|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 436 occurrences of 309 keywords
|
|
|
Results
Found 1105 publication records. Showing 1105 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
119 | Noga Alon, Venkatesan Guruswami, Tali Kaufman, Madhu Sudan 0001 |
Guessing secrets efficiently via list decoding. |
ACM Trans. Algorithms |
2007 |
DBLP DOI BibTeX RDF |
?-biased spaces, 20 questions, k-universal sets, error-correcting codes, decoding algorithms |
98 | Marcel Fernandez, Miguel Soriano |
Protecting Intellectual Property by Guessing Secrets. |
EC-Web |
2003 |
DBLP DOI BibTeX RDF |
|
98 | Noga Alon, Venkatesan Guruswami, Tali Kaufman, Madhu Sudan 0001 |
Guessing secrets efficiently via list decoding. |
SODA |
2002 |
DBLP BibTeX RDF |
|
88 | Shao Wei-jie |
An Analysis to the Protection of Commercial Secrets and Strategies to Protect. |
CSSE (5) |
2008 |
DBLP DOI BibTeX RDF |
|
77 | Marcel Fernandez, Miguel Soriano |
Efficient Recovery of Secrets. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
|
72 | Hui-Xian Li, Liao-Jun Pang, Wan-Dong Cai |
An Efficient Threshold Multi-group-Secret Sharing Scheme. |
ICFIE |
2007 |
DBLP DOI BibTeX RDF |
Multi-group-secret sharing, Chinese Remain Theorem, Secret sharing, Threshold |
67 | Ruby B. Lee, Peter C. S. Kwan, John Patrick McGregor, Jeffrey S. Dwoskin, Zhenghong Wang |
Architecture for Protecting Critical Secrets in Microprocessors. |
ISCA |
2005 |
DBLP DOI BibTeX RDF |
|
67 | Carlo Blundo, Alfredo De Santis, Ugo Vaccaro |
Efficient Sharing of Many Secrets. |
STACS |
1993 |
DBLP DOI BibTeX RDF |
|
60 | Tom Tedrick |
Fair Exchange of Secrets. |
CRYPTO |
1984 |
DBLP DOI BibTeX RDF |
Exchange of Secret Keys, Exchange of Secrets, Fractions of a Bit, Cryptographic Protocols, Oblivious Transfer, Contract Signing |
57 | Delphine Demange, David Sands 0001 |
All Secrets Great and Small. |
ESOP |
2009 |
DBLP DOI BibTeX RDF |
|
57 | Julien P. Stern |
A New Efficient All-Or-Nothing Disclosure of Secrets Protocol. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
57 | Gilles Brassard, Claude Crépeau, Jean-Marc Robert 0001 |
All-or-Nothing Disclosure of Secrets. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
|
55 | Krister Olsson, Takashi Kawashima |
The king has... |
ACM Multimedia |
2005 |
DBLP DOI BibTeX RDF |
catharsis, secrets, slab printer, interactive, SMS |
52 | Kai Wang, Xukai Zou, Yan Sui |
A Multiple Secret Sharing Scheme based on Matrix Projection. |
COMPSAC (1) |
2009 |
DBLP DOI BibTeX RDF |
|
52 | Jeffrey S. Dwoskin, Ruby B. Lee |
Hardware-rooted trust for secure key management and transient trust. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
hardware policy enforcement, secret protection (sp), transient trust, key management, emergency response, secure processors |
52 | Wei Yang 0011, Liusheng Huang, Mingjun Xiao, Weiwei Jing |
Quantum ANDOS Protocol with Unconditional Security. |
ICNC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Abdulrahman Alarifi, Wenliang Du |
Diversify sensor nodes to improve resilience against node compromise. |
SASN |
2006 |
DBLP DOI BibTeX RDF |
wireless sensor networks, reverse engineering, diversity, obfuscation |
52 | Amihai Motro, Donald G. Marks, Sushil Jajodia |
Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
|
50 | Sven Laur, Helger Lipmaa |
A New Protocol for Conditional Disclosure of Secrets and Its Applications. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
Conditional disclosure of secrets, crypto-computing, two-party computation, oblivious transfer, homomorphic encryption |
46 | Sara Miner More, Pavel Naumov |
An Independence Relation for Sets of Secrets. |
WoLLIC |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Sara Miner More, Pavel Naumov |
On interdependence of secrets in collaboration networks. |
TARK |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Ronald Toegl, Georg Hofferek, Karin Greimel, Adrian Leung, Raphael Chung-Wei Phan, Roderick Bloem |
Formal Analysis of a TPM-Based Secrets Distribution and Storage Scheme. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Barbara Masucci |
Sharing Multiple Secrets: Models, Schemes and Analysis. |
Des. Codes Cryptogr. |
2006 |
DBLP DOI BibTeX RDF |
62B10, AMS Classification 94A62 |
46 | Giovanni Di Crescenzo |
Sharing One Secret vs. Sharing Many Secrets: Tight Bounds for the Max Improvement Ratio. |
MFCS |
2001 |
DBLP DOI BibTeX RDF |
Multi-Secret Sharing, Cryptography, Secret Sharing |
46 | Dennis M. Volpano, Geoffrey Smith 0001 |
Verifying Secrets and Relative Secrecy. |
POPL |
2000 |
DBLP DOI BibTeX RDF |
|
46 | Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe |
On Sharing Many Secrets (Extended Abstract). |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
46 | Atin Basuchoudhary, Nicola Searle |
Snatched secrets: Cybercrime and trade secrets modelling a firm's decision to report a theft of trade secrets. |
Comput. Secur. |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Matthew Canton |
The presence table: a reactive surface for ambient connection. |
TEI |
2011 |
DBLP DOI BibTeX RDF |
|
41 | Mahalingam Ramkumar |
Trustworthy Computing under Resource Constraints with the DOWN Policy. |
IEEE Trans. Dependable Secur. Comput. |
2008 |
DBLP DOI BibTeX RDF |
Security, Security, Mobile Computing, integrity and protection |
41 | Runhua Shi, Liusheng Huang, Yonglong Luo, Hong Zhong 0001 |
A Threshold Multi-secret Sharing Scheme. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Mohammad Mannan, Paul C. van Oorschot |
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
41 | Yi-Chun Wang, Justie Su-tzu Juan |
Simple Multi-Secret Sharing Schemes to Achieve the Optimal Maximum Improvement Ratio. |
SUTC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Bezawada Bruhadeshwar, Sandeep S. Kulkarni |
User Revocation in Secure Adhoc Networks. |
ICDCIT |
2005 |
DBLP DOI BibTeX RDF |
Secure Adhoc Networks, Secret Instantiation Protocols, Group Key Management Protocols, User Revocation |
41 | Gene Itkis |
Cryptographic tamper evidence. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
evolving cryptosystems, key evolution, tamper evidence, digital signatures, exposures |
41 | Marc Joye, Sung-Ming Yen |
One-Way Cross-Trees and Their Applications. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
41 | Amos Beimel, Benny Chor |
Universally Ideal Secret Sharing Schemes (Preliminary Version). |
CRYPTO |
1992 |
DBLP DOI BibTeX RDF |
|
40 | George L. Sicherman, Wiebren de Jonge, Reind P. van de Riet |
Answering Queries Without Revealing Secrets. |
ACM Trans. Database Syst. |
1983 |
DBLP DOI BibTeX RDF |
keeping secrets, refusal to answer, strategy |
36 | Shafi Goldwasser |
Cryptography without (Hardly Any) Secrets ? |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Yevgeniy Dodis, Daniel Wichs |
Non-malleable extractors and symmetric key cryptography from weak secrets. |
STOC |
2009 |
DBLP DOI BibTeX RDF |
bounded retrieval model, information reconcilliation, authentication, encryption, information theoretic security, randomness extractors, privacy amplification, authenticated key agreement |
36 | Paul E. Sevinç, Mario Strasser, David A. Basin |
Securing the Distribution and Storage of Secrets with Trusted Platform Modules. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagórski |
Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Lein Harn, Hung-Yu Lin |
On Oblivious Transfer Protocol and Its Application for the Exchange of Secrets. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
31 | Christophe Tartary, Josef Pieprzyk, Huaxiong Wang |
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Threshold Access Structures, Share Verifiability, Keyed One-Way Functions, Chinese Remainder Theorem, Secret Sharing Scheme |
31 | Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang |
A new multi-stage secret sharing scheme using one-way function. |
ACM SIGOPS Oper. Syst. Rev. |
2005 |
DBLP DOI BibTeX RDF |
multi-stage, cryptography, secret sharing, one-way function, threshold scheme |
31 | Hui-Xian Li, Chun-Tian Cheng, Liao-Jun Pang |
An Improved Multi-stage (t, n)-Threshold Secret Sharing Scheme. |
WAIM |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Stefan Brands |
Rapid Demonstration of Linear Relations Connected by Boolean Operators. |
EUROCRYPT |
1997 |
DBLP DOI BibTeX RDF |
|
31 | Benny Chor, Eyal Kushilevitz |
Secret Sharing Over Infinite Domains (Extended Abstract). |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
31 | Subhasish Mazumdar, David W. Stemple, Tim Sheard |
Resolving the Tension between Integrity and Security Using a Theorem Prover. |
SIGMOD Conference |
1988 |
DBLP DOI BibTeX RDF |
|
31 | Jane Fedorowicz |
Comments on Price/Performance Patterns of U.S. Computer Systems. |
Commun. ACM |
1981 |
DBLP DOI BibTeX RDF |
|
31 | Chris Christensen |
Review of No More Secrets: My Part in Codebreaking at Bletchley Park and the Pentagon by Betty WebbWebb, Betty. No More Secrets: My Part in codebreaking at Bletchley Park and the Pentagon, London: Mardle Books. 2023. 212+x pages, Paperback, £9.99. ISBN 9781837700219. |
Cryptologia |
2024 |
DBLP DOI BibTeX RDF |
|
31 | Isuru Ranawaka, Nuwan Goonasekera, Enis Afgan, Jim Basney, Suresh Marru, Marlon E. Pierce |
Custos Secrets: a Service for Managing User-Provided Resource Credential Secrets for Science Gateways. |
PEARC |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Latifa Al-Abdulkarim, Katie Atkinson, Trevor J. M. Bench-Capon |
ANGELIC Secrets: Bridging from Factors to Facts in US Trade Secrets. |
JURIX |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Shlomi Dolev, Juan A. Garay, Niv Gilboa, Vladimir Kolesnikov |
Brief announcement: swarming secrets. |
PODC |
2010 |
DBLP DOI BibTeX RDF |
strongly oblivious tm, swarm, multi-party computation |
26 | Tamir Tassa, Jorge L. Villar |
On proper secrets, ( t , k )-bases and linear codes. |
Des. Codes Cryptogr. |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 68R01, 51E20, 15A03 |
26 | Lifeng Sang, Anish Arora |
A Wireless Security Framework without Shared Secrets. |
SSS |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Michel Simatic, Isabelle Astic, Coline Aunis, Annie Gentes, Aude Guyot-Mbodji, Camille Jutant, Emmanuel Zaza |
"Plug: Secrets of the Museum": A Pervasive Game Taking Place in a Museum. |
ICEC |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs |
Secrets and lies in computer-mediated interaction: theory, methods and design. |
CHI Extended Abstracts |
2008 |
DBLP DOI BibTeX RDF |
security, privacy, design, deception, secrecy |
26 | Éric Badouel, Marek A. Bednarczyk, Andrzej M. Borzyszkowski, Benoît Caillaud, Philippe Darondeau |
Concurrent Secrets. |
Discret. Event Dyn. Syst. |
2007 |
DBLP DOI BibTeX RDF |
Concurrency, Computer security, Automata, Supervisory control, Opacity |
26 | Chun-Hsiang Huang, Yu-Feng Kuo, Ja-Ling Wu |
Digital invisible ink: revealing true secrets via attacking. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
DII watermarking, digital invisible ink, hiding watermark in watermark, steganography |
26 | Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau |
Tracing Traitors by Guessing Secrets. The q-Ary Case. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Bruce Christianson, Michael Roe, David Wheeler |
Secure Sessions from Weak Secrets. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Nils Klarlund, Anders Møller, Michael I. Schwartzbach |
MONA Implementation Secrets. |
CIAA |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Edwina L. Rissland, Kevin D. Ashley |
A Case-Based System for Trade Secrets Law. |
ICAIL |
1987 |
DBLP DOI BibTeX RDF |
|
24 | Enric Serradell-López, Victor Cavaller |
Cultural Aspects of Secrecy in Global Economy. |
WSKS (2) |
2009 |
DBLP DOI BibTeX RDF |
secrets, management of the secret, innovation, patents |
24 | Berkant Ustaoglu |
Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
leaking ephemeral secrets, postponed ephemeral key derivation, pseudo-static keys, Key agreement protocols |
24 | Helger Lipmaa |
New Communication-Efficient Oblivious Transfer Protocols Based on Pairings. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Computationally-private information retrieval, conditional disclosure of secrets, oblivious transfer, homomorphic encryption |
24 | Joachim Biskup, Jan-Hendrik Lochner |
Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
potential secrets, Access control, relational databases, policy, information flow, confidentiality, database security, inference control |
24 | Jeffrey H. Matsuura |
An Overview of Leading Current Legal Issues Affecting Information Technology Professionals. |
Inf. Syst. Frontiers |
2004 |
DBLP DOI BibTeX RDF |
DMCA, antitrust, privacy, HIPAA, trade secrets |
24 | Sreekanth Malladi, Jim Alves-Foss |
What are Multi-Protocol Guessing Attacks and How to Prevent Them. |
WETICE |
2002 |
DBLP DOI BibTeX RDF |
Multi-protocol guessing attacks, weak secrets, mixed strand spaces, EKE |
24 | Manuel Blum 0001 |
How to Exchange (Secret) Keys |
ACM Trans. Comput. Syst. |
1983 |
DBLP DOI BibTeX RDF |
secrets, transaction protection protocols, security, cryptography, protocols, factorization, public key encryption |
24 | John F. Banzhaf |
When your computer needs a lawyer. |
Commun. ACM |
1968 |
DBLP DOI BibTeX RDF |
constacts, criminals, evidence copying, income tax, lawyer, liabilty, negligence, record keeping records, slander of credit, standard of care, torts, warrantees, simulation, accounting, regulations, copyrights, evidence, law, patents, legal, copying, guarantees, crime, trade secrets |
21 | Keith B. Frikken, Marina Blanton, Mikhail J. Atallah |
Robust Authentication Using Physically Unclonable Functions. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Alexander Lux, Heiko Mantel |
Declassification with Explicit Reference Points. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Amos Beimel, Noam Livne |
On Matroids and Nonideal Secret Sharing. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Hung-Min Sun, King-Hang Wang |
Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Emmanuel Bresson, Mark Manulis |
Securing group key exchange against strong corruptions. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
authenticated group key exchange, strong corruptions, mutual authentication, contributiveness, insider attacks |
21 | Amos Beimel, Noam Livne, Carles Padró |
Matroids Can Be Far from Ideal Secret Sharing. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
21 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
A security framework for personal networks. |
COMSWARE |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Julien Bringer, Hervé Chabanne, Thomas Icart |
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
Tree-Based Hash Protocol, POK, Privacy, RFID tags, PUF |
21 | Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, David Sands 0001 |
Termination-Insensitive Noninterference Leaks More Than Just a Bit. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson |
On Unconditionally Secure Distributed Oblivious Transfer. |
J. Cryptol. |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Takashi Nishide, Kazuo Ohta |
Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Bitwise Sharing, Secret Sharing, Multiparty Computation |
21 | Peter C. S. Kwan, Glenn Durfee |
Practical Uses of Virtual Machines for Protection of Sensitive User Data. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Maciej Liskiewicz |
Multiparty Computations in Non-private Environments. |
GTIT-C |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Amos Beimel, Noam Livne |
On Matroids and Non-ideal Secret Sharing. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Li Bai |
A Strong Ramp Secret Sharing Scheme Using Matrix Projection. |
WOWMOM |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Alejandro Russo, John Hughes 0001, David A. Naumann, Andrei Sabelfeld |
Closing Internal Timing Channels by Transformation. |
ASIAN |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Chao-Yong Hsu, Chun-Shien Lu, Soo-Chang Pei |
Joint Screening Halftoning and Visual Cryptography for Image Protection. |
IWDW |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Cheng-Kang Chu, Wen-Guey Tzeng |
Conditional Oblivious Cast. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
oblivious cast, conditional oblivious transfer, secure computation |
21 | Zhanfei Zhou |
Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
21 | David Molnar, Andrea Soppera, David A. Wagner 0001 |
Privacy for RFID through trusted computing. |
WPES |
2005 |
DBLP DOI BibTeX RDF |
privacy, RFID, trusted computing, audit |
21 | Gene Itkis, Robert McNerney, Scott Russell |
Intrusion-Resilient Secure Channels. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Mingqiao Wu, Zhongliang Zhu, Shiyao Jin |
Detection of Hiding in the LSB of DCT Coefficients. |
ICIC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size. |
ICN (2) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Hui-Xian Li, Chun-Tian Cheng, Liao-Jun Pang |
A New (t, n)-Threshold Multi-secret Sharing Scheme. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia |
Identifying Sensitive Associations in Databases for Release Control. |
Secure Data Management |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Marius-Calin Silaghi |
Meeting Scheduling Guaranteeing n/2-Privacy and Resistant to Statistical Analysis (Applicable to any DisCSP). |
Web Intelligence |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Martin Fowler |
Data Access Routines. |
IEEE Softw. |
2003 |
DBLP DOI BibTeX RDF |
|
21 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
Leakage-Resilient Authenticated Key Establishment Protocols. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson |
New Results on Unconditionally Secure Distributed Oblivious Transfer. |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1105 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|