An Equitably Fair On-line Auction Scheme
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Optimal Bid Sequences for Multiple-Object Auctions with Unequal Budgets
ISAAC '00 Proceedings of the 11th International Conference on Algorithms and Computation
(M+1)st-Price Auction Protocol
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Sustaining cooperation in multi-hop wireless networks
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
An Indistinguishability-Based Characterization of Anonymous Channels
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Enforcing behaviour with anonymity
Proceedings of the workshop on Applications of private and anonymous communications
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Proceedings of the 13th international conference on Security protocols
MobiAd: private and scalable mobile advertising
Proceedings of the fifth ACM international workshop on Mobility in the evolving internet architecture
Dissent: accountable anonymous group messaging
Proceedings of the 17th ACM conference on Computer and communications security
Information flow in interactive systems
CONCUR'10 Proceedings of the 21st international conference on Concurrency theory
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
Journal of Computer Security
WAR: wireless anonymous routing
Proceedings of the 11th international conference on Security Protocols
Quantum anonymous transmissions
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Dissent in numbers: making strong anonymity scale
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
Several weak bit-commitments using seal-once tamper-evident devices
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Quantitative information flow in interactive systems
Journal of Computer Security - ARSPA-WITS'10
Hi-index | 0.00 |