|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 161 occurrences of 89 keywords
|
|
|
Results
Found 421 publication records. Showing 397 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
107 | Guido Appenzeller |
Identity-based encryption from algorithm to enterprise deployment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 406, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
107 | Amit Sahai, Brent Waters |
Fuzzy Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, pp. 457-473, 2005, Springer, 3-540-25910-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
100 | Zhenhui Yuan, Hrishikesh Venkataraman, Gabriel-Miro Muntean |
iBE: A Novel Bandwidth Estimation Algorithm for Multimedia Services over IEEE 802.11 Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMNS ![In: Wired-Wireless Multimedia Networks and Services Management, 12th IFIP/IEEE International Conference on Management of Multimedia and Mobile Networks and Services, MMNS 2009, Venice, Italy, October 26-27, 2009. Proceedings, pp. 69-80, 2009, Springer, 978-3-642-04993-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Wireless networks, multimedia service, bandwidth estimation |
94 | Xu An Wang 0001, Xiaoyuan Yang 0002 |
Proxy Re-encryption Scheme Based on SK Identity Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 657-660, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
94 | Yang Cui 0001, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002 |
Formal Security Treatments for Signatures from Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings, pp. 218-227, 2007, Springer, 978-3-540-75669-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
94 | Ryo Nishimaki, Yoshifumi Manabe, Tatsuaki Okamoto |
Universally Composable Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VIETCRYPT ![In: Progressin Cryptology - VIETCRYPT 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers, pp. 337-353, 2006, Springer, 3-540-68799-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IND-ID-CCA2, universal composition, identity-based encryption |
94 | Xavier Boyen, Qixiang Mei, Brent Waters |
Direct chosen ciphertext security from identity-based techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 320-329, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
identity-based encryption, chosen ciphertext security |
94 | Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai |
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings, pp. 495-514, 2005, Springer, 3-540-30684-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
81 | Alexandra Boldyreva, Vipul Goyal, Virendra Kumar |
Identity-based encryption with efficient revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 417-426, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
provable security, revocation, identity-based encryption |
81 | Rui Zhang 0002, Hideki Imai |
Improvements on Security Proofs of Some Identity Based Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 28-41, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
81 | Liqun Chen 0002, Zhaohui Cheng |
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings, pp. 442-459, 2005, Springer, 3-540-30276-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
74 | Brent Waters |
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 619-636, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
74 | Eike Kiltz |
On the Limitations of the Spread of an IBE-to-PKE Transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 274-289, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Le Trieu Phong, Hiroto Matsuoka, Wakaha Ogata |
Stateful identity-based encryption scheme: faster encryption and decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 381-388, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IBE, stateful encryption, cryptography, provable security, ROM |
67 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 52(2), pp. 219-241, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60 |
67 | Mahabir Prasad Jhanwar, Rana Barua |
A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 314-331, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Quadratic Residuosity Assumption, Pairing Map, IND-ID-CPA, Identity Based Encryption |
67 | Man Ho Au, Qiong Huang 0001, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang |
Traceable and Retrievable Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pp. 94-110, 2008, 978-3-540-68913-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
PKG, Trust, Retrievability, Traceability, Identity-based Encryption |
67 | Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers, pp. 1-19, 2008, Springer, 978-3-642-00729-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IND-CCA security, NM-sID-CPA security, public key encryption, identity-based encryption, non-malleability |
67 | Christian Veigner, Chunming Rong |
On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 521-530, 2006, Springer, 3-540-38619-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
67 | Chik How Tan |
Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings, pp. 292-307, 2006, Springer, 3-540-47699-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, public key encryption, bilinear map |
67 | Mototsugu Nishioka |
Reconsideration on the Security of the Boneh-Franklin Identity-Based Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings, pp. 270-282, 2005, Springer, 3-540-30805-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
67 | Dan Boneh, Xavier Boyen |
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 223-238, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
60 | Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 16-31, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
IND-CCA security, encapsulation, public key encryption, identity-based encryption, pseudorandom generator |
60 | Marco Casassa Mont, Keith Harrison, Martin Sadler |
The HP time vault service: exploiting IBE for timed release of confidential information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the Twelfth International World Wide Web Conference, WWW 2003, Budapest, Hungary, May 20-24, 2003, pp. 160-169, 2003, ACM, 1-58113-680-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
disclosure policies, identifier-based encryption, timed-release, security, web service, privacy |
60 | Marco Casassa Mont, Pete Bramhall, Keith Harrison |
A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology for Privacy in Health Care. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic, pp. 432-437, 2003, IEEE Computer Society, 0-7695-1993-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
58 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings, pp. 354-375, 2008, Springer, 978-3-540-85503-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
multi-TA IBE, multiple trusted authorities, anonymity, identity-based encryption |
54 | Craig Gentry, Shai Halevi |
Hierarchical Identity Based Encryption with Polynomially Many Levels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings, pp. 437-456, 2009, Springer, 978-3-642-00456-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
54 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
Building Key-Private Public-Key Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 276-292, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy |
54 | Benoît Libert, Damien Vergnaud |
Adaptive-ID Secure Revocable Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 1-15, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
provable security, revocation, Identity-based encryption |
54 | Fuchun Guo, Yi Mu 0001, Zhide Chen |
Identity-Based Online/Offline Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 247-261, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Dan Boneh, Periklis A. Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis, Brent Waters |
On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 49th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2008, October 25-28, 2008, Philadelphia, PA, USA, pp. 283-292, 2008, IEEE Computer Society, 978-0-7695-3436-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Neyire Deniz Sarier |
A New Biometric Identity Based Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2061-2066, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Dan Boneh, Craig Gentry, Michael Hamburg |
Space-Efficient Identity Based Encryption Without Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), October 20-23, 2007, Providence, RI, USA, Proceedings, pp. 647-657, 2007, IEEE Computer Society, 978-0-7695-3010-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
54 | Zhaohui Cheng, Liqun Chen 0002, Li Ling, Richard Comley |
General and Efficient Certificateless Public Key Encryption Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings, pp. 83-107, 2007, Springer, 978-3-540-73488-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
54 | Matthew Green 0001, Susan Hohenberger |
Blind Identity-Based Encryption and Simulatable Oblivious Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 265-282, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
54 | Eike Kiltz |
Chosen-Ciphertext Security from Tag-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings, pp. 581-600, 2006, Springer, 3-540-32731-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
54 | Peng Yang 0002, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang 0002, Kanta Matsuura, Hideki Imai |
Applying Fujisaki-Okamoto to Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAECC ![In: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006, Proceedings, pp. 183-192, 2006, Springer, 3-540-31423-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
54 | Craig Gentry |
Practical Identity-Based Encryption Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings, pp. 445-464, 2006, Springer, 3-540-34546-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Identity Based Encryption |
54 | Benoît Libert, Jean-Jacques Quisquater |
Identity Based Encryption Without Redundancy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 285-300, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
ID-based encryption, redundancies, provable security |
47 | Jean-Sébastien Coron |
A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 50(1), pp. 115-133, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60 |
47 | Giuseppe Ateniese, Paolo Gasti |
Universally Anonymous IBE Based on the Quadratic Residuosity Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 32-47, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Eike Kiltz, Yevgeniy Vahlis |
CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings, pp. 221-238, 2008, Springer, 978-3-540-79262-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Xavier Boyen |
General Ad Hoc Encryption from Exponent Inversion IBE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings, pp. 394-411, 2007, Springer, 978-3-540-72539-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Yu Chen 0003, Manuel Charlemagne, Zhi Guan, Jian-bin Hu, Zhong Chen 0001 |
Identity-based encryption based on DHIES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 82-88, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
DHIES, combination, identity-based encryption, bilinear map |
40 | Sherman S. M. Chow |
Removing Escrow from Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 256-276, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Zhiqian Xu 0001, Hai Jiang 0003 |
HASS: Highly Available, Scalable and Secure Distributed Data Storage Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (2) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 772-780, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Robert Pierson, Richard Reiner |
Explanatory warrant for scientific realism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Synth. ![In: Synth. 161(2), pp. 271-282, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Inference to the best explanation, Inference to the best casual explanation, Realism |
40 | Luther Martin |
Identity-Based Encryption Comes of Age. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 41(8), pp. 93-95, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Vipul Goyal, Steve Lu 0001, Amit Sahai, Brent Waters |
Black-box accountable authority identity-based encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 427-436, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
accountable authority, identity-based encryption |
40 | Yang Lu 0001, Jiguo Li 0001, Junmo Xiao |
Generic Construction of Certificate-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 1589-1594, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Fuchun Guo, Yi Mu 0001, Zhide Chen, Li Xu 0002 |
Multi-Identity Single-Key Decryption without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 384-398, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ID-based Systems, Encryption, Pairing |
40 | Leonardo B. Oliveira, Ricardo Dahab, Julio César López-Hernández, Felipe Daguano, Antonio Alfredo Ferreira Loureiro |
Identity-Based Encryption for Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications - Workshops (PerCom Workshops 2007), 19-23 March 2007, White Plains, New York, USA, pp. 290-294, 2007, IEEE Computer Society, 978-0-7695-2788-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Michel Abdalla, Eike Kiltz, Gregory Neven |
Generalized Key Delegation for Hierarchical Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings, pp. 139-154, 2007, Springer, 978-3-540-74834-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Zhe Wu, Jie Tian 0001, Liang Li, Cai-Ping Jiang, Xin Yang 0001 |
A Secure Email System Based on Fingerprint Authentication Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings, pp. 250-253, 2007, IEEE, 1-4244-1329-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Chik How Tan |
Public-Key Encryption from ID-Based Encryption Without One-Time Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (1) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, pp. 450-459, 2006, Springer, 3-540-48269-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, public key encryption, bilinear maps |
40 | Sanjit Chatterjee, Palash Sarkar 0001 |
HIBE With Short Public Parameters Without Random Oracle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 145-160, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Takashi Kitagawa, Peng Yang 0002, Goichiro Hanaoka, Rui Zhang 0002, Hajime Watanabe, Kanta Matsuura, Hideki Imai |
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 348-359, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Changshe Ma |
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 409-423, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Parallel Key-Insulation, Bilinear Pairings, Identity-Based Encryption, Key-Exposure |
40 | Louise Owens, Adam Duffy, Tom Dowling |
An Identity Based Encryption system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPPJ ![In: Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java, PPPJ 2004, Las Vegas, Nevada, USA, June 16-18, 2004, pp. 154-159, 2004, ACM, 1-59593-171-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Ran Canetti, Shai Halevi, Jonathan Katz |
Chosen-Ciphertext Security from Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 207-222, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk |
Universal Designated-Verifier Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings, pp. 523-542, 2003, Springer, 3-540-20592-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Jae Choon Cha, Jung Hee Cheon |
An Identity-Based Signature from Gap Diffie-Hellman Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, pp. 18-30, 2003, Springer, 3-540-00324-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
GDH group, Elliptic curve, Weil pairing, ID-based signature |
40 | Si-si Shao, Fei Chen, Xiaoying Xiao, Weiheng Gu, Yicheng Lu, Shu Wang, Wen Tang, Shangdong Liu, Fei Wu 0004, Jing He 0004, Yimu Ji, Kaixiang Zhang, Fen Mei |
IBE-BCIOT: an IBE based cross-chain communication mechanism of blockchain in IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
World Wide Web ![In: World Wide Web 24(5), pp. 1665-1690, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
40 | Kaoru Kurosawa, Le Trieu Phong |
IBE and function-private IBE under linear assumptions with shorter ciphertexts and private keys, and extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Appl. Cryptogr. ![In: Int. J. Appl. Cryptogr. 3(3), pp. 210-224, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
40 | Nico Döttling, Sanjam Garg |
From Selective IBE to Full IBE and Selective HIBE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 957, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
40 | Nico Döttling, Sanjam Garg |
From Selective IBE to Full IBE and Selective HIBE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC (1) ![In: Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I, pp. 372-408, 2017, Springer, 978-3-319-70499-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
33 | Mihir Bellare, Thomas Ristenpart |
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, pp. 407-424, 2009, Springer, 978-3-642-01000-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange 0001, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi |
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 21(3), pp. 350-391, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Anonymity, Identity-based encryption, Random-oracle model, Foundations, Searchable encryption |
33 | Dalia Khader |
Public Key Encryption with Keyword Search Based on K-Resilient IBE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings. Part III, pp. 1086-1095, 2007, Springer, 978-3-540-74482-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Dalia Khader |
Public Key Encryption with Keyword Search Based on K-Resilient IBE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 298-308, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange 0001, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi |
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, pp. 205-222, 2005, Springer, 3-540-28114-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Shiming Li, Guohui Zhou, Fengyu Lei, Yan Zhao 0007, Baojun Fu |
Identity-Based Data Aggregation in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MVHI ![In: 2010 International Conference on Machine Vision and Human-machine Interface, MVHI 2010, Kaifeng, China, April 24-25, 2010, pp. 223-226, 2010, IEEE Computer Soceity, 978-0-7695-4009-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
IBE, ECC, Data Aggregation, WSNs |
31 | Siyeong Kim, Ken Kondo, Naoto Noguchi, Ryoto Akiyama, Yoko Ibe, Yeongae Yang, Bumsuk Lee |
Decreased Visual Search Behavior in Elderly Drivers during the Early Phase of Reverse Parking, But an Increase during the Late Phase. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(23), pp. 9555, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Ibe Chukwuemeka Emmanuel, Ekaterina Mitrofanova |
Fairness of Machine Learning Algorithms in Demography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2202.01013, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
31 | Yasunari Suzuki, Yoshiaki Kawase, Yuya Masumura, Yuria Hiraga, Masahiro Nakadai, Jiabao Chen, Ken M. Nakanishi, Kosuke Mitarai, Ryosuke Imai, Shiro Tamiya, Takahiro Yamamoto, Tennin Yan, Toru Kawakubo, Yuya O. Nakagawa, Yohei Ibe, Youyuan Zhang, Hirotsugu Yamashita, Hikaru Yoshimura, Akihiro Hayashi, Keisuke Fujii 0004 |
Qulacs: a fast and versatile quantum circuit simulator for research purpose. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantum ![In: Quantum 5, pp. 559, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
31 | Tatsuro Ibe, Koichi Fujiwara, Toshihiro Hiraoka, Erika Abe, Toshitaka Yamakawa |
Development of Game-Like System Using Active Behavior Input for Wakefulness-Keeping Support in Driving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Intell. Veh. ![In: IEEE Trans. Intell. Veh. 6(2), pp. 323-332, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
31 | Ijeoma Ugochukwu-Ibe, Ebuka Ibeke |
E-Learning and Covid-19 - the Nigerian Experience: Challenges of Teaching Technical Courses in Tertiary Institutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTA-CSIT ![In: Proceedings of the 4th International Conference on Recent Trends and Applications in Computer Science and Information Technology, Tirana, Albania, May 21st - to - 22nd, 2021., pp. 46-51, 2021, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
31 | Emmanuel E. Okoro, Samuel E. Sanni, Amarachukwu A. Ibe, Paul Igbinedion, Babalola Oni |
Numerical Model-Software for Predicting Rock Formation Failure-Time Using Fracture Mechanics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAI ![In: Applied Informatics - Third International Conference, ICAI 2020, Ota, Nigeria, October 29-31, 2020, Proceedings, pp. 493-504, 2020, Springer, 978-3-030-61701-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Aiga Suzuki, Keiichi Ito, Takahide Ibe, Nobuyuki Otsu |
AdaFilter: Adaptive Filter Design with Local Image Basis Decomposition for Optimizing Image Recognition Preprocessing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR ![In: 25th International Conference on Pattern Recognition, ICPR 2020, Virtual Event / Milan, Italy, January 10-15, 2021, pp. 2118-2125, 2020, IEEE, 978-1-7281-8808-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Ebere Ibe, Joseph Aneke, Joy Abamuche |
The Differential Effects of Distance Learning and Presential Classroom Instructions on Performance of Male and Female Students of Science Education in Undergraduate Introductory Biology Course. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HELMeTO ![In: Bridges and Mediation in Higher Distance Education - Second International Workshop, HELMeTO 2020, Bari, BA, Italy, September 17-18, 2020, Revised Selected Papers, pp. 324-336, 2020, Springer, 978-3-030-67434-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Nwannediya Ada Ibe, Rebecca Howsmon, Lauren Penney, Nathaniel Granor, Leigh Ann DeLyser, Kevin Wang 0002 |
Reflections of a Diversity, Equity, and Inclusion Working Group based on Data from a National CS Education Program. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 49th ACM Technical Symposium on Computer Science Education, SIGCSE 2018, Baltimore, MD, USA, February 21-24, 2018, pp. 711-716, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Hicham Chaoui, Chinemerem Christopher Ibe-Ekeocha |
State of Charge and State of Health Estimation for Lithium Batteries Using Recurrent Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 66(10), pp. 8773-8783, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
31 | Victoria Samuel, Adewole Adewumi, Kosisochi Chuma-Ibe, Sanjay Misra, Nicholas A. Omoregbe |
Design and Implementation of a Clinical Pharmacy Management and Electronic Prescription System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICADIWT ![In: Recent Advances in Artificial Intelligence Research and Development - Proceedings of the 20th International Conference of the Catalan Association for Artificial Intelligence, Deltebre, Terres de l'Ebre, Spain, October 25-27, 2017, pp. 171-177, 2017, IOS Press, 978-1-61499-805-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
31 | Hicham Chaoui, Chinemerem Christopher Ibe-Ekeocha, Asmae El Mejdoubi, Amrane Oukaour, Hamid Gualous, Noshin Omar |
State of charge estimation of LiFePO4 batteries with temperature variations using neural networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIE ![In: 25th IEEE International Symposium on Industrial Electronics, ISIE 2016, Santa Clara, CA, USA, June 8-10, 2016, pp. 286-291, 2016, IEEE, 978-1-5090-0873-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Atsushi Shirane, Yiming Fang, Haowei Tan, Taiki Ibe, Hiroyuki Ito, Noboru Ishihara, Kazuya Masu |
RF-Powered Transceiver With an Energy- and Spectral-Efficient IF-Based Quadrature Backscattering Transmitter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Solid State Circuits ![In: IEEE J. Solid State Circuits 50(12), pp. 2975-2987, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
31 | Atsushi Shirane, Haowei Tan, Yiming Fang, Taiki Ibe, Hiroyuki Ito, Noboru Ishihara, Kazuya Masu |
13.8 A 5.8GHz RF-powered transceiver with a 113μW 32-QAM transmitter employing the IF-based quadrature backscattering technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSCC ![In: 2015 IEEE International Solid-State Circuits Conference, ISSCC 2015, Digest of Technical Papers, San Francisco, CA, USA, February 22-26, 2015, pp. 1-3, 2015, IEEE, 978-1-4799-6223-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
31 | Olubukola A. Isijola-Adakeja, Oliver C. Ibe |
M/M/1 Multiple Vacation Queueing Systems With Differentiated Vacations and Vacation Interruptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 2, pp. 1384-1395, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Axel Grewe, Marcel Ibe, Frank Nehuis, Andreas Rausch, Thomas Vietor |
Development of a Modeling Language to Connect Features, Functions and Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSER ![In: Proceedings of the Conference on Systems Engineering Research, CSER 2014, Redondo Beach, CA, USA, March 20-22, 2014, pp. 195-203, 2014, Elsevier. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Hiroyuki Ito, Yoshihiro Yoneda, Taiki Ibe, Taisuke Hamada, Noboru Ishihara, Kazuya Masu, Shoichi Masui, Youichi Momiyama |
An ultra-low-power RF transceiver with a 1.5-pJ/bit maximally-digital impulse-transmitter and an 89.5-μW super-regenerative RSSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
A-SSCC ![In: IEEE Asian Solid-State Circuits Conference, A-SSCC 2014, KaoHsiung, Taiwan, November 10-12, 2014, pp. 265-268, 2014, IEEE, 978-1-4799-4090-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Marcel Ibe |
Decomposition of Test Cases in Model-Based Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoDELS (Doctoral Symposium) ![In: Proceedings of the MODELS 2013 Doctoral Symposium co-located with the 16th International ACM/IEEE Conference on Model Driven Engineering Languages and Systems (MODELS 2013), Miami, USA, October 1, 2013., pp. 40-47, 2013, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
31 | Naoki Ibe, Gakuto Masuyama, Atsushi Yamashita, Hajime Asama |
Humanlike behavior model with probabilistic intention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGGRAPH Posters ![In: Special Interest Group on Computer Graphics and Interactive Techniques Conference, SIGGRAPH '13, Anaheim, CA, USA, July 21-25, 2013, Poster Proceedings, pp. 7, 2013, ACM, 978-1-4503-2342-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
31 | Ram G. Lakshmi Narayanan, Oliver C. Ibe |
A joint network for disaster recovery and search and rescue operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 56(14), pp. 3347-3373, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
31 | Eishi Ibe, Tadanobu Toba, Ken-ichi Shimbo, Hitoshi Taniguchi |
Fault-based reliable design-on-upper-bound of electronic systems for terrestrial radiation including muons, electrons, protons and low energy neutrons. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IOLTS ![In: 18th IEEE International On-Line Testing Symposium, IOLTS 2012, Sitges, Spain, June 27-29, 2012, pp. 49-54, 2012, IEEE Computer Society, 978-1-4673-2082-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
31 | Giovanni Saggio, Pietro Cavallo, A. Fabrizio, S. O. Ibe |
Gesture recognition through HITEG data glove to provide a new way of communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISABEL ![In: Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, ISABEL '11, Barcelona, Spain, October 26-29, 2011, pp. 13:1-13:5, 2011, ACM, 978-1-4503-0913-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Hirotoshi Ibe, Jiro Otsuka, Hajime Onda |
Study on Visual Servosystems for Optical Microscopes to Observe a Moving Microorganism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Autom. Technol. ![In: Int. J. Autom. Technol. 3(3), pp. 348-354, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Shuichiro Yamamoto, Komon Ibe, June M. Verner, Karl Cox, Steven J. Bleistein |
Actor Relationship Analysis for the i* Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEIS ![In: Enterprise Information Systems, 11th International Conference, ICEIS 2009, Milan, Italy, May 6-10, 2009. Proceedings, pp. 491-500, 2009, Springer, 978-3-642-01346-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
i* framework, Actor relationship analysis, Goal oriented requirements engineering |
31 | Atsushi Kurokawa, Hiroshi Fujita, Tetsuya Ibe |
Prevention in a Chip of EMI Noise Caused by X'tal Oscillator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(4), pp. 1077-1083, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Komon Ibe, Shinobu Saito, Shuichiro Yamamoto |
ARM: Actor Relationship Matrix. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCKBSE ![In: Knowledge-Based Software Engineering, Proceedings of the Eighth Joint Conference on Knowledge-Based Software Engineering, JCKBSE 2008, August 25-28, 2008, University of Piraeus, Piraeus, Greece, pp. 423-426, 2008, IOS Press, 978-1-58603-900-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Alex Raj, Oliver C. Ibe |
A survey of IP and multiprotocol label switching fast reroute schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 51(8), pp. 1882-1907, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Tazuko Tomioka, Hiroyuki Ibe, Masatoshi Suzuki, Jun Takehara, Kyousuke Dobashi, Hiroyuki Inamura |
Comparison of Techniques to Mitigate Wavelength Contention in a Photonic Network with Frequent Optical Path Setups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Commun. ![In: IEICE Trans. Commun. 89-B(4), pp. 1214-1230, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 397 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|