BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
share (9)
key (6)
verifi (5)
abstract (4)
keep (4)

Stem secret$ (all stems)

43 papers:

MSRMSR-2015-SinhaSDPM #detection #repository #source code
Detecting and Mitigating Secret-Key Leaks in Source Code Repositories (VSS, DS, PD, RP, SM), pp. 396–400.
ICFPICFP-2015-Russo #functional #haskell
Functional pearl: two can keep a secret, if one of them uses Haskell (AR), pp. 280–288.
ESEC-FSEESEC-FSE-2015-AcherBCBJ #product line
Product lines can jeopardize their trade secrets (MA, GB, BC, BB, JMJ), pp. 930–933.
ASPLOSASPLOS-2015-DavidGT #concurrent #data type #scalability
Asynchronized Concurrency: The Secret to Scaling Concurrent Search Data Structures (TD, RG, VT), pp. 631–644.
ICALPICALP-v2-2014-NikzadR #algorithm #approximate #multi #problem
Sending Secrets Swiftly: Approximation Algorithms for Generalized Multicast Problems (AN, RR), pp. 568–607.
KDIRKDIR-2014-KurasEAH #data mining #mining #security
The GDR Through the Eyes of the Stasi — Data Mining on the Secret Reports of the State Security Service of the former German Democratic Republic (CK, TE, CA, GH), pp. 360–365.
CHICHI-2013-ErikssonAS
The secret life of a persona: when the personal becomes private (EE, HA, AS), pp. 2677–2686.
WCREWCRE-2012-BaysalKHG #case study
The Secret Life of Patches: A Firefox Case Study (OB, OK, RH, MWG), pp. 447–455.
WCREWCRE-2011-ZhaoAH #automation
Automatic Extraction of Secrets from Malware (ZZ, GJA, HH), pp. 159–168.
VLDBVLDB-2010-BotanDDHMT #analysis #execution #named #semantics
SECRET: A Model for Analysis of the Execution Semantics of Stream Processing Systems (IB, RD, ND, LMH, RJM, NT), pp. 232–243.
KRKR-2010-KelveyMNS #dependence #functional #independence
Independence and Functional Dependence Relations on Secrets (RK, SMM, PN, BS).
ECOOPECOOP-2010-Ernst
Secret Valley (EE), p. 379.
SACSAC-2010-SorniottiM #facebook #implementation #network #social
Secret interest groups (SIGs) in social networks with an implementation on Facebook (AS, RM), pp. 621–628.
ESOPESOP-2009-DemangeS
All Secrets Great and Small (DD, DS), pp. 207–221.
STOCSTOC-2009-DodisW #encryption #symmetry
Non-malleable extractors and symmetric key cryptography from weak secrets (YD, DW), pp. 601–610.
SACSAC-2009-BiagioniDPS #distributed
Practical distributed voter-verifiable secret ballot system (EB, YD, WP, KS), pp. 16–21.
ICSEICSE-2009-ArandaV #debugging #fault #repository
The secret life of bugs: Going past the errors and omissions in software repositories (JA, GV), pp. 298–308.
DACDAC-2008-RoyKM #hardware
Protecting bus-based hardware IP by secret sharing (JAR, FK, ILM), pp. 846–851.
FMFM-2008-KiniryZ #formal method
Secret Ninja Formal Methods (JRK, DMZ), pp. 214–228.
ICPRICPR-2008-OkaKXLW #authentication #named #similarity #sketching #using
Scribble-a-Secret: Similarity-based password authentication using sketches (MO, KK, YX, LL, FW), pp. 1–4.
DACDAC-2007-SuhD #authentication #generative #physics
Physical Unclonable Functions for Device Authentication and Secret Key Generation (GES, SD), pp. 9–14.
QAPLQAPL-2007-ChothiaPD #component
Keeping Secrets in Resource Aware Components (TC, JP, MTD), pp. 79–94.
ICALPICALP-v2-2006-FouquePSZ
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes (PAF, DP, JS, SZ), pp. 240–251.
ICALPICALP-v2-2006-TassaD #multi
Multipartite Secret Sharing by Bivariate Interpolation (TT, ND), pp. 288–299.
ICPRICPR-v3-2006-HuangL #image #using
A Secret Image Sharing Method Using Integer-to-Integer Wavelet Transform (CPH, CCL), pp. 802–805.
DATEDATE-DF-2004-FaroukS #architecture #design #implementation
Design and Implementation of a Secret Key Steganographic Micro-Architecture Employing FPGA (HAF, MS), pp. 212–217.
SIGMODSIGMOD-2004-FundulakiSLGOP
Share your data, Keep your secrets (IF, AS), pp. 945–946.
STOCSTOC-2004-HalpernT #multi
Rational secret sharing and multiparty computation: extended abstract (JYH, VT), pp. 623–632.
ICPRICPR-v4-2004-YuWT #estimation #on the
On Estimation of Secret Message Length in JSteg-like Steganography (XY, YW, TT), pp. 673–676.
KDDKDD-2004-DavidsonP #image
Locating secret messages in images (ID, GP), pp. 545–550.
UMLUML-2003-Coad #agile #process
Agile Processes: Developing Your Own “Secret Recipes” (PC), p. 1.
DACDAC-2002-SchaumontKV #design
Unlocking the design secrets of a 2.29 Gb/s Rijndael processor (PS, HK, IV), pp. 634–639.
WRLAWRLA-2002-Rodriguez #maude #protocol
A Secret-Sharing Protocol Modelled in Maude (DER), pp. 223–239.
KDDKDD-2002-DobraG #algorithm #linear #named #scalability
SECRET: a scalable linear regression tree algorithm (AD, JG), pp. 481–487.
STOCSTOC-2001-GennaroIKR #complexity #multi
The round complexity of verifiable secret sharing and secure multicast (RG, YI, EK, TR), pp. 580–589.
STOCSTOC-2000-CramerDD #complexity #multi #on the
On the complexity of verifiable secret sharing and multiparty computation (RC, ID, SD), pp. 325–334.
CIAACIAA-2000-KlarlundMS #implementation
MONA Implementation Secrets (NK, AM, MIS), pp. 182–194.
POPLPOPL-2000-VolpanoS #verification
Verifying Secrets and Relative Secrecy (DMV, GS), pp. 268–276.
STOCSTOC-1994-BenalohT
Receipt-free secret-ballot elections (extended abstract) (JCB, DT), pp. 544–553.
STOCSTOC-1989-RabinB #multi #protocol
Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract) (TR, MBO), pp. 73–85.
ICLPICLP-1987-MillerBTL87 #logic
Logical Secrets (MSM, DGB, EDT, JL), pp. 704–728.
STOCSTOC-1983-Blum #how
How to Exchange (Secret) Keys (Extended Abstract) (MB), pp. 440–447.
STOCSTOC-1982-GoldwasserM #encryption #game studies #how #probability
Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information (SG, SM), pp. 365–377.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.