |
Exploring Different Types of Trust Propagation. |
iTrust |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Shai Avidan, Moshe Butman |
Blind Vision. |
ECCV (3) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Giuseppe Ateniese, Susan Hohenberger |
Proxy re-signatures: new definitions, algorithms, and applications. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
authenticating path in network, proxy re-signature, bilinear maps |
44 | Jiangtao Li 0001, Ninghui Li |
OACerts: Oblivious Attribute Certificates. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Jiangtao Li 0001, Ninghui Li |
Policy-hiding access control in open environment. |
PODC |
2005 |
DBLP DOI BibTeX RDF |
cryptographic commitment, secure function, privacy, evaluation, access control, cryptographic protocol, automated trust negotiation, digital credentials |
44 | Thomas Holenstein, Renato Renner |
One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Ueli M. Maurer, Yacov Yacobi |
A Remark on a Non-interactive Public-Key Distribution System. |
EUROCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
44 | Ueli M. Maurer |
Protocols for Secret Key Agreement by Public Discussion Based on Common Information. |
CRYPTO |
1992 |
DBLP DOI BibTeX RDF |
|
44 | Mihir Bellare, Lenore Cowen, Shafi Goldwasser |
On the Structure of Secret Key Exchange Protocols. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
43 | Joel C. Adams |
Scratching middle schoolers' creative itch. |
SIGCSE |
2010 |
DBLP DOI BibTeX RDF |
2-d animation, summer camps, games, videos, programming, music, computer science, gender, alice, scratch, middle school |
41 | Wanda P. Dann, Stephen Cooper |
Education - Alice 3: concrete to abstract. |
Commun. ACM |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Sebastian Mödersheim |
Algebraic Properties in Alice and Bob Notation. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Kris Powers, Stacey Ecott, Leanne M. Hirshfield |
Through the looking glass: teaching CS0 with Alice. |
SIGCSE |
2007 |
DBLP DOI BibTeX RDF |
novice programming environments |
41 | Yong Meng Teo, Xianbing Wang |
ALiCE: A Scalable Runtime Infrastructure for High Performance Grid Computing. |
NPC |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Dac Phuong Ho, Yong Meng Teo, Johan Prawira Gozali |
Solving the N-Body Problem with the ALiCE Grid System. |
ASIAN |
2002 |
DBLP DOI BibTeX RDF |
|
41 | Matthew Conway, Steve Audia, Tommy Burnette, Dennis Cosgrove, Kevin Christiansen |
Alice: lessons learned from building a 3D system for novices. |
CHI |
2000 |
DBLP DOI BibTeX RDF |
animation authoring tools, interactive 3D graphics |
41 | Heather Brown, Robert Harding, Steven Lay, Peter Robinson 0001, Dan Sheppard, Richard Watts |
Active Alice: Using Real Paper to Interact with Electronic Texts. |
EP |
1998 |
DBLP DOI BibTeX RDF |
|
38 | Petra Loncar |
Scalable data processing model of the ALICE experiment in the cloud ; Model skalabilne obrade podataka ALICE eksperimenta u oblaku. |
|
2023 |
RDF |
|
38 | Patcharaporn Jenviriyakul, Gantaphon Chalumporn, Tiranee Achalakul, Filippo Costa, Khajonpong Akkarajitsakul |
ALICE Connex: A volunteer computing platform for the Time-Of-Flight calibration of the ALICE experiment. An opportunistic use of CPU cycles on Android devices. |
Future Gener. Comput. Syst. |
2019 |
DBLP DOI BibTeX RDF |
|
38 | Yuqing Kong, Grant Schoenebeck |
Optimizing Bayesian Information Revelation Strategy in Prediction Markets: the Alice Bob Alice Case. |
ITCS |
2018 |
DBLP DOI BibTeX RDF |
|
38 | Donald J. Slater, Eric Brown, Wanda P. Dann |
Mapping Alice Curriculum to Standards: A BOF for the Alice Community (Abstract Only). |
SIGCSE |
2017 |
DBLP DOI BibTeX RDF |
|
38 | Patcharaporn Jenviriyakul, Gantaphon Chalumporn, Tiranee Achalakul, Filippo Costa, Khajonpong Akkarajitsakul |
ALICE Connex: A volunteer computing platform for ALICE experiments. |
BigComp |
2016 |
DBLP DOI BibTeX RDF |
|
38 | Leonel Morales Díaz, Laura Sanely Gaytán-Lugo, Lissette Fleck |
From intuition to measure: Styles of use in Alice: Identifying patterns of use by observing participants in workshops with Alice. |
VL/HCC |
2015 |
DBLP DOI BibTeX RDF |
|
38 | Ahmad Al-Jarrah, Enrico Pontelli |
"AliCe-ViLlagE" Alice as a Collaborative Virtual Learning Environment. |
FIE |
2014 |
DBLP DOI BibTeX RDF |
|
38 | Mark Cohen |
Uncoupling Alice: using Alice to teach advanced object-oriented design. |
Inroads |
2013 |
DBLP DOI BibTeX RDF |
|
38 | Robert P. Schumaker, Ying Liu, Mark Ginsburg, Hsinchun Chen |
Evaluating mass knowledge acquisition using the ALICE chatterbot: The AZ-ALICE dialog system. |
Int. J. Hum. Comput. Stud. |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Stanko Dimitrov, Rahul Sami |
Composition of markets with conflicting incentives. |
EC |
2010 |
DBLP DOI BibTeX RDF |
conflicting incentives, prediction markets, scoring rule, market scoring rule |
33 | Jian Weng 0001, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai |
Conditional proxy re-encryption secure against chosen-ciphertext attack. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
conditional proxy re-encryption, bilinear pairing, chosen-ciphertext security |
33 | Ke Yi 0001, Qin Zhang 0001 |
Multi-dimensional online tracking. |
SODA |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Ivan Damgård, Jesper Buus Nielsen, Daniel Wichs |
Universally Composable Multiparty Computation with Partially Isolated Parties. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
public-key infrastructure, multiparty computation, universally composable security |
33 | Cheng-Kang Chu, Jian Weng 0001, Sherman S. M. Chow, Jianying Zhou 0001, Robert H. Deng |
Conditional Proxy Broadcast Re-Encryption. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
conditional proxy re-encryption, hierarchical identity-coupling broadcast encryption, broadcast encryption, proxy re-encryption |
33 | Alptekin Küpçü, Anna Lysyanskaya |
Brief announcement: impossibility results for optimistic fair exchange with multiple autonomous arbiters. |
PODC |
2009 |
DBLP DOI BibTeX RDF |
distributed arbiters, optimistic fair exchange, trusted third party |
33 | Sanjit Chatterjee, Koray Karabina, Alfred Menezes |
A New Protocol for the Nearby Friend Problem. |
IMACC |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Yevgeniy Dodis, Daniel Wichs |
Non-malleable extractors and symmetric key cryptography from weak secrets. |
STOC |
2009 |
DBLP DOI BibTeX RDF |
bounded retrieval model, information reconcilliation, authentication, encryption, information theoretic security, randomness extractors, privacy amplification, authenticated key agreement |
33 | Yaling Zhang, Xiaofeng Wang |
Message Substitute Attack on Concurrent Signatures Protocol and its Improvement. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
Message Substitute Attack, Concurrent Signatures |
33 | Mikhail J. Atallah, Keith B. Frikken, Marina Blanton, YounSun Cho |
Private combinatorial group testing. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
privacy, secure protocol, group testing, integrity verification |
33 | Alberto Trombetta, Wei Jiang, Elisa Bertino, Lorenzo Bossi |
Privately Updating Suppression and Generalization based k-Anonymous Databases. |
ICDE |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Oded Regev 0001, Ben Toner |
Simulating Quantum Correlations with Finite Communication. |
FOCS |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Cheng-Kang Chu, Wen-Guey Tzeng |
Identity-Based Proxy Re-encryption Without Random Oracles. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
standard model, identity-based encryption, Proxy re-encryption |
33 | Maged Hamada Ibrahim |
Two-Party Private Vector Dominance: The All-Or-Nothing Deal. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Wei Yang 0011, Liusheng Huang, Mingjun Xiao, Weiwei Jing |
Quantum ANDOS Protocol with Unconditional Security. |
ICNC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang |
Anonymous Signature Schemes. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Seth Gilbert, Rachid Guerraoui, Calvin C. Newport |
Of Malicious Motes and Suspicious Sensors: On the Efficiency of Malicious Interference in Wireless Networks. |
OPODIS |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Moni Naor, Guy N. Rothblum |
Learning to impersonate. |
ICML |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Hal A. Kierstead, Daqing Yang |
Very Asymmetric Marking Games. |
Order |
2005 |
DBLP DOI BibTeX RDF |
coloring number, competitive coloring, planar graph |
33 | Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar |
Securely Utilizing External Computing Power. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
program encryption, circuit encryption, Boolean circuit, secure function evaluation, biometric identification |
33 | Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski |
Local View Attack on Anonymous Communication. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Chi-Jen Lu |
Encryption against Storage-Bounded Adversaries from On-Line Strong Extractors. |
J. Cryptol. |
2004 |
DBLP DOI BibTeX RDF |
Everlasting security, List-decodable codes, Expander graphs, Randomness extractors, Bounded-storage model |
33 | Stephan Kolassa, Stefan Schwarz |
Two-Step Drawing from Urns. |
OR |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Ke Yang 0005 |
On the (Im)possibility of Non-interactive Correlation Distillation. |
LATIN |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Valery I. Korzhik, Guillermo Morales-Luna |
Hybrid authentication based on noisy channels. |
Int. J. Inf. Sec. |
2003 |
DBLP DOI BibTeX RDF |
Key sharing, Information-theoretically secure authentication, Hash functions, Privacy amplification |
33 | Shengli Liu 0001, Henk C. A. van Tilborg, Marten van Dijk |
A Practical Protocol for Advantage Distillation and Information Reconciliation. |
Des. Codes Cryptogr. |
2003 |
DBLP DOI BibTeX RDF |
advantage distillation, unconditional security, secret key agreement, information reconciliation |
33 | Qianhong Wu, Jianhong Zhang, Yumin Wang |
Practical t-out-n Oblivious Transfer and Its Applications. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Yan Zong Ding, Michael O. Rabin |
Hyper-Encryption and Everlasting Security. |
STACS |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Chi-Jen Lu |
Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Andris Ambainis, Adam D. Smith, Ke Yang 0005 |
Extracting Quantum Entanglement. |
CCC |
2002 |
DBLP DOI BibTeX RDF |
Entanglement Purification, General Error Models, Purity-Testing, Quantum Cryptography |
33 | Donald Beaver |
Minimal-Latency Secure Function Evaluation. |
EUROCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
33 | Andris Ambainis, Harry Buhrman, William I. Gasarch, Bala Kalyanasundaram, Leen Torenvliet |
The Communication Complexity of Enumeration, Elimination, and Selection. |
CCC |
2000 |
DBLP DOI BibTeX RDF |
|
33 | Reto Kohlas, Ueli M. Maurer |
Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys. |
Financial Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
33 | Juan A. Garay, Markus Jakobsson, Philip D. MacKenzie |
Abuse-Free Optimistic Contract Signing. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
33 | Louis Salvail |
The Search for the Holy Grail in Quantum Cryptography. |
Lectures on Data Security |
1998 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 4791 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|