Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 34 matches
- 2005
- Michel Abdalla, David Pointcheval:
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. Financial Cryptography 2005: 341-356 - Mikhail J. Atallah, Keith B. Frikken, Michael T. Goodrich, Roberto Tamassia:
Secure Biometric Authentication for Weak Computational Devices. Financial Cryptography 2005: 357-371 - Gildas Avoine:
Fraud Within Asymmetric Multi-hop Cellular Networks. Financial Cryptography 2005: 1-15 - Gildas Avoine, Philippe Oechslin:
RFID Traceability: A Multilayer Problem. Financial Cryptography 2005: 125-140 - Walid Bagga, Refik Molva:
Policy-Based Cryptography and Applications. Financial Cryptography 2005: 72-87 - Felix Brandt, Tuomas Sandholm:
Efficient Privacy-Preserving Protocols for Multi-unit Auctions. Financial Cryptography 2005: 298-312 - Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, Markus Schneider, Michael Steiner:
A Privacy-Protecting Coupon System. Financial Cryptography 2005: 93-108 - Richard Clayton:
Who'd Phish from the Summit of Kilimanjaro?. Financial Cryptography 2005: 91-92 - Richard Clayton, Drew Dean, Markus Jakobsson, Steven A. Myers, Stuart G. Stubblebine, Michael Szydlo:
A Chat at the Old Phishin' Hole. Financial Cryptography 2005: 88 - Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, Gonzalo R. Arce:
Approximate Message Authentication and Biometric Entity Authentication. Financial Cryptography 2005: 240-254 - David Dagon, Wenke Lee, Richard J. Lipton:
Protecting Secret Data from Insider Attacks. Financial Cryptography 2005: 16-30 - Yevgeniy Dodis, Dae Hyun Yum:
Time Capsule Signature. Financial Cryptography 2005: 57-71 - Lars Eilebrecht:
Ciphire Mail Email Encryption and Authentication. Financial Cryptography 2005: 211-224 - Edith Elkind, Helger Lipmaa:
Small Coalitions Cannot Manipulate Voting. Financial Cryptography 2005: 285-297 - Allan Friedman:
Panel Summary: Incentives, Markets and Information Security. Financial Cryptography 2005: 372-373 - Keith B. Frikken, Mikhail J. Atallah:
Achieving Fairness in Private Contract Negotiation. Financial Cryptography 2005: 270-284 - Simson L. Garfinkel, Jeffrey I. Schiller, Erik Nordlander, David Margrave, Robert C. Miller:
Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce. Financial Cryptography 2005: 188-202 - Bezalel Gavish:
Trust and Swindling on the Internet. Financial Cryptography 2005: 44 - Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebine:
Secure Distributed Human Computation. Financial Cryptography 2005: 328-332 - Fernando Godínez, Dieter Hutter, Raúl Monroy:
Audit File Reduction Using N-Gram Models. Financial Cryptography 2005: 336-340 - Eu-Jin Goh, Philippe Golle:
Event Driven Private Counters. Financial Cryptography 2005: 313-327 - Markus Jakobsson:
Modeling and Preventing Phishing Attacks. Financial Cryptography 2005: 89 - Stanislaw Jarecki, Vitaly Shmatikov:
Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure. Financial Cryptography 2005: 172-187 - Aggelos Kiayias, Antonina Mitrofanova:
Testing Disjointness of Private Datasets. Financial Cryptography 2005: 109-124 - Jeff King, André L. M. dos Santos:
A User-Friendly Approach to Human Authentication of Messages. Financial Cryptography 2005: 225-239 - Andrew Koyfman:
Securing Sensitive Data with the Ingrian DataSecure Platform. Financial Cryptography 2005: 203-210 - Aybek Mukhamedov, Steve Kremer, Eike Ritter:
Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model. Financial Cryptography 2005: 255-269 - Steven A. Myers:
Helping the Phish Detect the Lure. Financial Cryptography 2005: 90 - Paul C. van Oorschot, Stuart G. Stubblebine:
Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling. Financial Cryptography 2005: 31-43 - Koutarou Suzuki, Makoto Yokoo:
Secure Multi-attribute Procurement Auction. Financial Cryptography 2005: 333-335
skipping 4 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-08-18 00:25 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint