|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 9 occurrences of 9 keywords
|
|
|
Results
Found 10 publication records. Showing 10 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
181 | Phong Q. Nguyen |
Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 555-570, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
GnuPG, GPG, Cryptanalysis, Implementation, RSA, Public-key cryptography, ElGamal, OpenPGP |
144 | Narayan C. Debnath |
A Study of Control Flow and Data Dependency Interface (Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Conference on Computer Science ![In: Proceedings of the ACM 18th Annual Computer Science Conference on Cooperation, CSC '90, Sheraton Washington Hotel, Washington, DC, USA, February 20-22, 1990, pp. 435, 1990, ACM, 0-89791-348-5. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
96 | Alvin L.-S. Chua, Anna V. Ivshina, Vladimir A. Kuznetsov |
Pareto-Gamma Statistic Reveals Global Rescaling in Transcriptomes of Low and High Aggressive Breast Cancer Phenotypes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRIB ![In: Pattern Recognition in Bioinformatics, International Workshop, PRIB 2006, Hong Kong, China, August 20, 2006, Proceedings, pp. 49-59, 2006, Springer, 3-540-37446-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Alfonso Gerevini, Ivan Serina |
Lagrange Multipliers for Local Search on Planning Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Local Search for Planning and Scheduling ![In: Local Search for Planning and Scheduling, ECAI 2000 Workshop, Berlin, Germany, August 21, 2000, Revised Papers, pp. 37-54, 2000, Springer, 3-540-42898-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
40 | Yuelong Li, Jialiang Yan, Jianming Wang |
GPG-NET: Face Inpainting With Generative Parsing Guidance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: 2021 IEEE International Conference on Image Processing, ICIP 2021, Anchorage, AK, USA, September 19-22, 2021, pp. 2014-2018, 2021, IEEE, 978-1-6654-3102-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
40 | M. J. Pillaire, A. Margot, Gaetano Villani, A. Sarasin, M. Defais, A. Gentil |
Mutagenesis in monkey cells of a vector containing a single d(GPG) cis- diamminedichloroplatinum(II) adduct placed on codon 13 of the human H- ras proto-oncogene. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Nucleic Acids Res. ![In: Nucleic Acids Res. 22(13), pp. 2519-2524, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
40 | Walter Zuber |
Die Rationalisierung der betrieblichen Informationsorganisation und die Lösung betriebswirtschaftlicher Aufgaben der Planung und Abrechnung mit Hilfe des Einsatzes einer Kleindatenverarbeitungsanlage C 8205 (D4A): (dargestellt am Beispiel der GPG "Thomas Müntzer" Mühlhausen). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
1976 |
RDF |
|
24 | Apu Kapadia |
A Case (Study) For Usability in Secure Email Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(2), pp. 80-84, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters |
Forward-secure signatures with untrusted update. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 191-200, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
untrusted storage, digital signatures, forward security, two-factor authentication |
24 | Ming Xu 0002, Yingwen Chen, Yi Wu, Wanrong Yu |
An Anti-void Geographic Routing Algorithm for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-hoc and Sensor Networks, Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings, pp. 60-71, 2006, Springer, 3-540-49932-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #10 of 10 (100 per page; Change: )
|
|