The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cheating with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1989 (15) 1990-1995 (16) 1996-1999 (18) 2000-2001 (27) 2002 (16) 2003 (21) 2004 (25) 2005 (33) 2006 (41) 2007 (43) 2008 (50) 2009 (38) 2010 (19) 2011 (24) 2012 (17) 2013 (30) 2014 (31) 2015 (30) 2016 (18) 2017 (28) 2018 (37) 2019 (23) 2020 (29) 2021 (34) 2022 (35) 2023 (48) 2024 (9)
Publication types (Num. hits)
article(261) incollection(4) inproceedings(486) phdthesis(4)
Venues (Conferences, Journals, ...)
CoRR(46) NETGAMES(14) CRYPTO(12) EUROCRYPT(12) ITiCSE(10) SIGCSE(9) ACISP(8) ICALT(8) ASIACRYPT(7) Comput. Educ.(7) Comput. Hum. Behav.(7) DiGRA Conference(6) EDUCON(5) FIE(5) IACR Cryptol. ePrint Arch.(5) ICISC(5) More (+10 of total 428)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 379 occurrences of 238 keywords

Results
Found 755 publication records. Showing 755 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
136Nan Zhang, Yuanchun Shi, Bin Chang Impact of Node Cheating on Gossip-Based Protocol. Search on Bibsonomy EUC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF node cheating, reliable, gossip-based protocol, ALM
136Judy Sheard, Martin Dick Influences on cheating practice of graduate students in IT courses: what are the factors? Search on Bibsonomy ITiCSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF information technology, cheating, plagiarism, graduate students
133Josef Pieprzyk, Xian-Mo Zhang Cheating Prevention in Linear Secret Sharing. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Linear Secret Sharing Schemes, Cheating Identification, Cryptography, Secret Sharing, Cheating Detection
112Robert Law Using student blogs for documentation in software development projects. Search on Bibsonomy ITiCSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
110Henry Been-Lirn Duh, Vivian Hsueh-hua Chen Cheating Behaviors in Online Gaming. Search on Bibsonomy HCI (12) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Online game cheating, cheating frameworks, online game fairness
103Jeff Jianxin Yan, Brian Randell A systematic classification of cheating in online games. Search on Bibsonomy NETGAMES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF online computer games, security, taxonomy, cheating
103Josef Pieprzyk, Xian-Mo Zhang Cheating Prevention in Secret Sharing over GF(pt). Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Nonlinear Secret Sharing, Cheating Immunity, Secret Sharing
92Wenping Ma 0002, Fu Tai Zhang New Methods to Construct Cheating Immune Multisecret Sharing Scheme. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Quadratic Function, Cheating Immune Function, Multisecret Secret Sharing, Secret Sharing
86Stefano Ferretti, Marco Roccetti AC/DC: an algorithm for cheating detection by cheating. Search on Bibsonomy NOSSDAV The full citation details ... 2006 DBLP  DOI  BibTeX  RDF peer-to-peer, synchronization, online games, cheating
84Toshinori Araki Efficient (k, n) Threshold Secret Sharing Schemes Secure Against Cheating from n-1 Cheaters. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
84Xian-Mo Zhang, Josef Pieprzyk Cheating Immune Secret Sharing. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
80Steven Daniel Webb, Sieteng Soh Cheating in networked computer games: a review. Search on Bibsonomy DIMEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF networked computer games, peer-to-peer, client/server, cheating
80Ryan Porter, Yoav Shoham On cheating in sealed-bid auctions. Search on Bibsonomy EC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF game theory, cheating, sealed-bid auctions
80Judy Sheard, Martin Dick, Selby Markham, Ian MacDonald, Meaghan Walsh Cheating and plagiarism: perceptions and practices of first year IT students. Search on Bibsonomy ITiCSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF information technology, cheating, plagiarism, undergraduates
73Peter Laurens, Richard F. Paige, Phillip J. Brooke, Howard Chivers A Novel Approach to the Detection of Cheating in Multiplayer Online Games. Search on Bibsonomy ICECCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
73Roberto De Prisco, Alfredo De Santis Cheating Immune (2, n)-Threshold Visual Secret Sharing. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
69Wen Ping Ma, Moon Ho Lee New Methods to Construct Cheating Immune Functions. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Quadratic Function, Balanced Function, Cheating Immune Function, MDS Code
67Siu Fung Yeung, John C. S. Lui Dynamic Bayesian approach for detecting cheats in multi-player online games. Search on Bibsonomy Multim. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
62Huey-Ing Liu, Yun-Ting Lo DaCAP - A Distributed Anti-Cheating Peer to Peer Architecture for Massive Multiplayer On-line Role Playing Game. Search on Bibsonomy CCGRID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF P2P, MMOG, MMORPG
62Satoshi Obana, Toshinori Araki Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
62Josef Pieprzyk, Xian-Mo Zhang Constructions of Cheating Immune Secret Sharing. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
60Yanyan Zhang A Multisecret Sharing Threshold Scheme. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF dealer cheating, multisecret sharing, participant cheating, discrete logarithm problem, threshold scheme
58Stefano Ferretti Cheating detection through game time modeling: A better way to avoid time cheats in P2P MOGs? Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Peer-to-peer, Multiplayer online games, Cheating detection
58Yong Cui 0001, Dan Li 0001, Jianping Wu Impact of Buffer Map Cheating on the Streaming Quality in DONet. Search on Bibsonomy International Conference on Computational Science (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DONet, Buffer Map Cheating, Selfish
58Stefano Ferretti, Marco Roccetti Game time modelling for cheating detection in P2P MOGs: a case study with a fast rate cheat. Search on Bibsonomy NETGAMES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF peer-to-peer, synchronization, online games, cheating
58Kang Li 0001, Shanshan Ding, Doug McCreary, Steve Webb Analysis of state exposure control to prevent cheating in online games. Search on Bibsonomy NOSSDAV The full citation details ... 2004 DBLP  DOI  BibTeX  RDF anti-cheating, online games
52Josh Goodman, Clark Verbrugge A peer auditing scheme for cheat elimination in MMOGs. Search on Bibsonomy NETGAMES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF peer auditing, peer to peer, computer games, network model, trust model, cheating
52Josef Pieprzyk, Xian-Mo Zhang Ideal Threshold Schemes from MDS Codes. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Cheating Detection and Identification, Secret Sharing, Threshold Schemes
50Chi-Ming Hu, Wen-Guey Tzeng Cheating Prevention in Visual Cryptography. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
50Gwoboa Horng, Tzungher Chen, Du-shiau Tsai Cheating in Visual Cryptography. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF AMS Classification 94A62
50Christian Mönch, Gisle Grimen, Roger Midtstraum Protecting online games against cheating. Search on Bibsonomy NETGAMES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
50Dan Li 0001, Jianping Wu, Yong Cui 0001, Jiangchuan Liu, Ke Xu 0002 Trustworthy Distributed Algorithm Design to Defend Distance Cheating in Link-Weighted ALM. Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
50Jouni Smed, Harri Hakonen Preventing Look-Ahead Cheating with Active Objects. Search on Bibsonomy Computers and Games The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
47Patric Kabus, Wesley W. Terpstra, Mariano Cilia, Alejandro P. Buchmann Addressing cheating in distributed MMOGs. Search on Bibsonomy NETGAMES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF distributed systems, cheating, massively multiplayer online gaming
47David W. Petr, Ann Demirtjis How to encourage cheating with virtual path policing in ATM networks. Search on Bibsonomy ICCCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF virtual path policing, virtual channel policing, usage parameter control, peak rate, sustainable rate policer, leaky bucket algorithm, noncompliant traffic, UPC function, compliant users, noncompliant users, asynchronous transfer mode, ATM networks, Ethernet, telecommunication traffic, cheating, variable bit rate traffic
45Reid Kerr, Robin Cohen Smart cheaters do prosper: defeating trust and reputation systems. Search on Bibsonomy AAMAS (2) The full citation details ... 2009 DBLP  BibTeX  RDF electronic marketplaces, trust and reputation
45Nathaniel E. Baughman, Marc Liberatore, Brian Neil Levine Cheat-proof playout for centralized and peer-to-peer gaming. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, gaming, peer-to-peer networking, multimedia communication
45Satoshi Hada Zero-Knowledge and Code Obfuscation. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
41Bei Di Chen, Muthucumaru Maheswaran A cheat controlled protocol for centralized online multiplayer games. Search on Bibsonomy NETGAMES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cheat prevention, time cheating, multiplayer online games
41Josef Pieprzyk, Xian-Mo Zhang Ideal Threshold Schemes from Orthogonal Arrays. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Orthogonal Arrays, Nonlinear Functions, Threshold Secret Sharing, Cheating Detection
39Chien-Chung Huang Cheating to Get Better Roommates in a Random Stable Matching. Search on Bibsonomy STACS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Stefano Arteconi, David Hales, Özalp Babaoglu Greedy Cheating Liars and the Fools Who Believe Them. Search on Bibsonomy ESOA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39David J. Hand, Niall M. Adams, Nick A. Heard Pattern Discovery Tools for Detecting Cheating in Student Coursework. Search on Bibsonomy Local Pattern Detection The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
39Ying Xiao, Winfried Just A Possible Mechanism of Repressing Cheating Mutants in Myxobacteria. Search on Bibsonomy GECCO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
37Gregory J. Conti, James Caroland Embracing the Kobayashi Maru: Why You Should Teach Your Students to Cheat. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF hacker mindset, adversary mindset, cheating exercises, ethics, cheating
35Ch. Rupa 0001, P. S. Avadhani Message Encryption Scheme Using Cheating Text. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cheating Text, CPT, 64-bit chaining variables, Hash Functions, RIF
35Anton Nijholt Playing and Cheating in Ambient Entertainment. Search on Bibsonomy ICEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF nonverbal interaction, Entertainment computing, cheating
34Shaomin Zhang, Xiayan Zhang, Baoyi Wang History and Future Information Based Trust Model in C2C E-commerce. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Giovanni Di Crescenzo Minimal Assumptions and Round Complexity for Concurrent Zero-Knowledge in the Bare Public-Key Model. Search on Bibsonomy COCOON The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Bare Public-Key Model, Complexity Assumptions, Round Complexity, Zero-Knowledge Protocols, Concurrent Zero-Knowledge
34Kui Wu 0001, Dennis Dreef, Bo Sun 0001, Yang Xiao 0001 Secure data aggregation without persistent cryptographic operations in wireless sensor networks. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Rakesh Agrawal 0001, Evimaria Terzi On Honesty in Sovereign Information Sharing. Search on Bibsonomy EDBT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Felix C. Freiling, Maurice Herlihy, Lucia Draque Penso Optimal Randomized Fair Exchange with Secret Shared Coins. Search on Bibsonomy OPODIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Carolee Stewart-Gardiner, David G. Kay, Joyce Currie Little, Joseph D. Chase, John Fendrich, Laurie A. Williams, Ursula Wolz Collaboration vs plagiarism in computer science programming courses. Search on Bibsonomy SIGCSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
34Dror Lapidot, Adi Shamir A One-Round, Two-Prover, Zero-Knowledge Protocol for NP. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
33Sedat Yazici, Hatice Yildiz Durak, Beyza Aksu Dünya, Burcu Sentürk Online versus face-to-face cheating: The prevalence of cheating behaviours during the pandemic compared to the pre-pandemic among Turkish University students. Search on Bibsonomy J. Comput. Assist. Learn. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Leslie Ching Ow Tiong, HeeJeong Jasmine Lee E-cheating Prevention Measures: Detection of Cheating at Online Examinations Using Deep Learning Approach - A Case Study. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
33Jyotirmoy Pramanik, Sabyasachi Dutta, Partha Sarathi Roy 0001, Avishek Adhikari Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency. Search on Bibsonomy ICISS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
33Cale J. Passmore, Matthew K. Miller 0001, Jun Liu, Cody J. Phillips 0002, Regan L. Mandryk A Cheating Mood: The Emotional and Psychological Benefits of Cheating in Single-Player Games. Search on Bibsonomy CHI PLAY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
33Ziqian Yuan, Wenhui Zhang, Huijuan Fu, Zhixiao Tu A PageRank-improved ranking algorithm based on cheating similarity and cheating relevance. Search on Bibsonomy ICIS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
33Stefano De Paoli, Aphra Kerr The Cheating Assemblage in MMORPGs: Toward a sociotechnical description of cheating. Search on Bibsonomy DiGRA Conference The full citation details ... 2009 DBLP  BibTeX  RDF
33Xin Xiao, Yuanchun Shi, Yun Tang, Nan Zhang Cheating and Anti-Cheating in Gossip-Based Protocol: An Experimental Investigation. Search on Bibsonomy IEICE Trans. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Yun Tang, Nan Zhang, Yuanchun Shi, Shiqiang Yang, Yuzhuo Zhong An Experimental Study on Cheating and Anti-Cheating in Gossip-Based Protocol. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Michael Stepp, Beth Simon Introductory computing students' conceptions of illegal student-student collaboration. Search on Bibsonomy SIGCSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF academic integrity, cs1, cheating, plagiarism
30Kuan-Ta Chen, Hsing-Kuo Kenneth Pao, Hong-Chung Chang Game bot identification based on manifold learning. Search on Bibsonomy NETGAMES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF classification, SVM, trajectory, online games, kNN, cheating, isomap
30Steven Daniel Webb, Sieteng Soh, Jerry L. Trahan Secure Referee Selection for Fair and Responsive Peer-to-Peer Gaming. Search on Bibsonomy PADS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF referee selection, security, peer-to-peer, MMOG, network game, cheating
30Kuan-Ta Chen, Andrew Liao, Hsing-Kuo Kenneth Pao, Hao-Hua Chu Game Bot Detection Based on Avatar Trajectory. Search on Bibsonomy ICEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Online Games, User Behavior, Supervised Classification, Cheating Detection, Quake
30Wenliang Du, Michael T. Goodrich Searching for High-Value Rare Events with Uncheatable Grid Computing. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, Grid computing, obfuscation, cheating, cryptographic hash functions
30Chris Chambers, Wu-chang Feng, Wu-chi Feng, Debanjan Saha Mitigating information exposure to cheaters in real-time strategy games. Search on Bibsonomy NOSSDAV The full citation details ... 2005 DBLP  DOI  BibTeX  RDF peer-to-peer, games, cheating
30Jeffrey L. Popyack, Nira Herrmann, Paul Zoski, Bruce W. Char, Christopher D. Cera, Robert N. Lass Academic dishonesty in a high-tech environment. Search on Bibsonomy SIGCSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF academic dishonesty, tools, detection, cheating, plagiarism
30Weiliang Zhao, Vijay Varadharajan, Yi Mu 0001 Fair On-line Gambling. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF fair on-line gambling, fair electronic gambling scheme, gambling outcome, optimal fair exchange metho, gambling message exchange, off-line Trusted Third Party, Internet, Internet, transaction processing, entertainment, security of data, cheating, payment, financial data processing
28Murtuza Jadliwala, Sheng Zhong 0002, Shambhu J. Upadhyaya, Chunming Qiao, Jean-Pierre Hubaux Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF distance-based localization, security, Wireless networks
28Walter Quattrociocchi, Mario Paolucci, Rosaria Conte Image and Reputation Coping Differently with Massive Informational Cheating. Search on Bibsonomy WSKS (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Szymon Szott, Marek Natkaniec, Andrzej R. Pach Cheating on the CW and RTS/CTS Mechanisms in Single-Hop IEEE 802.11e Networks. Search on Bibsonomy ADHOC-NOW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF misbehaviour, Ad-hoc networks, IEEE 802.11e
28Toshinori Araki, Satoshi Obana Flaws in Some Secret Sharing Schemes Against Cheating. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Chien-Chung Huang Cheating by Men in the Gale-Shapley Stable Matching Algorithm. Search on Bibsonomy ESA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Chia-Mu Yu, Chun-Shien Lu Robust non-interactive zero-knowledge watermarking scheme against cheating prover. Search on Bibsonomy MM&Sec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ambiguity attack, zero-knowledge detection, security, robustness, watermark
28Ying-Chieh Chen, Jing-Jang Hwang, Ronggong Song, George Yee, Larry Korba Online Gaming Cheating and Security Issue. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Chin-Chen Chang 0001, Chao-Wen Chan Detecting Dealer Cheating in Secret Sharing Systems. Search on Bibsonomy COMPSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Factoring and discrete logarithms, Network security, Signature verification, Secret-sharing scheme, Authenticated encryption, Message recovery
28Hossein Ghodosi, Josef Pieprzyk Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Cryptography, Digital Signatures, Proxy Signatures, ElGamal signatures
28Wakaha Ogata, Kaoru Kurosawa Optimum Secret Sharing Scheme Secure against Cheating. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
28Tal Rabin Robust Sharing of Secrets When the Dealer is Honest or Cheating. Search on Bibsonomy J. ACM The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
28Marco Carpentieri, Alfredo De Santis, Ugo Vaccaro Size of Shares and Probability of Cheating in Threshold Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
28Don Coppersmith Cheating at Mental Poker. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
22Murtuza Jadliwala, Qi Duan, Shambhu J. Upadhyaya, Jinhui Xu 0001 Towards a theory for securing time synchronization in wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wireless sensor networks, approximation algorithms, time synchronization
22Phillip G. Bradford, Sunju Park, Michael H. Rothkopf, Heejin Park Protocol completion incentive problems in cryptographic Vickrey auctions. Search on Bibsonomy Electron. Commer. Res. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptographic Vickrey actions, Bidder incentives, Yao’s millionaires’ protocol
22Giovanni Di Crescenzo, Helger Lipmaa 3-Message NP Arguments in the BPK Model with Optimal Soundness and Zero-Knowledge. Search on Bibsonomy ISAAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Zero-knowledge arguments, resettable zero-knowledge, resettable soundness, bare public-key model for zero-knowledge protocols
22Arlo Faria, Nelson Morgan When a mismatch can be good: large vocabulary speech recognition trained with idealized tandem features. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF tandem, feature extraction, speech recognition, multi-layer perceptron, acoustic modeling
22Jared Jardine, Daniel Zappala A hybrid architecture for massively multiplayer online games. Search on Bibsonomy NETGAMES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Cédric Fournet, Nataliya Guts, Francesco Zappa Nardelli A Formal Implementation of Value Commitment. Search on Bibsonomy ESOP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Chien-Hao Chien, Shun-Yun Hu, Jehn-Ruey Jiang Delaunay State Management for Large-Scale Networked Virtual Environments. Search on Bibsonomy ICPADS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Feng Li, Jianwei Shang, Daxing Li A Proactive Secure Multisecret Sharing Threshold Scheme. Search on Bibsonomy SNPD (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multisecret sharing, discrete logarithm problem, threshold scheme, proactive security
22Rui Sun, Ke Xu 0002, Zhao Li, Li Zhang A Strategyproof Protocol in Mesh-Based Overlay Streaming System. Search on Bibsonomy MMM (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Amy Beth Corman, Scott Douglas, Peter Schachte, Vanessa Teague A Secure Event Agreement (SEA) protocol for peer-to-peer games. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Tim Leinmüller, Christian Maihöfer, Elmar Schoch, Frank Kargl Improved security in geographic ad hoc routing through autonomous position verification. Search on Bibsonomy Vehicular Ad Hoc Networks The full citation details ... 2006 DBLP  DOI  BibTeX  RDF position verification, security, geographic routing, vehicular ad hoc networks (VANETs)
22Adam Wierzbicki Trust Enforcement in Peer-to-Peer Massive Multi-player Online Games. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Lifang Peng, Zhong Chen, Qi Li 0036 Model and method for evaluating creditability of C2C electronic trade. Search on Bibsonomy ICEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF C2C, trust, analytic hierarchy process, electronic trade, fuzzy synthetic evaluation
22Mohammad Shirali-Shahreza M-Quiz by SMS. Search on Bibsonomy ICALT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Darshan Purandare, Ratan K. Guha Preferential and Strata based P2P Model: Selfishness to Altruism and Fairness. Search on Bibsonomy ICPADS (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Bei Di Chen, Muthucumaru Maheswaran A Fair Synchronization Protocol with Cheat Proofing for Decentralized Online Multiplayer Games. Search on Bibsonomy NCA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Chi-Chien Pan, Kai-Hsiang Yang, Tzao-Lin Lee Secure Online Examination Architecture Based on Distributed Firewall. Search on Bibsonomy EEE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 755 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license