|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 14005 occurrences of 4807 keywords
|
|
|
Results
Found 35133 publication records. Showing 35133 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
63 | Junzuo Lai, Weidong Kou |
Self-Generated-Certificate Public Key Encryption Without Pairing. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Self-Generated-Certificate Public Key Cryptography, Self-Certified-Key, Certificateless Public Key Cryptography |
59 | Alan J. Tomkins, Lisa M. Pytlik Zillig, Mitchel N. Herian, Tarik Abdel-Monem, Joseph A. Hamm |
Public input for municipal policymaking: engagement methods and their impact on trust and confidence. |
DG.O |
2010 |
DBLP BibTeX RDF |
deliberative discussions, procedural fairness, public trust and confidence, online |
56 | Jae Hyung Koo, Bum Han Kim, Dong Hoon Lee 0001 |
Authenticated Public Key Distribution Scheme Without Trusted Third Party. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
Key Management and Authentication, Public-key Cryptography, Public Key Infrastructure (PKI) |
54 | Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow |
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
Identity-based signcryption, public ciphertext authenticity, network security, provable security, firewalls, elliptic curve cryptosystems, public key cryptosystems, forward security, semantical security, cryptographic primitives, public verifiability |
51 | Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner |
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
high order linearization equation, algebraic cryptanalysis, quadratic polynomial, multivariate public key cryptosystem |
50 | Eugenio Faldella, Marco Prandini |
A Novel Approach to On-Line Status Authentication of Public-Key Certificates. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
online status authentication, sensitive data exchange, security constraints, revoked certificates, certificate status handling scheme, one-way accumulator, Owa-based Revocation Scheme, Online Certificate Status Protocol, Internet, scalability, authentication, cryptography, protocols, data integrity, data integrity, computer networks, public key cryptography, public key infrastructure, message authentication, telecommunication security, certification authority, public-key certificates, computational load, public networks |
50 | Y. Pardhasaradhi, Safdar Ahmed |
Efficiency of electronic public service delivery in India: public-private partnership as a critical factor. |
ICEGOV |
2007 |
DBLP DOI BibTeX RDF |
Bhoomi, e-Seva, e-governance practices, public private collaboration, efficiency |
49 | Yi-Ru Liu, Wen-Guey Tzeng |
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
Broadcast encryption, collusion, polynomial interpolation |
49 | Jurjen Jansen, Sjoerd de Vries, Thea van der Geest, Rex Arendsen, Jan van Dijk |
The State of Client-Centered Public Service Delivery in the Netherlands. |
EGOV |
2009 |
DBLP DOI BibTeX RDF |
Client-centeredness, public service delivery, public organizations, segmentation, government, differentiation |
49 | Sonia Vilvovsky |
Differences between public and private IT outsourcing: common themes in the literature. |
DG.O |
2008 |
DBLP BibTeX RDF |
contracting out, public IT, public outsourcing, risk management, literature review |
48 | Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy |
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Blind identity-based encryption, public key encryption with keyword search, searchable encryption |
48 | Seong-Hun Paeng, Bae Eun Jung, Kil-Chan Ha |
A Lattice Based Public Key Cryptosystem Using Polynomial Representations. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
GGH cryptosystem, lattice based public key cryptosystem, polynomial representation |
48 | Frank Hartung, Bernd Girod |
Fast Public-Key Watermarking of Compressed Video. |
ICIP (1) |
1997 |
DBLP DOI BibTeX RDF |
fast public-key watermarking, pseudo-noise signal, watermark information, practical systems, public decoding, fast compressed-domain embedding technique, on-the-fly compressed-domain public-key watermarking, verification, images, decoding, compressed video, spread-spectrum watermarking |
47 | Chi-Sung Laih, K. Y. Chen |
Generating visible RSA public keys for PKI. |
Int. J. Inf. Sec. |
2004 |
DBLP DOI BibTeX RDF |
Public key generation, RSA, Certificate, Integer factorization |
46 | Takeshi Koshiba |
On Sufficient Randomness for Secure Public-Key Cryptosystems. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
46 | Lih-Chung Wang, Yuh-Hua Hu, Feipei Lai, Chun-yen Chou, Bo-Yin Yang |
Tractable Rational Map Signature. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
tractable rational maps, digital signature, finite field, public key, multivariate |
45 | Byoungcheon Lee, Kwangjo Kim, Joongsoo Ma |
Efficient Public Auction with One-Time Registration and Public Verifiability. |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
public auction, English auction, one-time registration, signature of knowledge, anonymous signature scheme, anonymity, hash chain, public verifiability |
44 | Efthimis N. Efthimiadis, Jens-Erik Mai |
Puget sound's MARS (media asset retrieval systems) digital library. |
JCDL |
2002 |
DBLP DOI BibTeX RDF |
access to broadcasts, corporation for public broadcasting (CPB), media asset management (MAM), metadata, video, audio |
44 | Vijay Varadharajan, Rajan Shankaran, Michael Hitchens |
Security services and public key infrastructure for ATM networks. |
LCN |
1997 |
DBLP DOI BibTeX RDF |
ATM protocol stack, security layer, data origin authentication, user plane, key establishment protocol, ATM signaling protocol, call setup procedures, ATM nodes, public key certificate retrieval, public key certificate distribution, B-ISDN Protocol Reference Model, integrity, public key cryptography, confidentiality, ATM networks, public key infrastructure, Certification Authority, security services |
43 | Adam L. Young, Moti Yung |
Towards Signature-Only Signature Schemes. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
Public Key Cryptosystems (PKCS), nested trapdoor, abuse freeness, (subliminal) leakage, design validation proofs, FIPS, digital signature, decryption, Public Key Infrastructure (PKI), NIST |
43 | Eva Eriksson, Thomas Riisgaard Hansen, Andreas Lykke-Olesen |
Reclaiming public space: designing for public interaction with private devices. |
TEI |
2007 |
DBLP DOI BibTeX RDF |
interaction design, mobile technology, public space |
43 | Satoshi Koga, Kouichi Sakurai |
A Distributed Online Certificate Status Protocol with a Single Public Key. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Sai Ho Kwok, Anthony C. T. Lai, Jason C. K. Yeung |
A study of online service and information exposure of public companies. |
KDD Workshop on CyberSecurity and Intelligence Informatics |
2009 |
DBLP DOI BibTeX RDF |
malicious hackers, public company, public server, web server, ports, cyber security |
43 | Nick A. Moldovyan |
New Public Key Cryptosystems Based on Difficulty of Factorization and Discrete Logarithm Problems. |
IF&GIS |
2007 |
DBLP DOI BibTeX RDF |
public encryption, Digital signature, public key cryptosystem, key agreement protocol |
43 | Shai Halevi, Hugo Krawczyk |
Public-Key Cryptography and Password Protocols. |
ACM Trans. Inf. Syst. Secur. |
1999 |
DBLP DOI BibTeX RDF |
hand-held certificates, public passwords, public-key protocols, passwords, key exchange, dictionary attacks |
43 | Peter Muhlberger |
Information technology and public deliberation: research on improving public input into government. |
DG.O |
2010 |
DBLP BibTeX RDF |
public input, collaboration, natural language processing, video, Wikipedia, government, collective intelligence, deliberation, rulemaking |
42 | Christian Wieschebrink |
An Attack on a Modified Niederreiter Encryption Scheme. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
McEliece encryption, Niederreiter encryption, generalized Reed-Solomon codes, Sidelnikov-Shestakov attack, error-correcting codes, Public key cryptography |
42 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Multi-Receiver Identity-Based Encryption, Formal Security Analysis, Public Key Broadcast Encryption |
42 | Christopher Wolf, Bart Preneel |
Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Public Key Schemes, Multivariate Quadratic Equations |
42 | Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel |
Cryptanalysis of the Tractable Rational Map Cryptosystem. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Tractable Rational Map Cryptosystem, XL, Gröbner Bases, Isomorphism of Polynomials, Public Key Cryptography, Polynomial Systems |
42 | Yuliang Zheng 0001 |
Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
High Order Residues, RSA, Signature, Public Key Encryption, Signcryption |
42 | Anton Joha, Marijn Janssen |
Comparing strategic intents for public-private partnerships, outsourcing and shared services. |
D.GO |
2009 |
DBLP BibTeX RDF |
decision support, outsourcing, public administration, service provisioning, sourcing, shared services, public-private partnerships |
42 | Jintai Ding, Christopher Wolf, Bo-Yin Yang |
l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Trapdoor, Encryption, Public Key, Signing |
42 | David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar |
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
public-key cryptography, factoring, standard model, semantic security |
41 | Meiyang Chen, Yijun Liu |
Research on the Best Time to Intervene into Network Public Opinion for Managers -Based on "Nankai Buick Affair"-. |
Complex (2) |
2009 |
DBLP DOI BibTeX RDF |
Network Public Opinion, The Best Time to Intervene, Skewness, Kurtosis |
41 | W. Andrew Schloss, Dale Stammen |
Ambient media in public spaces. |
SAME |
2008 |
DBLP DOI BibTeX RDF |
acoustic ecology, public art installations, sonification, auditory displays, computer music, information interfaces |
40 | Peter Muhlberger |
New research on public deliberation and information technology. |
D.GO |
2009 |
DBLP BibTeX RDF |
public input, collaboration, natural language processing, video, Wikipedia, government, collective intelligence, deliberation, rulemaking |
40 | Jean-Sébastien Coron |
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Akihiro Yamamura |
Public-Key Cryptosystems Using the Modular Group. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
39 | Koichiro Akiyama, Yasuhiro Goto, Hideyuki Miyake |
An Algebraic Surface Cryptosystem. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Section, Public-key Cryptosystem, Algebraic Surface |
39 | Jintai Ding, Jason E. Gower |
Inoculating Multivariate Schemes Against Differential Attacks. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Matsumoto-Imai, plus, cryptography, public key, perturbation, differential, multivariate |
39 | Isamu Teranishi, Kazue Sako |
k-Times Anonymous Authentication with a Constant Proving Cost. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
k-times anonymous authentication, efficiency, public verifiability |
39 | Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih |
Fast Multi-computations with Integer Similarity Strategy. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
ElGamal-like public key cryptosystems, binary signed-digit (BSD) representations, sparse forms, multi-computations, multiexponentiations, multi-scalar multiplications |
39 | Sattam S. Al-Riyami, Kenneth G. Paterson |
CBE from CL-PKE: A Generic Construction and Efficient Schemes. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Certificateless Public Key Encryption, CL-PKE, Certificate based Encryption, CBE, pairings |
39 | Christian Tobias |
Security Analysis of the MOR Cryptosystem. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
MOR Cryptosystem, Finite Non Abelian Groups, Cryptanalysis, Public Key Cryptosystem, Conjugacy Problem |
39 | Adrian von Bidder, Nathalie Weiler |
Key Exchange (KX) - A Next Generation Protocol to Synchronise PGP Keyservers. |
WETICE |
2003 |
DBLP DOI BibTeX RDF |
Secure Synchronisation Protocol, E-Mail Security, OpenPGP, Keyserver |
39 | Roger Segelken |
A Case History of a Computer Media Event - Introducing a Supercomputer Center. |
SIGDOC |
1985 |
DBLP DOI BibTeX RDF |
|
39 | Sonia Gantman Vilvovsky, Jane Fedorowicz |
IT outsourcing in interagency collaborations: lessons from public safety networks. |
DG.O |
2010 |
DBLP BibTeX RDF |
contracting out, interorganizational collaboration, public IT outsourcing, public safety networks |
39 | Yumiko Kinoshita |
Analysis of Macro-micro Simulation Models for Service-Oriented Public Platform: Coordination of Networked Services and Measurement of Public Values. |
I3E |
2009 |
DBLP DOI BibTeX RDF |
Macro-micro simulation models, linkage aggregate variables, service-oriented public infrastructure, public value, e-Gov |
38 | Paula E. Stephan |
Robert K. Merton's perspective on priority and the provision of the public good knowledge. |
Scientometrics |
2004 |
DBLP DOI BibTeX RDF |
|
37 | Euripidis N. Loukis |
An Ontology for G2G Collaboration in Public Policy Making, Implementation and Evaluation. |
Artif. Intell. Law |
2007 |
DBLP DOI BibTeX RDF |
G2G (Government-to-Government) e-Government, G2G (Government-to-Government) Collaboration, ontology, semantic web, public policy |
37 | Eun-Jun Yoon, Kee-Young Yoo |
Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation. |
ICIC (3) |
2007 |
DBLP DOI BibTeX RDF |
Public key substitution attack, Cryptanalysis, Non-repudiation, Key authentication |
37 | Wenliang Du, Ronghua Wang, Peng Ning |
An efficient scheme for authenticating public keys in sensor networks. |
MobiHoc |
2005 |
DBLP DOI BibTeX RDF |
deployment knowledge, wireless sensor networks, public key, merkle tree |
37 | Anne M. Turner, Elizabeth D. Liddy, Jana Bradley |
Breathing life into digital archives: use of natural language processing to revitalize the grey literature of public health. |
JCDL |
2002 |
DBLP DOI BibTeX RDF |
digital libraries, natural language processing, digital archives, public health |
36 | Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval |
Distributed Public-Key Cryptography from Weak Secrets. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Yevgeniy Dodis, Nelly Fazio |
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Wen-Guey Tzeng, Zhi-Jia Tzeng |
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
revocation, broadcast encryption, traitor tracing |
36 | Ivan Damgård, Mads Jurik |
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
36 | Eiichiro Fujisaki, Tatsuaki Okamoto |
How to Enhance the Security of Public-Key Encryption at Minimum Cost. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Yair Frankel, Moti Yung |
Distributed Public Key Cryptosystems. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
36 | Elizabeth Avery Gomez |
Connecting Communities of Need with Public Health: Can SMS Text-Messaging Improve Outreach Communication? |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
SMS text- messaging, communities of need., culture, mobile technology, emergency response, Public health, public health |
36 | Giovanni Di Crescenzo, Vishal Saraswat |
Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
Searchable Public-Key Encryption, Quadratic Residuosity, Jacobi Symbol, Public-Key Encryption |
36 | Javier López 0001, Antonio Mana, José A. Montenegro, Juan J. Ortega, José M. Troya |
Towards a Trustful and Flexible Environment for Secure Communications with Public Administrations. |
EGOV |
2002 |
DBLP DOI BibTeX RDF |
Electronic Forms, Public Key Infrastructure, Public Administrations, Secure Communications, Certification Authorities |
36 | Sébastien Kunz-Jacques, Gwenaëlle Martinet, Guillaume Poupard, Jacques Stern |
Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
discrete logarithm, proof of knowledge, Public key cryptanalysis |
36 | Jintai Ding, Dieter Schmidt |
Cryptanalysis of HFEv and Internal Perturbation of HFE. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Hidden field equation, internal perturbation, Public-key, multivariable, quadratic polynomials |
36 | Kristian Gjøsteen |
Symmetric Subgroup Membership Problems. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
subgroup membership problem, standard model, public key encryption, hybrid encryption |
36 | Louis Goubin |
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards |
36 | Ari Juels, Jorge Guajardo |
RSA Key Generation with Verifiable Randomness. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
verifiable randomness, public-key infrastructure, zero knowledge, non-repudiation, certificate authority, key generation |
36 | Marc Joye, Christophe Tymen |
Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
smart-cards, Public-key cryptography, elliptic curves, non-adjacent forms |
36 | Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 |
Encrypted Message Authentication by Firewalls. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption |
36 | Adam L. Young, Moti Yung |
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Auto-Recoverable Auto-Certifiable Cryptosystems, NIZK, software key escrow, escrow hierarchy, RSA, Public Key, Key Escrow, ElGamal |
36 | Helena Handschuh, Yiannis Tsiounis, Moti Yung |
Decision Oracles are Equivalent to Matching Oracles. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Diffie-Hellman variants, randomized reductions, uniform reductions, homomorphic encryption functions (ElGamal, Goldwasser-Micali, Okamoto-Uchiyama, Naccache-Stern), random self-reducibility, universal malleability, public-key encryption, decision problems, matching problems |
36 | Michael W. David, Kouichi Sakurai |
Security Issues for Contactless Smart Cards. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
Contactless-card, Standards, Smart-card, Public key, Efficient Implementation |
36 | Michael Gisler, Dieter Spahni |
eGovernment Experiences of the Swiss Federal Institute of Intellectual Property. |
DEXA Workshops |
2000 |
DBLP DOI BibTeX RDF |
eGovernment experiences, public management offices, Swiss public administration, private law, eGovernment transaction, relation based view, intellectual property, government data processing, eBusiness, New Public Management |
36 | Guillaume Barbu, Alberto Battistello, Guillaume Dabosville, Christophe Giraud 0001, Guénaël Renault, Soline Renner, Rina Zeitoun |
Combined Attack on CRT-RSA - Why Public Verification Must Not Be Public? |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
36 | Michael Kaschesky, Reinhard Riedl |
Top-level decisions through public deliberation on the internet: evidence from the evolution of Java governance. |
D.GO |
2009 |
DBLP BibTeX RDF |
public consultation, e-government, innovation, government, participation, public administration, politics, policy making |
35 | L. J. Lapro |
Design Issues for Individual Online Public Services. |
DEXA Workshops |
2000 |
DBLP DOI BibTeX RDF |
public orientated government service, individual online public service design issues, integration, fragmentation, public administration |
35 | Kouichi Sakurai, Tsuyoshi Takagi |
On the Security of a Modified Paillier Public-Key Primitive. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
One-wayness, Composite residuosity problem, Paillier cryptosystem, Factoring, Key distribution, Chosen ciphertext attack |
34 | Sungyoung Yoon, Jonghoon Seo, Joonyoung Yoon, Seungchul Shin, Tack-Don Han |
A Usability Evaluation of Public Icon Interface. |
HCI (1) |
2009 |
DBLP DOI BibTeX RDF |
Public icon, color-based image code, image code, barcode, pictogram |
34 | Matthias Finke, Anthony Tang 0001, Rock Leung, Michael Blackstock |
Lessons learned: game design for large public displays. |
DIMEA |
2008 |
DBLP DOI BibTeX RDF |
interactive large public displays, personal devices, shared entertainment, user study, gaming, short messages services (SMS), cell phones |
34 | Xiang Cao, Michael Massimi, Ravin Balakrishnan |
Flashlight jigsaw: an exploratory study of an ad-hoc multi-player game on public displays. |
CSCW |
2008 |
DBLP DOI BibTeX RDF |
flashlight display, games, public display, exploratory study |
34 | Wei-Chuen Yau, Swee-Huay Heng, Bok-Min Goi |
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
off-line keyword guessing attack, privacy, public key encryption, database security, Searching on encrypted data |
34 | Loo Geok Pee, Atreyi Kankanhalli |
Understanding the drivers, enablers, and performance of knowledge management in public organizations. |
ICEGOV |
2008 |
DBLP DOI BibTeX RDF |
KM drivers, KM enablers, public sector performance, knowledge management |
34 | Akio Shinohara, Junji Tomita, Tamio Kihara, Shinya Nakajima, Katsuhiko Ogawa |
A Huge Screen Interactive Public Media System: Mirai-Tube. |
HCI (2) |
2007 |
DBLP DOI BibTeX RDF |
interactive advertising, subtle interaction, pattern recognition, ambient displays, interactive public displays |
34 | Sarah Guth |
Wikis in education: : is public better? |
Int. Sym. Wikis |
2007 |
DBLP DOI BibTeX RDF |
blended course development, collective authoring, public wiki |
34 | María Isabel González Vasco, Dennis Hofheinz, Consuelo Martínez, Rainer Steinwandt |
On the Security of Two Public Key Cryptosystems Using Non-Abelian Groups. |
Des. Codes Cryptogr. |
2004 |
DBLP DOI BibTeX RDF |
logarithmic signatures, public key encryption, word problem, non-abelian groups |
34 | Marc Eaddy, Gábor Blaskó, Jason S. Babcock, Steven Feiner |
My Own Private Kiosk: Privacy-Preserving Public Displays. |
ISWC |
2004 |
DBLP DOI BibTeX RDF |
gaze steering, audio augmented reality, privacy, eye tracking, public display, gaze-contingent |
34 | Siguna Müller, Winfried B. Müller |
The Security of Public Key Cryptosystems Based on Integer Factorization. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
factorization problem, Dickson cryptosystem, LUC cryptosystem, Williams cryptosystem, ElGamal cryptosystem, secure keys, cryptanalysis, Public-key cryptography, RSA cryptosystem, discrete logarithm problem |
34 | Alexandra Boldyreva, Marc Fischlin, Adriana Palacio, Bogdan Warinschi |
A Closer Look at PKI: Security and Efficiency. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Eike Kiltz |
Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao 0001 |
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Designated Confirmer Signature, Digital Signature, Fair Exchange |
34 | Craig Gentry, Zulfikar Ramzan |
Identity-Based Aggregate Signatures. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Liqun Chen 0002, John Malone-Lee |
Improved Identity-Based Signcryption. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Yuji Watanabe, Hideki Imai |
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
33 | Alvaro Graves |
Integrating and publishing public safety data using semantic technologies. |
DG.O |
2010 |
DBLP BibTeX RDF |
visualization, data integration, semantic technologies, local government, public safety, crime |
33 | Batya Friedman, Alan Borning, Janet Davis, Brian T. Gill, Peter H. Kahn Jr., Travis Kriplean, Peyina Lin |
Laying the foundations for public participation and value advocacy: interaction design for a large scale urban simulation. |
DG.O |
2008 |
DBLP BibTeX RDF |
democratization, direct and indirect stakeholders, legitimation, urban development, value advocacy, simulation, participatory design, conflict, bias, value sensitive design, public participation, human values |
33 | Stephen Purpura, Claire Cardie, Jesse Simons |
Active learning for e-rulemaking: public comment categorization. |
DG.O |
2008 |
DBLP BibTeX RDF |
machine learning, active learning, text categorization, e-rulemaking, public comment |
33 | Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai |
Parallel Key-Insulated Public Key Encryption. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Philip D. MacKenzie |
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Adrian Antipa, Daniel R. L. Brown, Alfred Menezes, René Struik, Scott A. Vanstone |
Validation of Elliptic Curve Public Keys. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 35133 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|