|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 16 occurrences of 14 keywords
|
|
|
Results
Found 37 publication records. Showing 37 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
210 | Chen-hsiung Chan, Sheng-An Lee, Cheng-Yan Kao, Huai-Kuang Tsai |
Improving EAX with restricted 2-opt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2005, Proceedings, Washington DC, USA, June 25-29, 2005, pp. 1471-1476, 2005, ACM, 1-59593-010-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
edge assembly crossover (EAX), restricted 2-opt, genetic algorithm, genetic algorithms, combinatorial optimization, local search, traveling salesman problem (TSP) |
177 | Yuichi Nagata |
Fast EAX Algorithm Considering Population Diversity for Traveling Salesman Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EvoCOP ![In: Evolutionary Computation in Combinatorial Optimization, 6th European Conference, EvoCOP 2006, Budapest, Hungary, April 10-12, 2006, Proceedings, pp. 171-182, 2006, Springer, 3-540-33178-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
114 | Yuichi Nagata |
New EAX Crossover for Large TSP Instances. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPSN ![In: Parallel Problem Solving from Nature - PPSN IX, 9th International Conference, Reykjavik, Iceland, September 9-13, 2006, Procedings, pp. 372-381, 2006, Springer, 3-540-38990-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
105 | Mihir Bellare, Phillip Rogaway, David A. Wagner 0001 |
The EAX Mode of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, pp. 389-407, 2004, Springer, 3-540-22171-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
EAX, OMAC, provable security, message authentication, modes of operation, Authenticated encryption, CCM, CBC MAC |
92 | Yuichi Nagata |
The EAX Algorithm Considering Diversity Loss. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPSN ![In: Parallel Problem Solving from Nature - PPSN VIII, 8th International Conference, Birmingham, UK, September 18-22, 2004, Proceedings, pp. 332-341, 2004, Springer, 3-540-23092-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
64 | Yuichi Nagata |
Efficient evolutionary algorithm for the vehicle routing problem with time windows: edge assembly crossover for the VRPTW. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Congress on Evolutionary Computation ![In: Proceedings of the IEEE Congress on Evolutionary Computation, CEC 2007, 25-28 September 2007, Singapore, pp. 1175-1182, 2007, IEEE, 978-1-4244-1339-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
64 | Zifei Zhong, Srihari Nelakuditi |
On the Efficacy of Opportunistic Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECON ![In: Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2007, Merged with IEEE International Workshop on Wireless Ad-hoc and Sensor Networks (IWWAN), June 18-21, 2007, San Diego, California, USA, pp. 441-450, 2007, IEEE, 1-4244-1268-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Yuichi Nagata |
Edge Assembly Crossover for the Capacitated Vehicle Routing Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EvoCOP ![In: Evolutionary Computation in Combinatorial Optimization, 7th European Conference, EvoCOP 2007, Valencia, Spain, April 11-13, 2007, Proceedings, pp. 142-153, 2007, Springer, 978-3-540-71614-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Huai-Kuang Tsai, Jinn-Moon Yang, Yuan-Fang Tsai, Cheng-Yan Kao |
An evolutionary algorithm for large traveling salesman problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part B ![In: IEEE Trans. Syst. Man Cybern. Part B 34(4), pp. 1718-1729, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Jean-Paul Watson, Charlie Ross, V. Eisele, J. Denton, José Bins, C. Guerra, L. Darrell Whitley, Adele E. Howe |
The Traveling Salesrep Problem, Edge Assembly Crossover, and 2-opt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPSN ![In: Parallel Problem Solving from Nature - PPSN V, 5th International Conference, Amsterdam, The Netherlands, September 27-30, 1998, Proceedings, pp. 823-834, 1998, Springer, 3-540-65078-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
29 | Sanketh Menda, Julia Len, Paul Grubbs, Thomas Ristenpart |
Context Discovery and Commitment Attacks: How to Break CCM, EAX, SIV, and More. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 526, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
29 | Sanketh Menda, Julia Len, Paul Grubbs, Thomas Ristenpart |
Context Discovery and Commitment Attacks - How to Break CCM, EAX, SIV, and More. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (4) ![In: Advances in Cryptology - EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part IV, pp. 379-407, 2023, Springer, 978-3-031-30633-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Adel Nikfarjam, Jakob Bossek, Aneta Neumann, Frank Neumann 0001 |
Computing Diverse Sets of High Quality TSP Tours by EAX-Based Evolutionary Diversity Optimisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2108.05005, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
29 | Adel Nikfarjam, Jakob Bossek, Aneta Neumann, Frank Neumann 0001 |
Computing diverse sets of high quality TSP tours by EAX-based evolutionary diversity optimisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOGA ![In: FOGA '21: Foundations of Genetic Algorithms XVI, Virtual Event, Austria, September 6-8, 2021, pp. 9:1-9:11, 2021, ACM, 978-1-4503-8352-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Alexander Uskov |
The Efficiency of Encryption Algorithms in EAX Moder of Operation in IPSEC-based Virtual Private Networks for Streaming Rich Multimedia Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Sci. Appl. ![In: Int. J. Comput. Sci. Appl. 11(1), pp. 18-36, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
29 | Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata |
Improved Authenticity Bound of EAX, and Refinements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 792, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
29 | Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata |
Attacks and Security Proofs of EAX-Prime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers, pp. 327-347, 2013, Springer, 978-3-662-43932-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata |
Improved Authenticity Bound of EAX, and Refinements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, pp. 184-201, 2013, Springer, 978-3-642-41226-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Miroslaw Blocho, Zbigniew J. Czech |
A Parallel EAX-based Algorithm for Minimizing the Number of Routes in the Vehicle Routing Problem with Time Windows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC-ICESS ![In: 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, HPCC-ICESS 2012, Liverpool, United Kingdom, June 25-27, 2012, pp. 1239-1246, 2012, IEEE Computer Society, 978-1-4673-2164-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Hao Wang, William Emmanuel Yu |
Comparison between PKI (RSA-AES) and AEAD (AES-EAX PSK) Cryptography Systems for Use in SMS-Based Secure Transmissions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDT ![In: Networked Digital Technologies - Third International Conference, NDT 2011, Macau, China, July 11-13, 2011. Proceedings, pp. 1-12, 2011, Springer, 978-3-642-22184-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Qingbo Zhang, Jiaming He, Liu Li |
Research on the Optimization of Encryption and Authentication Mode of EAX about Broadband Wireless Communications Equipment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIE (1) ![In: CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31 - April 2, 2009, Los Angeles, California, USA, 7 Volumes, pp. 155-159, 2009, IEEE Computer Society, 978-0-7695-3507-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Milind M. Parelkar, Kris Gaj |
Implementation of EAX Mode of Operation for FPGA Bitstream Encryption and Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPT ![In: Proceedings of the 2005 IEEE International Conference on Field-Programmable Technology, FPT 2005, 11-14 December 2005, Singapore, pp. 335-336, 2005, IEEE, 0-7803-9407-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
29 | Mihir Bellare, Phillip Rogaway, David A. Wagner 0001 |
EAX: A Conventional Authenticated-Encryption Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2003, pp. 69, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
29 | Martin M. Weinshienk |
GTD-5 EAX Remote Switching Unit - Extension of a Distributed System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: IEEE International Conference on Communications: Integrating the World Through Communications, ICC 1986, Toronto, Canada, June 22-25, 1986, Proceedings, pp. 1094-1099, 1986, IEEE. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP BibTeX RDF |
|
29 | Stig Magnusson, William S. Jinbo |
GTD-5 EAX hardware overview. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Mag. ![In: IEEE Commun. Mag. 21(6), pp. 6-12, 1983. The full citation details ...](Pics/full.jpeg) |
1983 |
DBLP DOI BibTeX RDF |
|
29 | Ronald E. Schauer |
External Clock Synchronization Plans for the GTD 3 EAX Digital Toll/Tandem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Commun. ![In: IEEE Trans. Commun. 27(7), pp. 988-992, 1979. The full citation details ...](Pics/full.jpeg) |
1979 |
DBLP DOI BibTeX RDF |
|
29 | F. A. Weber |
No. 1 EAX Common Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Commun. ![In: IEEE Trans. Commun. 21(12), pp. 1393-1399, 1973. The full citation details ...](Pics/full.jpeg) |
1973 |
DBLP DOI BibTeX RDF |
|
29 | P. J. Keehn |
No. 1 EAX Maintainability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Commun. ![In: IEEE Trans. Commun. 21(12), pp. 1381-1384, 1973. The full citation details ...](Pics/full.jpeg) |
1973 |
DBLP DOI BibTeX RDF |
|
29 | C. A. Kalat |
No. 1 EAX Operating System Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Commun. ![In: IEEE Trans. Commun. 21(12), pp. 1390-1393, 1973. The full citation details ...](Pics/full.jpeg) |
1973 |
DBLP DOI BibTeX RDF |
|
29 | R. W. Wolff |
No. 1 EAX Diagnostic Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Commun. ![In: IEEE Trans. Commun. 21(12), pp. 1377-1381, 1973. The full citation details ...](Pics/full.jpeg) |
1973 |
DBLP DOI BibTeX RDF |
|
29 | E. A. Wodka, G. T. Grzybowski |
No. 1 EAX Call-Processing and Metering Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Commun. ![In: IEEE Trans. Commun. 21(12), pp. 1384-1390, 1973. The full citation details ...](Pics/full.jpeg) |
1973 |
DBLP DOI BibTeX RDF |
|
29 | F. B. Sikorski |
No. 1 EAX Switching Plan and Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Commun. ![In: IEEE Trans. Commun. 21(12), pp. 1399-1405, 1973. The full citation details ...](Pics/full.jpeg) |
1973 |
DBLP DOI BibTeX RDF |
|
29 | D. P. Kroes |
No. 1 EAX System Objectives and Description. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Commun. ![In: IEEE Trans. Commun. 21(12), pp. 1405-1409, 1973. The full citation details ...](Pics/full.jpeg) |
1973 |
DBLP DOI BibTeX RDF |
|
21 | Charles Pecheur, Franco Raimondi |
Symbolic Model Checking of Logics with Actions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoChArt ![In: Model Checking and Artificial Intelligence, 4th Workshop, MoChArt IV, Riva del Garda, Italy, August 29, 2006, Revised Selected and Invited Papers, pp. 113-128, 2006, Springer, 978-3-540-74127-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Nikunj Raghuvanshi, Ming C. Lin |
Interactive sound synthesis for large scale environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SI3D ![In: Proceedings of the 2006 Symposium on Interactive 3D Graphics, SI3D 2006, March 14-17, 2006, Redwood City, California, USA, pp. 101-108, 2006, ACM, 1-59593-295-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
rigid-body simulation, OpenAL, sound synthesis |
21 | Stefan Lucks |
Two-Pass Authenticated Encryption Faster Than Generic Composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers, pp. 284-298, 2005, Springer, 3-540-26541-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
associated data, OMAC, provable security, authenticated encryption |
21 | Perry M. Kosieniak, Victor Mathis, Michael St. Jacques, Delano Stevens |
The Network Control Assistant (NCA), a Real-Time Prototype Expert System for Network Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE (Vol. 1) ![In: Proceedings of the First International Conference on Industrial & Engineering Applications of Artificial Intelligence & Expert Systems, IEA/AIE 1988, June 1-3, 1988, Tullahoma, TN, USA. ACM, 1988 - Volume 1, pp. 367-379, 1988, ACM, 0-89791-271-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
Prolog, Prolog, IBM PC |
Displaying result #1 - #37 of 37 (100 per page; Change: )
|
|