The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for public with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1954-1970 (17) 1971-1974 (25) 1975-1976 (38) 1977-1978 (27) 1979 (19) 1980 (17) 1981 (16) 1982 (27) 1983 (23) 1984 (39) 1985 (49) 1986 (40) 1987 (52) 1988 (47) 1989 (49) 1990 (66) 1991 (47) 1992 (71) 1993 (93) 1994 (107) 1995 (119) 1996 (209) 1997 (193) 1998 (246) 1999 (311) 2000 (450) 2001 (565) 2002 (856) 2003 (873) 2004 (1143) 2005 (1407) 2006 (1509) 2007 (1728) 2008 (1751) 2009 (1581) 2010 (1001) 2011 (892) 2012 (1008) 2013 (1271) 2014 (1246) 2015 (1303) 2016 (1371) 2017 (1446) 2018 (1530) 2019 (1750) 2020 (1961) 2021 (2269) 2022 (1845) 2023 (1940) 2024 (490)
Publication types (Num. hits)
article(13430) book(32) data(18) incollection(344) inproceedings(20929) phdthesis(294) proceedings(86)
Venues (Conferences, Journals, ...)
CoRR(1321) Public Libr. Q.(720) IACR Cryptol. ePrint Arch.(623) Public Key Cryptography(558) DG.O(416) HICSS(379) Public Transp.(332) ICEGOV(293) MIE(293) EGOV(279) IEEE Access(256) Gov. Inf. Q.(250) CRYPTO(229) EUROCRYPT(216) Public Key Cryptography (1)(199) EuroPKI(196) More (+10 of total 5029)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 14005 occurrences of 4807 keywords

Results
Found 35133 publication records. Showing 35133 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
63Junzuo Lai, Weidong Kou Self-Generated-Certificate Public Key Encryption Without Pairing. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Self-Generated-Certificate Public Key Cryptography, Self-Certified-Key, Certificateless Public Key Cryptography
59Alan J. Tomkins, Lisa M. Pytlik Zillig, Mitchel N. Herian, Tarik Abdel-Monem, Joseph A. Hamm Public input for municipal policymaking: engagement methods and their impact on trust and confidence. Search on Bibsonomy DG.O The full citation details ... 2010 DBLP  BibTeX  RDF deliberative discussions, procedural fairness, public trust and confidence, online
56Jae Hyung Koo, Bum Han Kim, Dong Hoon Lee 0001 Authenticated Public Key Distribution Scheme Without Trusted Third Party. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Key Management and Authentication, Public-key Cryptography, Public Key Infrastructure (PKI)
54Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Identity-based signcryption, public ciphertext authenticity, network security, provable security, firewalls, elliptic curve cryptosystems, public key cryptosystems, forward security, semantical security, cryptographic primitives, public verifiability
51Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF high order linearization equation, algebraic cryptanalysis, quadratic polynomial, multivariate public key cryptosystem
50Eugenio Faldella, Marco Prandini A Novel Approach to On-Line Status Authentication of Public-Key Certificates. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF online status authentication, sensitive data exchange, security constraints, revoked certificates, certificate status handling scheme, one-way accumulator, Owa-based Revocation Scheme, Online Certificate Status Protocol, Internet, scalability, authentication, cryptography, protocols, data integrity, data integrity, computer networks, public key cryptography, public key infrastructure, message authentication, telecommunication security, certification authority, public-key certificates, computational load, public networks
50Y. Pardhasaradhi, Safdar Ahmed Efficiency of electronic public service delivery in India: public-private partnership as a critical factor. Search on Bibsonomy ICEGOV The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Bhoomi, e-Seva, e-governance practices, public private collaboration, efficiency
49Yi-Ru Liu, Wen-Guey Tzeng Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Broadcast encryption, collusion, polynomial interpolation
49Jurjen Jansen, Sjoerd de Vries, Thea van der Geest, Rex Arendsen, Jan van Dijk The State of Client-Centered Public Service Delivery in the Netherlands. Search on Bibsonomy EGOV The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Client-centeredness, public service delivery, public organizations, segmentation, government, differentiation
49Sonia Vilvovsky Differences between public and private IT outsourcing: common themes in the literature. Search on Bibsonomy DG.O The full citation details ... 2008 DBLP  BibTeX  RDF contracting out, public IT, public outsourcing, risk management, literature review
48Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blind identity-based encryption, public key encryption with keyword search, searchable encryption
48Seong-Hun Paeng, Bae Eun Jung, Kil-Chan Ha A Lattice Based Public Key Cryptosystem Using Polynomial Representations. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF GGH cryptosystem, lattice based public key cryptosystem, polynomial representation
48Frank Hartung, Bernd Girod Fast Public-Key Watermarking of Compressed Video. Search on Bibsonomy ICIP (1) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF fast public-key watermarking, pseudo-noise signal, watermark information, practical systems, public decoding, fast compressed-domain embedding technique, on-the-fly compressed-domain public-key watermarking, verification, images, decoding, compressed video, spread-spectrum watermarking
47Chi-Sung Laih, K. Y. Chen Generating visible RSA public keys for PKI. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Public key generation, RSA, Certificate, Integer factorization
46Takeshi Koshiba On Sufficient Randomness for Secure Public-Key Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
46Lih-Chung Wang, Yuh-Hua Hu, Feipei Lai, Chun-yen Chou, Bo-Yin Yang Tractable Rational Map Signature. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF tractable rational maps, digital signature, finite field, public key, multivariate
45Byoungcheon Lee, Kwangjo Kim, Joongsoo Ma Efficient Public Auction with One-Time Registration and Public Verifiability. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF public auction, English auction, one-time registration, signature of knowledge, anonymous signature scheme, anonymity, hash chain, public verifiability
44Efthimis N. Efthimiadis, Jens-Erik Mai Puget sound's MARS (media asset retrieval systems) digital library. Search on Bibsonomy JCDL The full citation details ... 2002 DBLP  DOI  BibTeX  RDF access to broadcasts, corporation for public broadcasting (CPB), media asset management (MAM), metadata, video, audio
44Vijay Varadharajan, Rajan Shankaran, Michael Hitchens Security services and public key infrastructure for ATM networks. Search on Bibsonomy LCN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF ATM protocol stack, security layer, data origin authentication, user plane, key establishment protocol, ATM signaling protocol, call setup procedures, ATM nodes, public key certificate retrieval, public key certificate distribution, B-ISDN Protocol Reference Model, integrity, public key cryptography, confidentiality, ATM networks, public key infrastructure, Certification Authority, security services
43Adam L. Young, Moti Yung Towards Signature-Only Signature Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Public Key Cryptosystems (PKCS), nested trapdoor, abuse freeness, (subliminal) leakage, design validation proofs, FIPS, digital signature, decryption, Public Key Infrastructure (PKI), NIST
43Eva Eriksson, Thomas Riisgaard Hansen, Andreas Lykke-Olesen Reclaiming public space: designing for public interaction with private devices. Search on Bibsonomy TEI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF interaction design, mobile technology, public space
43Satoshi Koga, Kouichi Sakurai A Distributed Online Certificate Status Protocol with a Single Public Key. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
43Sai Ho Kwok, Anthony C. T. Lai, Jason C. K. Yeung A study of online service and information exposure of public companies. Search on Bibsonomy KDD Workshop on CyberSecurity and Intelligence Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malicious hackers, public company, public server, web server, ports, cyber security
43Nick A. Moldovyan New Public Key Cryptosystems Based on Difficulty of Factorization and Discrete Logarithm Problems. Search on Bibsonomy IF&GIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF public encryption, Digital signature, public key cryptosystem, key agreement protocol
43Shai Halevi, Hugo Krawczyk Public-Key Cryptography and Password Protocols. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF hand-held certificates, public passwords, public-key protocols, passwords, key exchange, dictionary attacks
43Peter Muhlberger Information technology and public deliberation: research on improving public input into government. Search on Bibsonomy DG.O The full citation details ... 2010 DBLP  BibTeX  RDF public input, collaboration, natural language processing, video, Wikipedia, government, collective intelligence, deliberation, rulemaking
42Christian Wieschebrink An Attack on a Modified Niederreiter Encryption Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF McEliece encryption, Niederreiter encryption, generalized Reed-Solomon codes, Sidelnikov-Shestakov attack, error-correcting codes, Public key cryptography
42Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Multi-Receiver Identity-Based Encryption, Formal Security Analysis, Public Key Broadcast Encryption
42Christopher Wolf, Bart Preneel Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Public Key Schemes, Multivariate Quadratic Equations
42Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel Cryptanalysis of the Tractable Rational Map Cryptosystem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Tractable Rational Map Cryptosystem, XL, Gröbner Bases, Isomorphism of Polynomials, Public Key Cryptography, Polynomial Systems
42Yuliang Zheng 0001 Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF High Order Residues, RSA, Signature, Public Key Encryption, Signcryption
42Anton Joha, Marijn Janssen Comparing strategic intents for public-private partnerships, outsourcing and shared services. Search on Bibsonomy D.GO The full citation details ... 2009 DBLP  BibTeX  RDF decision support, outsourcing, public administration, service provisioning, sourcing, shared services, public-private partnerships
42Jintai Ding, Christopher Wolf, Bo-Yin Yang l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Trapdoor, Encryption, Public Key, Signing
42David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF public-key cryptography, factoring, standard model, semantic security
41Meiyang Chen, Yijun Liu Research on the Best Time to Intervene into Network Public Opinion for Managers -Based on "Nankai Buick Affair"-. Search on Bibsonomy Complex (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Network Public Opinion, The Best Time to Intervene, Skewness, Kurtosis
41W. Andrew Schloss, Dale Stammen Ambient media in public spaces. Search on Bibsonomy SAME The full citation details ... 2008 DBLP  DOI  BibTeX  RDF acoustic ecology, public art installations, sonification, auditory displays, computer music, information interfaces
40Peter Muhlberger New research on public deliberation and information technology. Search on Bibsonomy D.GO The full citation details ... 2009 DBLP  BibTeX  RDF public input, collaboration, natural language processing, video, Wikipedia, government, collective intelligence, deliberation, rulemaking
40Jean-Sébastien Coron Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
40Akihiro Yamamura Public-Key Cryptosystems Using the Modular Group. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
39Koichiro Akiyama, Yasuhiro Goto, Hideyuki Miyake An Algebraic Surface Cryptosystem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Section, Public-key Cryptosystem, Algebraic Surface
39Jintai Ding, Jason E. Gower Inoculating Multivariate Schemes Against Differential Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Matsumoto-Imai, plus, cryptography, public key, perturbation, differential, multivariate
39Isamu Teranishi, Kazue Sako k-Times Anonymous Authentication with a Constant Proving Cost. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF k-times anonymous authentication, efficiency, public verifiability
39Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih Fast Multi-computations with Integer Similarity Strategy. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ElGamal-like public key cryptosystems, binary signed-digit (BSD) representations, sparse forms, multi-computations, multiexponentiations, multi-scalar multiplications
39Sattam S. Al-Riyami, Kenneth G. Paterson CBE from CL-PKE: A Generic Construction and Efficient Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Certificateless Public Key Encryption, CL-PKE, Certificate based Encryption, CBE, pairings
39Christian Tobias Security Analysis of the MOR Cryptosystem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF MOR Cryptosystem, Finite Non Abelian Groups, Cryptanalysis, Public Key Cryptosystem, Conjugacy Problem
39Adrian von Bidder, Nathalie Weiler Key Exchange (KX) - A Next Generation Protocol to Synchronise PGP Keyservers. Search on Bibsonomy WETICE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Secure Synchronisation Protocol, E-Mail Security, OpenPGP, Keyserver
39Roger Segelken A Case History of a Computer Media Event - Introducing a Supercomputer Center. Search on Bibsonomy SIGDOC The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
39Sonia Gantman Vilvovsky, Jane Fedorowicz IT outsourcing in interagency collaborations: lessons from public safety networks. Search on Bibsonomy DG.O The full citation details ... 2010 DBLP  BibTeX  RDF contracting out, interorganizational collaboration, public IT outsourcing, public safety networks
39Yumiko Kinoshita Analysis of Macro-micro Simulation Models for Service-Oriented Public Platform: Coordination of Networked Services and Measurement of Public Values. Search on Bibsonomy I3E The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Macro-micro simulation models, linkage aggregate variables, service-oriented public infrastructure, public value, e-Gov
38Paula E. Stephan Robert K. Merton's perspective on priority and the provision of the public good knowledge. Search on Bibsonomy Scientometrics The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
37Euripidis N. Loukis An Ontology for G2G Collaboration in Public Policy Making, Implementation and Evaluation. Search on Bibsonomy Artif. Intell. Law The full citation details ... 2007 DBLP  DOI  BibTeX  RDF G2G (Government-to-Government) e-Government, G2G (Government-to-Government) Collaboration, ontology, semantic web, public policy
37Eun-Jun Yoon, Kee-Young Yoo Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation. Search on Bibsonomy ICIC (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Public key substitution attack, Cryptanalysis, Non-repudiation, Key authentication
37Wenliang Du, Ronghua Wang, Peng Ning An efficient scheme for authenticating public keys in sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2005 DBLP  DOI  BibTeX  RDF deployment knowledge, wireless sensor networks, public key, merkle tree
37Anne M. Turner, Elizabeth D. Liddy, Jana Bradley Breathing life into digital archives: use of natural language processing to revitalize the grey literature of public health. Search on Bibsonomy JCDL The full citation details ... 2002 DBLP  DOI  BibTeX  RDF digital libraries, natural language processing, digital archives, public health
36Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval Distributed Public-Key Cryptography from Weak Secrets. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Yevgeniy Dodis, Nelly Fazio Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
36Wen-Guey Tzeng, Zhi-Jia Tzeng A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF revocation, broadcast encryption, traitor tracing
36Ivan Damgård, Mads Jurik A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
36Eiichiro Fujisaki, Tatsuaki Okamoto How to Enhance the Security of Public-Key Encryption at Minimum Cost. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
36Yair Frankel, Moti Yung Distributed Public Key Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
36Elizabeth Avery Gomez Connecting Communities of Need with Public Health: Can SMS Text-Messaging Improve Outreach Communication? Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SMS text- messaging, communities of need., culture, mobile technology, emergency response, Public health, public health
36Giovanni Di Crescenzo, Vishal Saraswat Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Searchable Public-Key Encryption, Quadratic Residuosity, Jacobi Symbol, Public-Key Encryption
36Javier López 0001, Antonio Mana, José A. Montenegro, Juan J. Ortega, José M. Troya Towards a Trustful and Flexible Environment for Secure Communications with Public Administrations. Search on Bibsonomy EGOV The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Electronic Forms, Public Key Infrastructure, Public Administrations, Secure Communications, Certification Authorities
36Sébastien Kunz-Jacques, Gwenaëlle Martinet, Guillaume Poupard, Jacques Stern Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF discrete logarithm, proof of knowledge, Public key cryptanalysis
36Jintai Ding, Dieter Schmidt Cryptanalysis of HFEv and Internal Perturbation of HFE. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Hidden field equation, internal perturbation, Public-key, multivariable, quadratic polynomials
36Kristian Gjøsteen Symmetric Subgroup Membership Problems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF subgroup membership problem, standard model, public key encryption, hybrid encryption
36Louis Goubin A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards
36Ari Juels, Jorge Guajardo RSA Key Generation with Verifiable Randomness. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF verifiable randomness, public-key infrastructure, zero knowledge, non-repudiation, certificate authority, key generation
36Marc Joye, Christophe Tymen Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF smart-cards, Public-key cryptography, elliptic curves, non-adjacent forms
36Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 Encrypted Message Authentication by Firewalls. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption
36Adam L. Young, Moti Yung Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Auto-Recoverable Auto-Certifiable Cryptosystems, NIZK, software key escrow, escrow hierarchy, RSA, Public Key, Key Escrow, ElGamal
36Helena Handschuh, Yiannis Tsiounis, Moti Yung Decision Oracles are Equivalent to Matching Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Diffie-Hellman variants, randomized reductions, uniform reductions, homomorphic encryption functions (ElGamal, Goldwasser-Micali, Okamoto-Uchiyama, Naccache-Stern), random self-reducibility, universal malleability, public-key encryption, decision problems, matching problems
36Michael W. David, Kouichi Sakurai Security Issues for Contactless Smart Cards. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Contactless-card, Standards, Smart-card, Public key, Efficient Implementation
36Michael Gisler, Dieter Spahni eGovernment Experiences of the Swiss Federal Institute of Intellectual Property. Search on Bibsonomy DEXA Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF eGovernment experiences, public management offices, Swiss public administration, private law, eGovernment transaction, relation based view, intellectual property, government data processing, eBusiness, New Public Management
36Guillaume Barbu, Alberto Battistello, Guillaume Dabosville, Christophe Giraud 0001, Guénaël Renault, Soline Renner, Rina Zeitoun Combined Attack on CRT-RSA - Why Public Verification Must Not Be Public? Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
36Michael Kaschesky, Reinhard Riedl Top-level decisions through public deliberation on the internet: evidence from the evolution of Java governance. Search on Bibsonomy D.GO The full citation details ... 2009 DBLP  BibTeX  RDF public consultation, e-government, innovation, government, participation, public administration, politics, policy making
35L. J. Lapro Design Issues for Individual Online Public Services. Search on Bibsonomy DEXA Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF public orientated government service, individual online public service design issues, integration, fragmentation, public administration
35Kouichi Sakurai, Tsuyoshi Takagi On the Security of a Modified Paillier Public-Key Primitive. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF One-wayness, Composite residuosity problem, Paillier cryptosystem, Factoring, Key distribution, Chosen ciphertext attack
34Sungyoung Yoon, Jonghoon Seo, Joonyoung Yoon, Seungchul Shin, Tack-Don Han A Usability Evaluation of Public Icon Interface. Search on Bibsonomy HCI (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Public icon, color-based image code, image code, barcode, pictogram
34Matthias Finke, Anthony Tang 0001, Rock Leung, Michael Blackstock Lessons learned: game design for large public displays. Search on Bibsonomy DIMEA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF interactive large public displays, personal devices, shared entertainment, user study, gaming, short messages services (SMS), cell phones
34Xiang Cao, Michael Massimi, Ravin Balakrishnan Flashlight jigsaw: an exploratory study of an ad-hoc multi-player game on public displays. Search on Bibsonomy CSCW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF flashlight display, games, public display, exploratory study
34Wei-Chuen Yau, Swee-Huay Heng, Bok-Min Goi Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF off-line keyword guessing attack, privacy, public key encryption, database security, Searching on encrypted data
34Loo Geok Pee, Atreyi Kankanhalli Understanding the drivers, enablers, and performance of knowledge management in public organizations. Search on Bibsonomy ICEGOV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF KM drivers, KM enablers, public sector performance, knowledge management
34Akio Shinohara, Junji Tomita, Tamio Kihara, Shinya Nakajima, Katsuhiko Ogawa A Huge Screen Interactive Public Media System: Mirai-Tube. Search on Bibsonomy HCI (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF interactive advertising, subtle interaction, pattern recognition, ambient displays, interactive public displays
34Sarah Guth Wikis in education: : is public better? Search on Bibsonomy Int. Sym. Wikis The full citation details ... 2007 DBLP  DOI  BibTeX  RDF blended course development, collective authoring, public wiki
34María Isabel González Vasco, Dennis Hofheinz, Consuelo Martínez, Rainer Steinwandt On the Security of Two Public Key Cryptosystems Using Non-Abelian Groups. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF logarithmic signatures, public key encryption, word problem, non-abelian groups
34Marc Eaddy, Gábor Blaskó, Jason S. Babcock, Steven Feiner My Own Private Kiosk: Privacy-Preserving Public Displays. Search on Bibsonomy ISWC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF gaze steering, audio augmented reality, privacy, eye tracking, public display, gaze-contingent
34Siguna Müller, Winfried B. Müller The Security of Public Key Cryptosystems Based on Integer Factorization. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF factorization problem, Dickson cryptosystem, LUC cryptosystem, Williams cryptosystem, ElGamal cryptosystem, secure keys, cryptanalysis, Public-key cryptography, RSA cryptosystem, discrete logarithm problem
34Alexandra Boldyreva, Marc Fischlin, Adriana Palacio, Bogdan Warinschi A Closer Look at PKI: Security and Efficiency. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Eike Kiltz Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao 0001 On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Designated Confirmer Signature, Digital Signature, Fair Exchange
34Craig Gentry, Zulfikar Ramzan Identity-Based Aggregate Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Liqun Chen 0002, John Malone-Lee Improved Identity-Based Signcryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Yuji Watanabe, Hideki Imai Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
33Alvaro Graves Integrating and publishing public safety data using semantic technologies. Search on Bibsonomy DG.O The full citation details ... 2010 DBLP  BibTeX  RDF visualization, data integration, semantic technologies, local government, public safety, crime
33Batya Friedman, Alan Borning, Janet Davis, Brian T. Gill, Peter H. Kahn Jr., Travis Kriplean, Peyina Lin Laying the foundations for public participation and value advocacy: interaction design for a large scale urban simulation. Search on Bibsonomy DG.O The full citation details ... 2008 DBLP  BibTeX  RDF democratization, direct and indirect stakeholders, legitimation, urban development, value advocacy, simulation, participatory design, conflict, bias, value sensitive design, public participation, human values
33Stephen Purpura, Claire Cardie, Jesse Simons Active learning for e-rulemaking: public comment categorization. Search on Bibsonomy DG.O The full citation details ... 2008 DBLP  BibTeX  RDF machine learning, active learning, text categorization, e-rulemaking, public comment
33Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai Parallel Key-Insulated Public Key Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Philip D. MacKenzie An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Adrian Antipa, Daniel R. L. Brown, Alfred Menezes, René Struik, Scott A. Vanstone Validation of Elliptic Curve Public Keys. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 35133 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license