|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3661 occurrences of 1810 keywords
|
|
|
Results
Found 7536 publication records. Showing 7535 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
90 | Qiong Liu 0002, Tingting Li |
Research on Benefits Distribution of Fourth Party Logistics Based on Nonprofit Organization. |
ICIRA (2) |
2008 |
DBLP DOI BibTeX RDF |
Fourth party logistics, Benefits distribution, Nash model, Third party logistics, Utility function |
80 | Luis von Ahn, Nicholas J. Hopper, John Langford 0001 |
Covert two-party computation. |
STOC |
2005 |
DBLP DOI BibTeX RDF |
covert computation, fair two-party computation, two-party computation, steganography |
66 | Weijia Wang, Lei Hu |
Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
password, key distribution, authenticated key exchange, multi-party protocol |
65 | Feng Bao 0001, Robert H. Deng, Khanh Quoc Nguyen, Vijay Varadharajan |
Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. |
DEXA Workshops |
1999 |
DBLP DOI BibTeX RDF |
provable security, fair exchange, multi-party protocol, verifiable encryption |
61 | Rafael Pass |
Bounded-concurrent secure multi-party computation with a dishonest majority. |
STOC |
2004 |
DBLP DOI BibTeX RDF |
constant-round protocols, simulation-sound zero-knowledge, secure multi-party computation, concurrent composition |
58 | Emanuele Viola, Avi Wigderson |
One-Way Multi-Party Communication Lower Bound for Pointer Jumping with Applications. |
FOCS |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Weiqiang Liang, Xiaoling Dai |
BulaPay: a web-service based third-party payment system for e-commerce in South Pacific Islands. |
iiWAS |
2009 |
DBLP DOI BibTeX RDF |
third-party payment system, web services, XML, e-commerce, SOAP |
55 | Huafei Zhu, Willy Susilo, Yi Mu 0001 |
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
setup-free, stand-alone, verifiably committed signatures, multi-party |
54 | Juan A. Garay, Markus Jakobsson, Philip D. MacKenzie |
Abuse-Free Optimistic Contract Signing. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
54 | Louis Salvail |
The Search for the Holy Grail in Quantum Cryptography. |
Lectures on Data Security |
1998 |
DBLP DOI BibTeX RDF |
|
54 | Hemanta K. Maji, Manoj Prabhakaran 0001, Mike Rosulek |
Complexity of Multi-Party Computation Functionalities. |
Secure Multi-Party Computation |
2013 |
DBLP DOI BibTeX RDF |
|
51 | Michel Renou, Virginie Party, Angéla Rouyar, Sylvia Anton |
Olfactory signal coding in an odor background. |
Biosyst. |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy, Hao Chen 0003 |
Multi-party off-the-record messaging. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
privacy, instant messaging, deniability, multi-party |
50 | Michel Abdalla, Pierre-Alain Fouque, David Pointcheval |
Password-Based Authenticated Key Exchange in the Three-Party Setting. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Password, key distribution, authenticated key exchange, multi-party protocols |
50 | Jose Antonio Onieva, Jianying Zhou 0001, Javier López 0001 |
Attacking an Asynchronous Multi-party Contract Signing Protocol. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
multi-party contract signing, security protocol analysis, Secure electronic commerce |
50 | Jaideep Vaidya, Chris Clifton |
Leveraging the "Multi" in secure multi-party computation. |
WPES |
2003 |
DBLP DOI BibTeX RDF |
secure distributed computation, privacy, secure multi-party computation |
49 | Kwanghoon Pio Kim |
A Process-Driven Inter-organizational Choreography Modeling System. |
OTM Workshops |
2005 |
DBLP DOI BibTeX RDF |
Inter-organizational e-business service integration, B2B choreography and orchestration, Dual-party collaboration model, Process-driven multi-party collaboration model, Inter-organizational choreography modeling system |
47 | Jin Wook Byun, Dong Hoon Lee 0001 |
N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Vipul Goyal, Payman Mohassel, Adam D. Smith |
Efficient Two Party and Multi Party Computation Against Covert Adversaries. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Anand Bhalgat, Tanmoy Chakraborty 0001, Sanjeev Khanna |
Approximating pure nash equilibrium in cut, party affiliation, and satisfiability games. |
EC |
2010 |
DBLP DOI BibTeX RDF |
cut games, party affiliation games, potential games, pure nash equilibrium, approximation algorithms |
45 | Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung |
Two-Party Computing with Encrypted Data. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Computing with Encrypted Data, CryptoComputing, oblivious transfer, Secure Two-Party Computation |
45 | Ran Canetti, Eyal Kushilevitz, Yehuda Lindell |
On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
Universal composability, Secure two-party computation, Impossibility results |
45 | Payman Mohassel, Matthew K. Franklin |
Efficiency Tradeoffs for Malicious Two-Party Computation. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Yao’s garbled circuit, malicious adversary, secure two-party computation, secure function evaluation |
45 | Shafi Goldwasser, Yehuda Lindell |
Secure Multi-Party Computation without Agreement. |
J. Cryptol. |
2005 |
DBLP DOI BibTeX RDF |
Broadcast, Secure multi-party computation, Protocol composition |
45 | Philip D. MacKenzie, Alina Oprea, Michael K. Reiter |
Automatic generation of two-party computations. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
automatic generation of protocols, threshold cryptography, secure two-party computation |
44 | Manoj Prabhakaran 0001, Amit Sahai (eds.) |
Secure Multi-Party Computation |
Secure Multi-Party Computation |
2013 |
DBLP BibTeX RDF |
|
44 | Abhishek Jain 0002, Amit Sahai |
The IPS Compiler. |
Secure Multi-Party Computation |
2013 |
DBLP DOI BibTeX RDF |
|
44 | Oded Goldreich 0001 |
A Short Tutorial of Zero-Knowledge. |
Secure Multi-Party Computation |
2013 |
DBLP DOI BibTeX RDF |
|
44 | Ran Canetti |
Security and Composition of Cryptographic Protocols: A Tutorial. |
Secure Multi-Party Computation |
2013 |
DBLP DOI BibTeX RDF |
|
44 | Yuval Ishai |
Randomization Techniques for Secure Computation. |
Secure Multi-Party Computation |
2013 |
DBLP DOI BibTeX RDF |
|
44 | Gilad Asharov, Yehuda Lindell |
The BGW Protocol for Perfectly-Secure Multiparty Computation. |
Secure Multi-Party Computation |
2013 |
DBLP DOI BibTeX RDF |
|
44 | Oded Goldreich 0001 |
General Cryptographic Protocols: The Very Basics. |
Secure Multi-Party Computation |
2013 |
DBLP DOI BibTeX RDF |
|
44 | Ueli Maurer, Vassilis Zikas |
Information-Theoretic Secure Multiparty Computation. |
Secure Multi-Party Computation |
2013 |
DBLP DOI BibTeX RDF |
|
43 | Feng Bao 0001, Robert H. Deng, Wenbo Mao |
Efficient and Practical Fair Exchange Protocols with Off-Line TTP. |
S&P |
1998 |
DBLP DOI BibTeX RDF |
|
42 | Yehuda Lindell, Benny Pinkas |
A Proof of Security of Yao's Protocol for Two-Party Computation. |
J. Cryptol. |
2009 |
DBLP DOI BibTeX RDF |
Semi-honest adversaries, Yao’s two-party protocol, Secure two-party computation, Proofs of security |
42 | Min Huang 0001, Yan Cui, Xingwei Wang 0001, Hongyu Dong |
A genetic algorithm for solving fourth-party logistics routing optimizing problem with fuzzy duration time. |
GEC Summit |
2009 |
DBLP DOI BibTeX RDF |
fourth party logistics, fourth party logistics routing problem, fuzzy duration time, genetic algorithm |
42 | Hugue Blier, Alain Tapp |
A Single Initialization Server for Multi-party Cryptography. |
ICITS |
2008 |
DBLP DOI BibTeX RDF |
two-party computation, initialization server, cryptography, zero-knowledge, multi-party computation |
42 | Andrew Y. Lindell |
Legally-Enforceable Fairness in Secure Two-Party Computation. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
|
42 | S. Dov Gordon, Carmit Hazay, Jonathan Katz, Yehuda Lindell |
Complete fairness in secure two-party computation. |
STOC |
2008 |
DBLP DOI BibTeX RDF |
cryptography, fairness, secure computation |
42 | Steve Kremer, Olivier Markowitch |
Fair multi-party non-repudiation protocols. |
Int. J. Inf. Sec. |
2003 |
DBLP DOI BibTeX RDF |
Group communications, Non-repudiation, Fair exchange |
42 | Nicolás González-Deleito, Olivier Markowitch |
Exclusion-Freeness in Multi-party Exchange Protocols. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
42 | Yu-Seung Ma, Seung-Uk Oh, Doo-Hwan Bae, Yong Rae Kwon |
Framework for Third Party Testing of Component Software. |
APSEC |
2001 |
DBLP DOI BibTeX RDF |
metadata, Framework, Certification, Component-based software engineering, EJB, Component testing |
42 | Mike Just, Serge Vaudenay |
Authenticated Multi-Party Key Agreement. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
confirmation, authentication, key agreement, forward secrecy |
39 | Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yung |
Secure Multi-party Computation Minimizing Online Rounds. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Computing with Encrypted Data, Universal Composition, Cryptographic Protocols, Public key Cryptography, Multi-Party Computation |
39 | Louis Salvail, Christian Schaffner, Miroslava Sotáková |
On the Power of Two-Party Quantum Cryptography. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
two-party primitives, quantum protocols, oblivious transfer, quantum information theory |
39 | Rohit Pathak, Satyadhar Joshi |
Secure Multi-party Computation Using Virtual Parties for Computation on Encrypted Data. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Secure Multi-party Computation (SMC), Privacy, Protocol, Information Security |
39 | Assaf Ben-David, Noam Nisan, Benny Pinkas |
FairplayMP: a system for secure multi-party computation. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
cryptography, secure multi-party computation |
39 | Raphael C.-W. Phan, Bok-Min Goi |
Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
n-party, cryptanalysis, dictionary attack, collusion, Password-authenticated key exchange, key privacy |
39 | Dushyant Bansal, Paul A. S. Ward |
Third-Party Flow Control. |
CNSR |
2005 |
DBLP DOI BibTeX RDF |
third-party, peer-to-peer, congestion control, TCP, flow control |
39 | Matthias Fitzi, Stefan Wolf 0001, Jürg Wullschleger |
Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
pseudo-signatures, broadcast, information theory, Unconditional security, multi-party computation |
39 | Matthias Fitzi, Martin Hirt, Ueli M. Maurer |
Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract). |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
Secure multi-party computation, threshold cryptography, unconditional security, verifiable secret sharing |
38 | Zhongfei (Mark) Zhang, John J. Salerno, Philip S. Yu |
Applying data mining in investigating money laundering crimes. |
KDD |
2003 |
DBLP DOI BibTeX RDF |
Link Discovery based on Correlation Analysis (LDCA), MLC Group Models, Money Laundering Crimes (MLCs), bi-party data, community generation, timeline analysis, uni-party data, clustering, histogram, CORAL |
38 | Matthew Addis, Paul Allen, Mike Surridge |
Negotiating for Software Services. |
DEXA Workshops |
2000 |
DBLP DOI BibTeX RDF |
engineering computing, routine use, engineering meta-applications, hardware on-demand business model, agent based electronic marketplace, secure Internet based marketplace, negotiation services, software application users, third party hardware/software service providers, World Wide Web, software services, trusted third party, security technologies |
38 | Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger |
An Efficient Protocol for Certified Electronic Mail. |
ISW |
2000 |
DBLP DOI BibTeX RDF |
|
37 | Dawn Desplanque |
Managing a Third-Party Alliance Product Documentation Development Project. |
SIGDOC |
1998 |
DBLP DOI BibTeX RDF |
OEM, fourth-party, third-party, customized, alliance |
37 | Eyal Kushilevitz, Silvio Micali, Rafail Ostrovsky |
Reducibility and Completeness in Multi-Party Private Computations |
FOCS |
1994 |
DBLP DOI BibTeX RDF |
Oblivious Transfer protocol, multi-party private computations, n-privacy, Boolean functions, completeness, reducibility, black-box, multi-party protocols |
37 | Hillol Kargupta, Kamalika Das, Kun Liu 0001 |
Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework. |
PKDD |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Jianying Zhou 0001, Jose Antonio Onieva, Javier López 0001 |
A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Li Na Ren, Yun Zhang Pei, Yibo Zhang, Chun Ying |
Charging Validation for Third Party Value-Added Applications in Service Delivery Platform. |
NOMS |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Stanislaw Jarecki, Jihye Kim, Gene Tsudik |
Authentication for Paranoids: Multi-party Secret Handshakes. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Yehuda Lindell |
Bounded-concurrent secure two-party computation without setup assumptions. |
STOC |
2003 |
DBLP DOI BibTeX RDF |
secure computation, protocol composition |
37 | Amir Herzberg, Yosi Mass |
Relying Party Credentials Framework. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
|
37 | Olivier Markowitch, Steve Kremer |
A Multi-party Optimistic Non-repudiation Protocol. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
|
35 | Henry N. Adorna |
On the Separation between k-Party and (k-1)-Party Nondeterministic Message Complexities. |
Developments in Language Theory |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Jens Groth, Rafail Ostrovsky |
Cryptography in the Multi-string Model. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
Common random string model, multi-string model, universally composable commitment, multi-party computation, non-interactive zero-knowledge |
35 | Michel Abdalla, David Pointcheval |
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Password-based authentication, multi-party protocols, Diffie-Hellman assumptions |
35 | Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
CDH assumption, DDH assumption, double discrete logarithm, one-way two-party authenticated key agreement, privacy, designated verifier signature |
35 | Dov Monderer, Moshe Tennenholtz |
k-Implementation. |
EC |
2003 |
DBLP DOI BibTeX RDF |
implementation by an interested party, implementation cost, implementation theory |
34 | Guan Wang, Tongbo Luo, Michael T. Goodrich, Wenliang Du, Zutao Zhu |
Bureaucratic protocols for secure two-party sorting, selection, and permuting. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
bureaucratic protocols, oblivious algorithms, sorting, secure two-party computation |
34 | Rafael Pass, Hoeteck Wee |
Black-Box Constructions of Two-Party Protocols from One-Way Functions. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
black-box constructions, zero-knowledge arguments, trapdoor commitments, parallel coin-tossing, non-malleable commitments, secure two-party computation |
34 | Feng Zhang 0012, Gansen Zhao, Tingyan Xing |
Privacy-Preserving Distributed k-Nearest Neighbor Mining on Horizontally Partitioned Multi-Party Data. |
ADMA |
2009 |
DBLP DOI BibTeX RDF |
Privacy-reserving Data Mining, k -NN Mining, Probabilistic Cryptosystem, Communicative Cryptosystem, Secure Multi-party Computation |
34 | Yong Xu |
The Mechanism Design of Third Party Assure-Payment Platform. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
Assure-Payment, Third Party Platform, btob |
34 | Shuhua Wu, Yuefei Zhu |
Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting. |
NPC |
2008 |
DBLP DOI BibTeX RDF |
three-party, password, forward-secure |
34 | Weijia Wang, Lei Hu, Yong Li 0002 |
Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Password, key distribution, authenticated key exchange, multi-party protocols |
34 | Yosuke Matsusaka, Mika Enomoto, Yasuharu Den |
Simultaneous prediction of dialog acts and address types in three-party conversations. |
ICMI |
2007 |
DBLP DOI BibTeX RDF |
dialog act, recognition, gaze, prosody, multi-party interaction |
34 | Hanping Hou, Shoubo Xu |
Emergence and Simulation of Bionic Swarm Intelligence Type X Party Material Flow. |
CONFENIS (2) |
2007 |
DBLP DOI BibTeX RDF |
Material flow, Swarm intelligence (SI), X party material flow (XPMF), Simulation, Supply chain, Emergence, Logistics |
34 | Eun-Jun Yoon, Kee-Young Yoo |
Token-Based Authenticated Key Establishment Protocols for Three-Party Communication. |
EUC Workshops |
2007 |
DBLP DOI BibTeX RDF |
Three-party, Authentication, Cryptography, Password, Key agreement, Token |
34 | Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang |
On Secure Multi-party Computation in Black-Box Groups. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
Planar Graph, Graph Colouring, Black-Box, Multi-Party Computation, Non-Abelian Group |
34 | Shundong Li, Yiqi Dai |
Secure Two-Party Computational Geometry. |
J. Comput. Sci. Technol. |
2005 |
DBLP DOI BibTeX RDF |
millionaire problem, secure computation geometry, protocol, oblivious transfer, secure multi-party computation |
34 | Matthias Fitzi, Juan A. Garay, Ueli M. Maurer, Rafail Ostrovsky |
Minimal Complete Primitives for Secure Multi-Party Computation. |
J. Cryptol. |
2005 |
DBLP DOI BibTeX RDF |
Complete functions, Oblivious cast, Unconditional security, Multi-party computation, Secure function evaluation |
34 | Barbara Carminati, Elena Ferrari, Elisa Bertino |
Securing XML data in third-party distribution systems. |
CIKM |
2005 |
DBLP DOI BibTeX RDF |
third-party architecture, XML, data outsourcing |
34 | Sergei Kojarski, David H. Lorenz |
Pluggable AOP: designing aspect mechanisms for third-party composition. |
OOPSLA |
2005 |
DBLP DOI BibTeX RDF |
AOP semantics, AspectWerkz, aspect extension, aspect mechanism, aspectual effect, domain-specific aspect language, third-party composition, collaboration, AOP, reuse, software components, AOSD, AspectJ, mixin, CBSE, COOL |
34 | Matthias Fitzi, Nicolas Gisin, Ueli M. Maurer, Oliver von Rotz |
Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
Byzantine agreement, unconditional security, multi-party computation |
34 | Ueli M. Maurer |
Secure Multi-party Computation Made Simple. |
SCN |
2002 |
DBLP DOI BibTeX RDF |
adversary structures, secret-sharing, Secure multi-party computation, verifiable secret-sharing |
34 | Claude Crépeau, Daniel Gottesman, Adam D. Smith |
Secure multi-party quantum computation. |
STOC |
2002 |
DBLP DOI BibTeX RDF |
distributed computing, quantum cryptography, secure function evaluation, multi-party protocols |
34 | Chih-Hung Wang, Tzonelih Hwang |
Threshold and Generalized DSS Signatures without a Trusted Party. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
(t+1,n) threshold signature scheme, generalized DSS signatures, trusted party, secret key sharing, valid group signature, Digital Signature Standard, signers, conspiracy, signing procedure, cryptography |
33 | Christoph Lucas, Dominik Raub, Ueli M. Maurer |
Hybrid-secure MPC: trading information-theoretic robustness for computational privacy. |
PODC |
2010 |
DBLP DOI BibTeX RDF |
hybrid security, party emulation, computational security, information-theoretic security, universal composability, multi-party computation |
33 | Esma Aïmeur, Gilles Brassard, José M. Fernandez 0001, Flavien Serge Mani Onana |
Alambic : a privacy-preserving recommender system for electronic commerce. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Semi-trusted third party, Recommender system, Privacy protection, Web personalization, Secure two-party computation |
32 | Detlef Kähler, Ralf Küsters, Thomas Wilke |
A Dolev-Yao-Based Definition of Abuse-Free Protocols. |
ICALP (2) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Tzafrir Cohen, Joe Kilian, Erez Petrank |
Responsive Round Complexity and Concurrent Zero-Knowledge. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
cryptographic protocols, Zero-knowledge, concurrent zero-knowledge |
32 | Jianying Zhou 0001, Dieter Gollmann |
An Efficient Non-repudiation Protocol . |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
network security, security protocols, non-repudiation |
32 | Ming-Deh A. Huang, Shang-Hua Teng |
A Universal Problem in Secure and Verifiable Distributed Computation. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
31 | I-Cheng Wang, Chih-Hao Shen, Kung Chen, Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang 0004 |
An Empirical Study on Privacy and Secure Multi-party Computation Using Exponentiation. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | G. Sathya Narayanan, T. Aishwarya, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, C. Pandu Rangan |
Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
Privacy preserving Set operations, Multiparty Computation |
31 | Michele Mancioppi, Manuel Carro, Willem-Jan van den Heuvel, Mike P. Papazoglou |
Sound Multi-party Business Protocols for Service Networks. |
ICSOC |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Andreas Jakoby, Maciej Liskiewicz, Aleksander Madry |
Susceptible Two-Party Quantum Computations. |
ICITS |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Xiangdong Li, Qingxian Wang, Li Chen |
Analysis on Cyclic Multi-party Fair Exchange Protocols. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Troy Lee, Adi Shraibman |
Disjointness Is Hard in the Multi-party Number-on-the-Forehead Model. |
CCC |
2008 |
DBLP DOI BibTeX RDF |
multiparty communication complexity, disjointness, lower bounds |
31 | Julien Saunier, Flavien Balbo |
An Environment to Support Multi-Party Communications in Multi-Agent Systems. |
CEEMAS |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Yong Jin, Wei Song, Jingyi Zhang |
On Developing China's Third Party Payment. |
I3E (1) |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 7535 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|