|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 265 occurrences of 142 keywords
|
|
|
Results
Found 471 publication records. Showing 456 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
111 | Lan Zhou, Willy Susilo, Yi Mu 0001 |
Three-Round Secret Handshakes Based on ElGamal and DSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, pp. 332-342, 2006, Springer, 3-540-33052-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Oblivious Signature Based Envelope, Hidden Credential, Privacy, Key Exchange, DSA, ElGamal, Secret Handshake |
106 | Eric R. Verheul, Henk C. A. van Tilborg |
Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding, pp. 119-133, 1997, Springer, 3-540-62975-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Traceable ElGamal, Key Recovery, Key Escrow, ElGamal |
103 | Yvo Desmedt, Duong Hieu Phan |
A CCA Secure Hybrid Damgård's ElGamal Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, pp. 68-82, 2008, Springer, 978-3-540-88732-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
86 | Adam L. Young, Moti Yung |
The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 264-276, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
DSA signature, Menezes-Vanstone PKCS, Schnorr signature algorithm, protocol abuse, leakage-bandwidth, cryptographic system implementations, randomness, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, setup, ElGamal encryption, ElGamal signature, Discrete-Log |
79 | Phong Q. Nguyen |
Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 555-570, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
GnuPG, GPG, Cryptanalysis, Implementation, RSA, Public-key cryptography, ElGamal, OpenPGP |
68 | Ramzi A. Haraty, Hadi Otrok, Abdul Nasser El-Kassar |
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), January 3-6, 2005, Cairo, Egypt, pp. 91, 2005, IEEE Computer Society, 0-7803-8735-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
68 | Yiannis Tsiounis, Moti Yung |
On the Security of ElGamal Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings, pp. 117-134, 1998, Springer, 3-540-64693-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
63 | Ulrich Kühn 0001 |
Side-Channel Attacks on Textbook RSA and ElGamal Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, pp. 324-336, 2003, Springer, 3-540-00324-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
RSA encryption, Side-channel attack, ElGamal encryption |
63 | Markus Jakobsson, Ari Juels |
Addition of ElGamal Plaintexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 346-358, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
directed decryption, fast-track, repetition robustness, addition, elgamal |
56 | Benoît Chevallier-Mames, Pascal Paillier, David Pointcheval |
Encoding-Free ElGamal Encryption Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 91-104, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
56 | Patrick Horster, Holger Petersen 0002, Markus Michels |
Meta-ElGamal Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994., pp. 96-107, 1994, ACM, 0-89791-732-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
55 | Adam L. Young, Moti Yung |
Bandwidth-Optimal Kleptographic Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, pp. 235-250, 2001, Springer, 3-540-42521-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Leakage attacks, the Newton channel, design methodologies for asymmetric ciphers, kleptographic attacks, attack bandwidth, discrete logarithm based systems, tamper-proof hardware designs, public scrutiny, hardware technologies: EEPROM, ferroelectric, trust, DSA, ElGamal, subliminal channels, non-volatile memory |
51 | Jingmei Liu, Xiangguo Cheng, Xinmei Wang |
Methods to Forge ElGamal Signatures and Determine Secret Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 859-862, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Signature, ElGamal |
51 | Igor E. Shparlinski |
On the Uniformity of Distribution of the ElGamal Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Algebra Eng. Commun. Comput. ![In: Appl. Algebra Eng. Commun. Comput. 13(1), pp. 9-16, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
ElGamal signature scheme, Exponential sums, Uniform distribution |
44 | Wen-Chung Kuo |
On ElGamal Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (2) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 151-153, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Jian Ren 0001, Lein Harn |
Ring Signature Based on ElGamal Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WASA ![In: Wireless Algorithms, Systems, and Applications, First International Conference, WASA 2006, Xi'an, China, August 15-17, 2006, Proceedings, pp. 445-456, 2006, Springer, 3-540-37189-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Janusz Biernat, Maciej Nikodem |
Fault Cryptanalysis of ElGamal Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCAST ![In: Computer Aided Systems Theory - EUROCAST 2005, 10th International Conference on Computer Aided Systems Theory, Las Palmas de Gran Canaria, Spain, February 7-11, 2005, Revised Selected Papers, pp. 327-336, 2005, Springer, 3-540-29002-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Dan Boneh, Antoine Joux, Phong Q. Nguyen |
Why Textbook ElGamal and RSA Encryption Are Insecure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 30-43, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
44 | Claus-Peter Schnorr, Markus Jakobsson |
Security of Signed ElGamal Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 73-89, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
43 | Dennis Hofheinz, Eike Kiltz |
The Group of Signed Quadratic Residues and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 637-653, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Hybrid ElGamal/DHIES, Public-key encryption, chosen-ciphertext security |
43 | Chong Hee Kim, Philippe Bulens, Christophe Petit 0001, Jean-Jacques Quisquater |
Fault Attacks on Public Key Elements: Application to DLP-Based Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 182-195, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Smart cards, fault injection, faults attacks, DSA, ElGamal, side channel |
43 | Guilhem Castagnos, Benoît Chevallier-Mames |
Towards a DL-Based Additively Homomorphic Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 362-375, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ElGamal encryption scheme, Naccache-Stern cryptosystem, DL-based homomorphic scheme, public-key cryptography, standard model |
43 | Ryotaro Hayashi 0001, Keisuke Tanaka |
Universally Anonymizable Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings, pp. 293-312, 2005, Springer, 3-540-30684-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Cramer- Shoup, RSA-OAEP, anonymity, encryption, ElGamal, key-privacy |
43 | Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih |
Fast Multi-computations with Integer Similarity Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings, pp. 138-153, 2005, Springer, 3-540-24454-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
ElGamal-like public key cryptosystems, binary signed-digit (BSD) representations, sparse forms, multi-computations, multiexponentiations, multi-scalar multiplications |
43 | Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee |
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 494-508, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Proof of equality of discrete logarithms (PEQDL), Threshold decryption, Threshold ElGamal, Threshold RSA, Batch verification |
43 | Changjie Wang, Ho-fung Leung |
A secure and private clarke tax voting protocol without trusted authorities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 6th International Conference on Electronic Commerce, ICEC 2004, Delft, The Netherlands, October 25-27, 2004, pp. 556-565, 2004, ACM, 1-58113-930-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Clarke tax voting protocol, universal verification, security, privacy protection, electronic voting, mix network, ElGamal encryption |
43 | Christophe Giraud 0001, Erik Woodward Knudsen |
Fault Attacks on Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 478-491, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
XTR-DSA, Schnorr signature, Side-Channel Attack, Smartcard, Fault Attack, Signature schemes, DSA, ECDSA, ElGamal signature |
43 | Adam L. Young, Moti Yung |
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 306-314, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Auto-Recoverable Auto-Certifiable Cryptosystems, NIZK, software key escrow, escrow hierarchy, RSA, Public Key, Key Escrow, ElGamal |
43 | Siguna Müller, Winfried B. Müller |
The Security of Public Key Cryptosystems Based on Integer Factorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings, pp. 9-23, 1998, Springer, 3-540-64732-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
factorization problem, Dickson cryptosystem, LUC cryptosystem, Williams cryptosystem, ElGamal cryptosystem, secure keys, cryptanalysis, Public-key cryptography, RSA cryptosystem, discrete logarithm problem |
40 | Helger Lipmaa |
On the CCA1-Security of Elgamal and Damgård's Elgamal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers, pp. 18-35, 2010, Springer, 978-3-642-21517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
40 | Helger Lipmaa |
On the CCA1-Security of Elgamal and Damgård's Elgamal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 234, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
36 | Shuanghe Peng, Zhen Han |
Proxy Cryptography for Secure Inter-domain Information Exchanges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 12-14 December, 2005, Changsha, Hunan, China, pp. 193-199, 2005, IEEE Computer Society, 0-7695-2492-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Atsuko Miyaji |
A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings, pp. 1-14, 1996, Springer, 3-540-61872-4. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
32 | Liang Chen, Chengmin Gao |
Public Key Homomorphism Based on Modified ElGamal in Real Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 802-805, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Huawei Huang, Bo Yang 0003, Shenglin Zhu, Guozhen Xiao |
Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, pp. 1-21, 2008, Springer, 978-3-540-88732-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
matrix semigroup action, DDH problem, public key cryptosystem, semantically secure |
32 | Gilles Barthe, Benjamin Grégoire, Sylvain Heraud, Santiago Zanella Béguelin |
Formal Certification of ElGamal Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust, 5th International Workshop, FAST 2008, Malaga, Spain, October 9-10, 2008, Revised Selected Papers, pp. 1-19, 2008, Springer. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Kun Peng, Ed Dawson |
Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings, pp. 209-224, 2007, Springer, 978-3-540-72159-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Chun-Hua Chen, Jinn-ke Jan, Chao-Hsing Hsu |
One-Server Private Information Retrieval Scheme combined with Mutual Authentication by ElGamal Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICIC (3) ![In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August - 1 September 2006, Beijing, China, pp. 300-303, 2006, IEEE Computer Society, 0-7695-2616-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Hüseyin Acan, Kamer Kaya, Ali Aydin Selçuk |
Capture Resilient ElGamal Signature Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2006, 21th International Symposium, Istanbul, Turkey, November 1-3, 2006, Proceedings, pp. 943-951, 2006, Springer, 3-540-47242-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Kristian Gjøsteen |
A New Security Proof for Damgård's ElGamal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, pp. 150-158, 2006, Springer, 3-540-31033-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Go Yamamoto, Koji Chida, Anderson C. A. Nascimento, Koutarou Suzuki, Shigenori Uchiyama |
Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers, pp. 328-342, 2005, Springer, 3-540-31012-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Lidong Zhou, Michael A. Marsh, Fred B. Schneider, Anna Redz |
Distributed Blinding for Distributed ElGamal Re-Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 25th International Conference on Distributed Computing Systems (ICDCS 2005), 6-10 June 2005, Columbus, OH, USA, pp. 815-824, 2005, IEEE Computer Society, 0-7695-2331-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Lucas C. Ferreira, Ricardo Dahab |
Optimistic Blinded-Key Signatures for ElGamal and Related Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MATA ![In: Mobility Aware Technologies and Applications, First International Workshop,MATA 2004, Florianópolis, Brazil, October 20-22, 2004, Proceedings, pp. 254-263, 2004, Springer, 3-540-23423-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Min-Shiang Hwang, Chin-Chen Chang 0001, Kuo-Feng Hwang |
An ElGamal-Like Cryptosystem for Enciphering Large Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 14(2), pp. 445-446, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
encryption, data security, public key, cryptosystems |
31 | Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung |
A New Randomness Extraction Paradigm for Hybrid Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, pp. 590-609, 2009, Springer, 978-3-642-01000-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
hash proof systems, Chosen-ciphertext security, ElGamal, hybrid encryption, randomness extraction |
31 | N. R. Sunitha, B. B. Amberker |
Forward-Secure Multi-signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, 5th International Conference, ICDCIT 2008, New Delhi, India, December 10-12, 2008. Proceedings, pp. 89-99, 2008, Springer, 978-3-540-89736-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Serial multi-signature, Parallel multi-signature, Digital Signature, Forward-Security, e-banking, ElGamal Signatures |
31 | Debasish Jena, Sanjay Kumar Jena, Banshidhar Majhi |
A Novel Blind Signature Scheme Based on Nyberg-Rueppel Signature Scheme and Applying in Off-Line Digital Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIT ![In: 10th International Conference on Information Technology, ICIT 2007, Roukela, India, 17-20 December 2007, pp. 19-22, 2007, IEEE Computer Society, 0-7695-3068-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RSA, Elliptic Curve, Blind signature, ElGamal, Digital Cash |
31 | Fabien Laguillaumie, Damien Vergnaud |
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 175-188, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Universal designated verifier signatures, zero-knowledge proof, Elgamal signatures |
31 | Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei |
A distributed key assignment protocol for secure multicast based on proxy cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 359, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ElGamal cryptosystem, key composition, proxy cryptography, secure multicast |
31 | Suan Khai Chong, Graham Farr, Laura Frost, Simon Hawley |
On pedagogically sound examples in public-key cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSC ![In: Computer Science 2006, Twenty-Nineth Australasian Computer Science Conference (ACSC2006), Hobart, Tasmania, Australia, January 16-19 2006, pp. 63-68, 2006, Australian Computer Society, 1-920682-30-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
Massey-Omura, diagnostic example, example generator, sound example, RSA, public-key cryptography, Diffie-Hellman, knapsack, ElGamal |
31 | Changjie Wang, Ho-fung Leung |
A secure voter-resolved approval voting protocol over internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 646-652, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
approval voting, universal verification, voter-resolved, security, privacy protection, electronic voting, ElGamal encryption |
31 | Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang |
Secure Multicast Using Proxy Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 280-290, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
multicast key management, cipher sequences, proxy encryption, ElGamal cryptosystem, Secure multicast |
31 | Changjie Wang, Ho-fung Leung |
A Secure and Fully Private Borda Voting Protocol with Universal Verifiability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 28th International Computer Software and Applications Conference (COMPSAC 2004), Design and Assessment of Trustworthy Software-Based Systems, 27-30 September 2004, Hong Kong, China, Proceedings, pp. 224-229, 2004, IEEE Computer Society, 0-7695-2209-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Borda voting protocol, universal verification, Security, Privacy protection, Electronic voting, ElGamal encryption |
31 | Wen Ping Ma, Moon Ho Lee |
Group Oriented Cryptosystems Based on Linear Access Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 370-376, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Group Oriented Cryptosystem, ElGamal Cryptosystem, Vector Space Access Structure, Cryptography, Secret Sharing |
31 | Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng 0001 |
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 8th IMA International Conference, Cirencester, UK, December 17-19, 2001, Proceedings, pp. 114-127, 2001, Springer, 3-540-43026-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
ciphertext validity, OAEP-RSA, Encryption, provable security, chosen-ciphertext security, ElGamal encryption |
31 | Michel Abdalla, Mihir Bellare, Phillip Rogaway |
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings, pp. 143-158, 2001, Springer, 3-540-41898-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Cryptographic standards, Diffie-Hellman key exchange, provable security, elliptic curve cryptosystems, generic model, ElGamal encryption |
31 | Helena Handschuh, Yiannis Tsiounis, Moti Yung |
Decision Oracles are Equivalent to Matching Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 276-289, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Diffie-Hellman variants, randomized reductions, uniform reductions, homomorphic encryption functions (ElGamal, Goldwasser-Micali, Okamoto-Uchiyama, Naccache-Stern), random self-reducibility, universal malleability, public-key encryption, decision problems, matching problems |
31 | Hossein Ghodosi, Josef Pieprzyk |
Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings, pp. 129-134, 1999, Springer, 3-540-65756-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Cryptography, Digital Signatures, Proxy Signatures, ElGamal signatures |
31 | Adam L. Young, Moti Yung |
Finding Length-3 Positive Cunningham Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANTS ![In: Algorithmic Number Theory, Third International Symposium, ANTS-III, Portland, Oregon, USA, June 21-25, 1998, Proceedings, pp. 289-298, 1998, Springer, 3-540-64657-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Cunningham Chains, Auto-Recoverable and Auto-Certifiable Cryptosystem, ElGamal system, Public-Key Cryptosystems, Primality testing |
31 | Adam L. Young, Moti Yung |
The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 89-103, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Cryptanalytic attacks, Private key, applied systems, design and manufacturing of cryptographic devices and software, auto-escrowing keys, software, RSA, randomness, hardware, Public Key, pseudorandomness, Kerberos, key escrow, DSA, ElGamal, subliminal channels, Capstone |
31 | Udit Gupta, Mariam Elgamal, Gage Hills, Gu-Yeon Wei, Hsien-Hsin S. Lee, David Brooks 0001, Carole-Jean Wu |
Architectural CO2 Footprint Tool: Designing Sustainable Computer Systems With an Architectural Carbon Modeling Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Micro ![In: IEEE Micro 43(4), pp. 107-117, July - August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Mariam Elgamal, Doug Carmean, Elnaz Ansari, Okay Zed, Ramesh Peri, Srilatha Manne, Udit Gupta, Gu-Yeon Wei, David Brooks 0001, Gage Hills, Carole-Jean Wu |
Design Space Exploration and Optimization for Carbon-Efficient Extended Reality Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.01831, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Abdelrahman S. Elgamal, Osama Z. Aletri, Barzan A. Yosuf, Ahmad Adnan Qidan, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani |
AI-Driven Resource Allocation in Optical Wireless Communication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTON ![In: 23rd International Conference on Transparent Optical Networks, ICTON 2023, Bucharest, Romania, July 2-6, 2023, pp. 1-5, 2023, IEEE, 979-8-3503-0303-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Mariam Elgamal, Doug Carmean, Elnaz Ansari, Okay Zed, Ramesh Peri, Srilatha Manne, Udit Gupta, Gu-Yeon Wei, David Brooks 0001, Gage Hills, Carole-Jean Wu |
Carbon-Efficient Design Optimization for Computing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HotCarbon ![In: Proceedings of the 2nd Workshop on Sustainable Computer Systems, HotCarbon 2023, Boston, MA, USA, 9 July 2023, pp. 16:1-16:7, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Mohammad Tubishat, Zainab Rawshdeh, Hazim Jarrah, Zenab Mohamed Elgamal, Ashraf Elnagar, Maen T. Alrashdan |
Dynamic generalized normal distribution optimization for feature selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 34(20), pp. 17355-17370, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Zenab Mohamed Elgamal, Aznul Qalid Md Sabri, Mohammad Tubishat, Dina Tbaishat, Sharif Naser Makhadmeh, Osama Ahmad Alomari |
Improved Reptile Search Optimization Algorithm Using Chaotic Map and Simulated Annealing for Feature Selection in Medical Field. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 51428-51446, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Hamdy A. M. Sayedahmed, Emadeldin M. Elgamal, Hesham A. Hefny |
F-802.11P: A Fuzzy Enhancement for ieee 802.11P in Vehicle-TO-Everything Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.04860, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Mohamed M. A. Ammar, Bijan Shirinzadeh, Hassan Elgamal, Mohamed N. A. Nasr |
On the Role of Damage Evolution in Finite Element Modeling of the Cutting Process and Sensing Residual Stresses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(21), pp. 8547, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Yousry S. Elgamal |
A New Dimension to University Education The Metaversity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCTA ![In: 32nd International Conference on Computer Theory and Applications, ICCTA 2022, Alexandria, Egypt, December 17-19, 2022, pp. 1-2, 2022, IEEE, 979-8-3503-2019-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Udit Gupta, Mariam Elgamal, Gage Hills, Gu-Yeon Wei, Hsien-Hsin S. Lee, David Brooks 0001, Carole-Jean Wu |
ACT: designing sustainable computer systems with an architectural carbon modeling tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCA ![In: ISCA '22: The 49th Annual International Symposium on Computer Architecture, New York, New York, USA, June 18 - 22, 2022, pp. 784-799, 2022, ACM, 978-1-4503-8610-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Amir Abdel Menaem, Mohamed Elgamal, Abdel-Haleem Abdel-Aty, Emad E. Mahmoud, Zhe Chen 0007, Mohamed A. Hassan 0001 |
A Proposed ANN-Based Acceleration Control Scheme for Soft Starting Induction Motor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 4253-4265, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
31 | Zenab Mohamed Elgamal, Norizan Binti Mohd Yasin, Aznul Qalid Md Sabri, Rami Sihwail, Mohammad Tubishat, Hazim Jarrah |
Improved Equilibrium Optimization Algorithm Using Elite Opposition-Based Learning and New Local Search Strategy for Feature Selection in Medical Datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. ![In: Comput. 9(6), pp. 68, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
31 | Abdelrahman S. Elgamal, Osama Zwaid Alsulami, Ahmad Adnan Qidan, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani |
Reinforcement Learning for Resource Allocation in Steerable Laser-based Optical Wireless Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2106.11368, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
31 | Abdelrahman S. Elgamal, Osama Zwaid Alsulami, Ahmad Adnan Qidan, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani |
Q-learning algorithm for resource allocation in WDMA-based optical wireless communication networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2105.10729, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
31 | Mahmoud Eliwy, Muhammad Elgamal, Marwa Sayed Salem, Mostafa Fedawy, Ahmed Shaker |
Gate-on-Source TFET Analytical Model: Role of Mobile Charges and Depletion Regions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NILES ![In: 3rd Novel Intelligent and Leading Emerging Sciences Conference, NILES 2021, Giza, Egypt, October 23-25, 2021, pp. 345-349, 2021, IEEE, 978-1-6654-2157-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
31 | Muhammad Elgamal, Ahmed Shaker |
Numerical Corrections to Estimate Depletion Region Width in Pseudo-two-dimensional Model of Double-Gate Tunneling FET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NILES ![In: 3rd Novel Intelligent and Leading Emerging Sciences Conference, NILES 2021, Giza, Egypt, October 23-25, 2021, pp. 97-102, 2021, IEEE, 978-1-6654-2157-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
31 | Abdelrahman S. Elgamal, Osama Zwaid Alsulami, Ahmad Adnan Qidan, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani |
Reinforcement Learning for Resource Allocation in Steerable Laser-Based Optical Wireless Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: 34th IEEE Canadian Conference on Electrical and Computer Engineering, CCECE 2021, Virtual Event, September 12-17, 2021, pp. 1-6, 2021, IEEE, 978-1-6654-4864-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
31 | Mohammed Abdalla, Abdeltawab M. Hendawi, Hoda M. O. Mokhtar, Neveen ElGamal, John Krumm, Mohamed H. Ali |
DeepMotions: A Deep Learning System for Path Prediction Using Similar Motions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 23881-23894, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Mohamed Elgamal, Nikolay V. Korovkin, Akram Elmitwally, Amir Abdel Menaem, Zhe Chen 0007 |
A Framework for Profit Maximization in a Grid-Connected Microgrid With Hybrid Resources Using a Novel Rule Base-BAT Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 71460-71474, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Zenab Mohamed Elgamal, Norizan Binti Mohd Yasin, Mohammad Tubishat, Mohammed Alswaitti, Seyedali Mirjalili |
An Improved Harris Hawks Optimization Algorithm With Simulated Annealing for Feature Selection in the Medical Field. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 186638-186652, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Tarek Elgamal, Shu Shi, Varun Gupta, Rittwik Jana, Klara Nahrstedt |
SiEVE: Semantically Encoded Video Analytics on Edge and Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2006.01318, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
31 | Tarek Elgamal, Klara Nahrstedt |
Serdab: An IoT Framework for Partitioning Neural Networks Computation across Multiple Enclaves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2005.06043, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
31 | Tarek Elgamal, Klara Nahrstedt |
Serdab: An IoT Framework for Partitioning Neural Networks Computation across Multiple Enclaves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing, CCGRID 2020, Melbourne, Australia, May 11-14, 2020, pp. 519-528, 2020, IEEE, 978-1-7281-6095-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Tarek Elgamal, Shu Shi, Varun Gupta, Rittwik Jana, Klara Nahrstedt |
SiEVE: Semantically Encoded Video Analytics on Edge and Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 40th IEEE International Conference on Distributed Computing Systems, ICDCS 2020, Singapore, November 29 - December 1, 2020, pp. 1383-1388, 2020, IEEE, 978-1-7281-7002-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Tarek Elgamal |
Utility-driven optimization and placement framework for Visual IoT analytics over edge-cloud environments ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
RDF |
|
31 | Hany Elgamal, Mervat El-Haddad |
Estimation of Natural Radionuclides and Rare Earth Elements Concentration of the Rocks of Abu Khuruq Ring Complex, Egypt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 11(8), pp. 1041, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Phuong Nguyen, Tarek Elgamal, Steven Konstanty, Todd Nicholson, Stuart Turner, Patrick Su, Klara Nahrstedt, Timothy Spila, Roy H. Campbell, John Dallesasse, Michael Chan, Kenton McHenry |
BRACELET: Edge-Cloud Microservice Infrastructure for Aging Scientific Instruments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC ![In: International Conference on Computing, Networking and Communications, ICNC 2019, Honolulu, HI, USA, February 18-21, 2019, pp. 692-696, 2019, IEEE, 978-1-5386-9223-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Tarek Elgamal, Atul Sandur, Klara Nahrstedt, Gul Agha |
Costless: Optimizing Cost of Serverless Computing through Function Fusion and Placement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1811.09721, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
31 | Cheng-Hsin Hsu, Hua-Jun Hong, Tarek Elgamal, Klara Nahrstedt, Nalini Venkatasubramanian |
Multimedia fog computing: minions in the cloud and crowd. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers of Multimedia Research ![In: Frontiers of Multimedia Research, pp. 255-286, 2018, ACM / Morgan & Claypool, 978-1-97000-107-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Tarek Elgamal, Atul Sandur, Phuong Nguyen, Klara Nahrstedt, Gul Agha |
DROPLET: Distributed Operator Placement for IoT Applications Spanning Edge and Cloud Resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE CLOUD ![In: 11th IEEE International Conference on Cloud Computing, CLOUD 2018, San Francisco, CA, USA, July 2-7, 2018, pp. 1-8, 2018, IEEE Computer Society, 978-1-5386-7235-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Mohammed Abdalla, Abdeltawab M. Hendawi, Neveen ElGamal, Hoda M. O. Mokhtar, Mohamed H. Ali, John Krumm |
SimilarMove: Similarity-based Prediction for Moving Object Future Path. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PredictGIS@SIGSPATIAL ![In: Proceedings of the 2nd ACM SIGSPATIAL Workshop on Prediction of Human Mobility, PredictGIS 2018, Seattle, WA, USA, November 6, 2018, pp. 15-24, 2018, ACM, 978-1-4503-6042-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Tarek Elgamal |
Costless: Optimizing Cost of Serverless Computing through Function Fusion and Placement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: 2018 IEEE/ACM Symposium on Edge Computing, SEC 2018, Seattle, WA, USA, October 25-27, 2018, pp. 300-312, 2018, IEEE, 978-1-5386-9445-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | S. M. Baladoh, Amany Fawzy Elgamal, Hanaa Abdo Abas |
Virtual lab to develop achievement in electronic circuits for hearing-impaired students. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Educ. Inf. Technol. ![In: Educ. Inf. Technol. 22(5), pp. 2071-2085, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
31 | Duha Yasser, Mohamed A. ElGamal, Mohamed Atef, Omaira Hamada, Ali H. Hassan, Hassan Mostafa |
A comparative analysis of optimized low-power comparators for biomedical-ADCs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICM ![In: 29th International Conference on Microelectronics, ICM 2017, Beirut, Lebanon, December 10-13, 2017, pp. 1-4, 2017, IEEE, 978-1-5386-4049-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
31 | Hesham A. Ameen, Kareem Abdelmonem, Mohamed A. ElGamal, Mohamed A. Mousa, Omaira Hamada, Yahia Zakaria, Mohamed A. Y. Abdalla |
A 28 GHz four-channel phased-array transceiver in 65-nm CMOS technology for 5G applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICM ![In: 29th International Conference on Microelectronics, ICM 2017, Beirut, Lebanon, December 10-13, 2017, pp. 1-4, 2017, IEEE, 978-1-5386-4049-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
31 | Tarek Elgamal, Klara Nahrstedt |
Multicamera Summarization of Rehabilitation Sessions in Home Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 2017 ACM on Multimedia Conference, MM 2017, Mountain View, CA, USA, October 23-27, 2017, pp. 1381-1389, 2017, ACM, 978-1-4503-4906-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
31 | Tarek Elgamal, Bo Chen 0025, Klara Nahrstedt |
Teleconsultant: Communication and Analysis of Wearable Videos in Emergency Medical Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 2017 ACM on Multimedia Conference, MM 2017, Mountain View, CA, USA, October 23-27, 2017, pp. 1241-1242, 2017, ACM, 978-1-4503-4906-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
31 | Tarek Elgamal, Shangyu Luo, Matthias Boehm 0001, Alexandre V. Evfimievski, Shirish Tatikonda, Berthold Reinwald, Prithviraj Sen |
SPOOF: Sum-Product Optimization and Operator Fusion for Large-Scale Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIDR ![In: 8th Biennial Conference on Innovative Data Systems Research, CIDR 2017, Chaminade, CA, USA, January 8-11, 2017, Online Proceedings, 2017, www.cidrdb.org. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
31 | Kiana Calagari, Tarek Elgamal, Khaled M. Diab, Krzysztof Templin, Piotr Didyk, Wojciech Matusik, Mohamed Hefeeda |
Depth Personalization and Streaming of Stereoscopic Sports Videos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Multim. Comput. Commun. Appl. ![In: ACM Trans. Multim. Comput. Commun. Appl. 12(3), pp. 41:1-41:23, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Abla Lotfy, Neamat El-Tazi, Neveen ElGamal |
SCI-F: Social-Corporate Data Integration Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAS ![In: Proceedings of the 20th International Database Engineering & Applications Symposium, IDEAS 2016, Montreal, QC, Canada, July 11-13, 2016, pp. 328-333, 2016, ACM, 978-1-4503-4118-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 456 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ >>] |
|