|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3849 occurrences of 1722 keywords
|
|
|
Results
Found 4942 publication records. Showing 4919 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
92 | Michael A. Bender, Haodong Hu, Bradley C. Kuszmaul |
Performance guarantees for B-trees with different-sized atomic keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-Ninth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2010, June 6-11, 2010, Indianapolis, Indiana, USA, pp. 305-316, 2010, ACM, 978-1-4503-0033-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
B-tree with different-sized keys, atomic keys, dynamic programming |
71 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DRMTICS ![In: Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers, pp. 258-276, 2005, Springer, 3-540-35998-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
time-limited services, cryptographic keys management, time-bound keys, one-way mappings, broadcast encryption, pseudorandom number generators |
55 | José A. Ramírez-Ruiz, Carlos F. Pfeiffer, Juan Arturo Nolazco-Flores |
Cryptographic Keys Generation Using FingerCodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IBERAMIA-SBIA ![In: Advances in Artificial Intelligence - IBERAMIA-SBIA 2006, 2nd International Joint Conference, 10th Ibero-American Conference on AI, 18th Brazilian AI Symposium, Ribeirão Preto, Brazil, October 23-27, 2006, Proceedings, pp. 178-187, 2006, Springer, 3-540-45462-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
FingerCode, Support Vector Machine, Biometrics, Cryptographic Keys |
54 | Donggang Liu, Qi Dong 0001 |
Detecting Misused Keys in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 26th IEEE International Performance Computing and Communications Conference, IPCCC 2007, April 11-13, 2007, New Orleans, Louisiana, USA, pp. 272-280, 2007, IEEE Computer Society, 1-4244-1138-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Shari Trewin, Helen Pain |
A Model of Keyboard Configuration Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International ACM Conference on Assistive Technologies ![In: Proceedings of the Third International ACM Conference on Assistive Technologies, ASSETS 1998, Marina del Rey, CA, USA, April 15-17, 1998, pp. 173-181, 1998, ACM, 1-58113-020-1. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Bounce Keys, Repeat Keys, Sticky Keys, keyboard configuration, empirical studies, user modelling, keyboards, motor disabilities |
49 | Kapali Viswanathan, Ashutosh Saxena |
Towards Logically and Physically Secure Public-Key Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002, pp. 122-134, 2002, Springer, 3-540-00263-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
critical keys, private keys, controlled use, PKI, backup |
48 | Amitanand S. Aiyer, Lorenzo Alvisi, Mohamed G. Gouda |
Key Grids: A Protocol Family for Assigning Symmetric Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Proceedings of the 14th IEEE International Conference on Network Protocols, ICNP 2006, November 12-15, 2006, Santa Barbara, California, USA, pp. 178-186, 2006, IEEE Computer Society, 1-4244-0593-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Sayyed Arash Ostadzadeh, M. Amir Moulavi, Zeinab Zeinalpour |
Massive Concurrent Deletion of Keys in B*-Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPAM ![In: Parallel Processing and Applied Mathematics, 6th International Conference, PPAM 2005, Poznan, Poland, September 11-14, 2005, Revised Selected Papers, pp. 83-91, 2005, Springer, 3-540-34141-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki |
1-out-of-n Signatures from a Variety of Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, pp. 415-432, 2002, Springer, 3-540-00171-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
46 | Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein Harn |
Location-aware key management scheme for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2004, Washington, DC, USA, October 25, 2004, pp. 29-42, 2004, ACM, 1-58113-972-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
sensor networks, key management, probabilistic key sharing |
45 | Peter Buneman, Susan B. Davidson, Wenfei Fan, Carmem S. Hara, Wang Chiew Tan |
Keys for XML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the Tenth International World Wide Web Conference, WWW 10, Hong Kong, China, May 1-5, 2001, pp. 201-210, 2001, ACM, 1-58113-348-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
relative keys, XML, keys |
45 | Georg Lausen |
Relational Databases in RDF: Keys and Foreign Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWDB-ODBIS ![In: Semantic Web, Ontologies and Databases, VLDB Workshop, SWDB-ODBIS 2007, Vienna, Austria, September 24, 2007, Revised Selected Papers, pp. 43-56, 2007, Springer, 978-3-540-70959-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
43 | Hongbo Li, Li Zhou |
Use Closure of Relevant Sets of Attributes to Efficiently Find Candidate Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (1) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 1: Artificial Intelligence, December 12-14, 2008, Wuhan, China, pp. 237-242, 2008, IEEE Computer Society, 978-0-7695-3336-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Gösta Grahne, Jianfei Zhu |
Discovering approximate keys in XML data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 2002 ACM CIKM International Conference on Information and Knowledge Management, McLean, VA, USA, November 4-9, 2002, pp. 453-460, 2002, ACM. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
43 | Peter Buneman, Susan B. Davidson, Wenfei Fan, Carmem S. Hara, Wang Chiew Tan |
Reasoning about Keys for XML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBPL ![In: Database Programming Languages, 8th International Workshop, DBPL 2001, Frascati, Italy, September 8-10, 2001, Revised Papers, pp. 133-148, 2001, Springer, 3-540-44080-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
43 | Eiji Okamoto, K. Nakamura |
Lifetimes of Keys in Cryptographic Key Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings, pp. 246-259, 1985, Springer, 3-540-16463-4. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
42 | Ehab S. Elmallah, Mohamed G. Gouda, Sandeep S. Kulkarni |
Logarithmic keying. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Auton. Adapt. Syst. ![In: ACM Trans. Auton. Adapt. Syst. 3(4), pp. 18:1-18:18, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
keying scheme, Secure communications, symmetric keys |
42 | Mohamed G. Gouda, Sandeep S. Kulkarni, Ehab S. Elmallah |
Logarithmic Keying of Communication Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSS ![In: Stabilization, Safety, and Security of Distributed Systems, 8th International Symposium, SSS 2006, Dallas, TX, USA, November 17-19, 2006, Proceedings, pp. 314-323, 2006, Springer, 978-3-540-49018-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
keying scheme, Secure communications, symmetric keys |
41 | Gianni Franceschini, Roberto Grossi |
No Sorting? Better Searching! ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 45th Symposium on Foundations of Computer Science (FOCS 2004), 17-19 October 2004, Rome, Italy, Proceedings, pp. 491-498, 2004, IEEE Computer Society, 0-7695-2228-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Benny Pinkas |
Efficient State Updates for Key Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Security and Privacy in Digital Rights Management, ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers, pp. 40-56, 2001, Springer, 3-540-43677-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
41 | Tok Wang Ling, Ge Yu 0001, Jiaheng Lu, Wei Wang 0011 (eds.) |
Proceedings of the Third International Workshop on Keyword Search on Structured Data, KEYS 2012, Scottsdale, AZ, USA, May 20, 2012 ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![ACM, 978-1-4503-1198-4 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Rajvardhan Patil, Zhengxin Chen |
STRUCT: incorporating contextual information for English query search on relational databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the Third International Workshop on Keyword Search on Structured Data, KEYS 2012, Scottsdale, AZ, USA, May 20, 2012, pp. 11-22, 2012, ACM, 978-1-4503-1198-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Jaime Iván López-Veyna, Víctor Jesús Sosa Sosa, Ivan López-Arévalo |
KESOSD: keyword search over structured data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the Third International Workshop on Keyword Search on Structured Data, KEYS 2012, Scottsdale, AZ, USA, May 20, 2012, pp. 23-31, 2012, ACM, 978-1-4503-1198-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Carlos Garcia-Alvarado, Carlos Ordonez 0001 |
Integrating and querying source code of programs working on a database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the Third International Workshop on Keyword Search on Structured Data, KEYS 2012, Scottsdale, AZ, USA, May 20, 2012, pp. 47-53, 2012, ACM, 978-1-4503-1198-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Sina Fakhraee, Farshad Fotouhi |
DBSemSXplorer: semantic-based keyword search system over relational databases for knowledge discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the Third International Workshop on Keyword Search on Structured Data, KEYS 2012, Scottsdale, AZ, USA, May 20, 2012, pp. 54-62, 2012, ACM, 978-1-4503-1198-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Cong Yu 0001 |
Towards a high quality and web-scalable table search engine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the Third International Workshop on Keyword Search on Structured Data, KEYS 2012, Scottsdale, AZ, USA, May 20, 2012, pp. 1, 2012, ACM, 978-1-4503-1198-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Hany Azzam, Sirvan Yahyaei, Marco Bonzanini, Thomas Roelleke |
A schema-driven approach for knowledge-oriented retrieval and query formulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the Third International Workshop on Keyword Search on Structured Data, KEYS 2012, Scottsdale, AZ, USA, May 20, 2012, pp. 39-46, 2012, ACM, 978-1-4503-1198-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Aggeliki Dimitriou, Dimitri Theodoratos |
Efficient keyword search on large tree structured datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the Third International Workshop on Keyword Search on Structured Data, KEYS 2012, Scottsdale, AZ, USA, May 20, 2012, pp. 63-74, 2012, ACM, 978-1-4503-1198-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Yufei Tao 0001 |
Theoretical results on keyword search and related problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the Third International Workshop on Keyword Search on Structured Data, KEYS 2012, Scottsdale, AZ, USA, May 20, 2012, pp. 2, 2012, ACM, 978-1-4503-1198-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Zhong Zeng, Zhifeng Bao, Tok Wang Ling, Mong-Li Lee |
iSearch: an interpretation based framework for keyword search in relational databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the Third International Workshop on Keyword Search on Structured Data, KEYS 2012, Scottsdale, AZ, USA, May 20, 2012, pp. 3-10, 2012, ACM, 978-1-4503-1198-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Yong Zeng, Zhifeng Bao, Tok Wang Ling, Luochen Li |
MALEX: a MAp-like exploration model on XML database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the Third International Workshop on Keyword Search on Structured Data, KEYS 2012, Scottsdale, AZ, USA, May 20, 2012, pp. 32-38, 2012, ACM, 978-1-4503-1198-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
41 | |
Proceedings of the Second International Workshop on Keyword Search on Structured Data, KEYS 2010, Indianapolis, Indiana, USA, June 6, 2010 ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![ACM, 978-1-4503-0187-9 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
41 | Truls Amundsen Bjørklund, Michaela Götz, Johannes Gehrke |
Search in social networks with access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the Second International Workshop on Keyword Search on Structured Data, KEYS 2010, Indianapolis, Indiana, USA, June 6, 2010, pp. 4, 2010, ACM, 978-1-4503-0187-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
41 | Carlos Garcia-Alvarado, Carlos Ordonez 0001 |
Keyword search across databases and documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the Second International Workshop on Keyword Search on Structured Data, KEYS 2010, Indianapolis, Indiana, USA, June 6, 2010, pp. 2, 2010, ACM, 978-1-4503-0187-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
41 | Carlos Garcia-Alvarado, Carlos Ordonez 0001, Zhibo Chen 0002 |
Query recommendation in digital libraries using OLAP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the Second International Workshop on Keyword Search on Structured Data, KEYS 2010, Indianapolis, Indiana, USA, June 6, 2010, pp. 6, 2010, ACM, 978-1-4503-0187-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
41 | Joel Coffman, Alfred C. Weaver |
Structured data retrieval using cover density ranking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the Second International Workshop on Keyword Search on Structured Data, KEYS 2010, Indianapolis, Indiana, USA, June 6, 2010, pp. 1, 2010, ACM, 978-1-4503-0187-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
41 | Ilaria Bartolini, Paolo Ciaccia |
Multi-dimensional keyword-based image annotation and search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the Second International Workshop on Keyword Search on Structured Data, KEYS 2010, Indianapolis, Indiana, USA, June 6, 2010, pp. 5, 2010, ACM, 978-1-4503-0187-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
41 | Hannah Bast, Marjan Celikik |
Efficient two-sided error-tolerant search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the Second International Workshop on Keyword Search on Structured Data, KEYS 2010, Indianapolis, Indiana, USA, June 6, 2010, pp. 3, 2010, ACM, 978-1-4503-0187-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
41 | M. Tamer Özsu, Yi Chen, Lei Chen 0002 (eds.) |
Proceedings of the First International Workshop on Keyword Search on Structured Data, KEYS 2009, Providence, Rhode Island, USA, June 28, 2009 ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![ACM, 978-1-60558-570-3 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Elena Demidova, Irina Oelze, Peter Fankhauser |
Do we mean the same?: disambiguation of extracted keyword queries for database search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the First International Workshop on Keyword Search on Structured Data, KEYS 2009, Providence, Rhode Island, USA, June 28, 2009, pp. 33-38, 2009, ACM, 978-1-60558-570-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
extracted keyword queries, keyword disambiguation |
41 | Xiaohui Yu 0001, Huxia Shi |
Query segmentation using conditional random fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the First International Workshop on Keyword Search on Structured Data, KEYS 2009, Providence, Rhode Island, USA, June 28, 2009, pp. 21-26, 2009, ACM, 978-1-60558-570-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Ken Q. Pu |
Keyword query cleaning using hidden Markov models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the First International Workshop on Keyword Search on Structured Data, KEYS 2009, Providence, Rhode Island, USA, June 28, 2009, pp. 27-32, 2009, ACM, 978-1-60558-570-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
query cleaning, segmentation, hidden Markov models, keyword search |
41 | Surajit Chaudhuri |
Structured data and web documents: better together? ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the First International Workshop on Keyword Search on Structured Data, KEYS 2009, Providence, Rhode Island, USA, June 28, 2009, pp. 1, 2009, ACM, 978-1-60558-570-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
World Wide Web (WWW) |
41 | Shiyuan Wang, Jun'ichi Tatemura, Arsany Sawires, Oliver Po, Divyakant Agrawal, Amr El Abbadi |
Hierarchical result views for keyword queries over relational databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the First International Workshop on Keyword Search on Structured Data, KEYS 2009, Providence, Rhode Island, USA, June 28, 2009, pp. 3-8, 2009, ACM, 978-1-60558-570-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Jiaheng Lu, Zhifeng Bao, Tok Wang Ling, Xiaofeng Meng 0001 |
XML keyword query refinement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the First International Workshop on Keyword Search on Structured Data, KEYS 2009, Providence, Rhode Island, USA, June 28, 2009, pp. 41-42, 2009, ACM, 978-1-60558-570-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
XML, keyword search, query refinement |
41 | Arash Termehchy, Marianne Winslett |
Generic and effective semi-structured keyword search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the First International Workshop on Keyword Search on Structured Data, KEYS 2009, Providence, Rhode Island, USA, June 28, 2009, pp. 45-46, 2009, ACM, 978-1-60558-570-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Tommy Ellkvist, Lena Strömbäck, Lauro Didier Lins, Juliana Freire |
A first study on strategies for generating workflow snippets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the First International Workshop on Keyword Search on Structured Data, KEYS 2009, Providence, Rhode Island, USA, June 28, 2009, pp. 15-20, 2009, ACM, 978-1-60558-570-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Rares Vernica, Chen Li 0001 |
Efficient top-k algorithms for fuzzy search in string collections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the First International Workshop on Keyword Search on Structured Data, KEYS 2009, Providence, Rhode Island, USA, June 28, 2009, pp. 9-14, 2009, ACM, 978-1-60558-570-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Carlos Garcia-Alvarado, Carlos Ordonez 0001, Zhibo Chen 0002 |
DBDOC: querying and browsing databases and interrelated documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the First International Workshop on Keyword Search on Structured Data, KEYS 2009, Providence, Rhode Island, USA, June 28, 2009, pp. 47-48, 2009, ACM, 978-1-60558-570-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Ron Avnur |
Building search applications with Marklogic Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the First International Workshop on Keyword Search on Structured Data, KEYS 2009, Providence, Rhode Island, USA, June 28, 2009, pp. 39-40, 2009, ACM, 978-1-60558-570-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
XML |
41 | Shady Elbassuoni, Maya Ramanath, Gerhard Weikum |
Language-model-based ranking in entity-relation graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the First International Workshop on Keyword Search on Structured Data, KEYS 2009, Providence, Rhode Island, USA, June 28, 2009, pp. 43-44, 2009, ACM, 978-1-60558-570-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Luis Gravano |
Querying text databases and the web: beyond traditional keyword search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KEYS ![In: Proceedings of the First International Workshop on Keyword Search on Structured Data, KEYS 2009, Providence, Rhode Island, USA, June 28, 2009, pp. 2, 2009, ACM, 978-1-60558-570-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Kiyoshi Yanagimoto, Takaaki Hasegawa, Makoto Takano |
A New Encoding Approach Realizing High Security and High Performance Based on Double Common Encryption Using Static Keys and Dynamic Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Management of Convergence Networks and Services, 9th Asia-Pacific Network Operations and Management Symposium, APNOMS 2006 Busan, Korea, September 27-29, 2006, Proceedings, pp. 293-301, 2006, Springer, 3-540-45776-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Common key encryption, Security, Network security, Database security |
39 | Subhamoy Maitra, Santanu Sarkar 0001 |
Revisiting Wiener's Attack - New Weak Keys in RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 228-243, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, RSA, Factorization, Weak Keys |
39 | Dhilak Damodaran, Rohit Singh 0004, Phu Dung Le |
Group Key Management in Wireless Networks Using Session Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Third International Conference on Information Technology: New Generations (ITNG 2006), 10-12 April 2006, Las Vegas, Nevada, USA, pp. 402-407, 2006, IEEE Computer Society, 0-7695-2497-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Forward and Backward Secrecy, Multicast, Wireless, Portable, Group Key, Session Keys |
39 | Michal Ren, Tanmoy Kanti Das, Jianying Zhou 0001 |
Diverging Keys in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 257-269, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Node Compromise Attack, Diverging Keys, Sensor Network Security |
39 | Aviel D. Rubin |
Extending NCP for protocols using public keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN '95), September 20-23, 1995, Las Vegas, Nevada, USA, pp. 94, 1995, IEEE Computer Society, 0-8186-7180-7. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
nonmonotonic cryptographic protocols, asymmetric keys, update function, principals, binding requirements, public key protocol, protocols, certificates, inference rules |
38 | Caimei Wang, Zhengmao Li |
Self-selecting Sub-secret Keys Sharing Scheme Based on Polynomials over Elliptic Curve. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 734-737, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Sven Hartmann, Sebastian Link |
Expressive, yet tractable XML keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: EDBT 2009, 12th International Conference on Extending Database Technology, Saint Petersburg, Russia, March 24-26, 2009, Proceedings, pp. 357-367, 2009, ACM, 978-1-60558-422-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Yi-Ru Liu, Wen-Guey Tzeng |
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings, pp. 380-396, 2008, Springer, 978-3-540-78439-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Broadcast encryption, collusion, polynomial interpolation |
38 | Orhun Kara, Cevat Manap |
A New Class of Weak Keys for Blowfish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers, pp. 167-180, 2007, Springer, 978-3-540-74617-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Blowfish, key dependent S-Box, self similarity analysis, cryptanalysis, fixed point, weak key, reflection attack |
38 | Sven Hartmann, Sebastian Link |
Unlocking Keys for XML Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDT ![In: Database Theory - ICDT 2007, 11th International Conference, Barcelona, Spain, January 10-12, 2007, Proceedings, pp. 104-118, 2007, Springer, 3-540-69269-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Aggelos Kiayias, Serdar Pehlivanoglu |
Pirate Evolution: How to Make the Most of Your Traitor Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 448-465, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Wai Kuan Yip, Alwyn Goh, David Ngo Chek Ling, Andrew Teoh Beng Jin |
Generation of Replaceable Cryptographic Keys from Dynamic Handwritten Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICB ![In: Advances in Biometrics, International Conference, ICB 2006, Hong Kong, China, January 5-7, 2006, Proceedings, pp. 509-515, 2006, Springer, 3-540-31111-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Joan Daemen, René Govaerts, Joos Vandewalle |
Weak Keys for IDEA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings, pp. 224-231, 1993, Springer, 3-540-57766-1. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
38 | Marc Girault |
Self-Certified Public Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, pp. 490-497, 1991, Springer, 3-540-54620-0. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
36 | Hector Ouilhet |
Google Sky Map: using your phone as an interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile HCI ![In: Proceedings of the 12th Conference on Human-Computer Interaction with Mobile Devices and Services, Mobile HCI 2010, Lisbon, Portugal, September 7-10, 2010, pp. 419-422, 2010, ACM, 978-1-60558-835-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Muhammad J. Bohio, Ali Miri |
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 19-21 May 2004, Fredericton, N.B., Canada, pp. 69-74, 2004, IEEE Computer Society, 0-7695-2096-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Ranjan Sinha |
Using Compact Tries for Cache-Efficient Sorting of Integers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEA ![In: Experimental and Efficient Algorithms, Third International Workshop, WEA 2004, Angra dos Reis, Brazil, May 25-28, 2004, Proceedings, pp. 513-528, 2004, Springer, 3-540-22067-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Marcelo Arenas, Wenfei Fan, Leonid Libkin |
On Verifying Consistency of XML Specifications. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-first ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 3-5, Madison, Wisconsin, USA, pp. 259-270, 2002, ACM, 1-58113-507-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
XML |
36 | Rolf Blom |
An Optimal Class of Symmetric Key Generation Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology: Proceedings of EUROCRYPT 84, A Workshop on the Theory and Application of of Cryptographic Techniques, Paris, France, April 9-11, 1984, Proceedings, pp. 335-338, 1984, Springer, 3-540-16076-0. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
35 | Martin Necaský, Irena Mlýnková |
Discovering XML keys and foreign keys in queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 632-638, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
XML schema, integrity constraints, DTD, schema inference |
35 | Luca Cabibbo |
On keys, foreign keys and nullable attributes in relational mapping systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: EDBT 2009, 12th International Conference on Extending Database Technology, Saint Petersburg, Russia, March 24-26, 2009, Proceedings, pp. 263-274, 2009, ACM, 978-1-60558-422-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Steve Mann 0001 |
"fl Huge UId streams": fountains that are keyboards with nozzle spray as keys that give rich tactile feedback and are more expressive and more fun than plastic keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 13th ACM International Conference on Multimedia, Singapore, November 6-11, 2005, pp. 181-190, 2005, ACM, 1-59593-044-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
FUNtain, computer mediated reality, direct user interfaces, frolic in the fountains, funits (units of fun), poseidophone, water-based immersive multimedia, immersive, fluid-user-interfaces |
34 | Waraporn Viyanon, Sanjay Kumar Madria |
XML-SIM: Structure and Content Semantic Similarity Detection Using Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems: OTM 2009, Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part II, pp. 1183-1200, 2009, Springer, 978-3-642-05150-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
XML Similarity Detection, clustering, matching, keys |
34 | David Toman 0001, Grant E. Weddell |
On Keys and Functional Dependencies as First-Class Citizens in Description Logics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Autom. Reason. ![In: J. Autom. Reason. 40(2-3), pp. 117-132, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Path-functional dependency, Relational keys, Description logics |
34 | Waraporn Viyanon, Sanjay Kumar Madria, Sourav S. Bhowmick |
XML Data Integration Based on Content and Structure Similarity Using Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (1) ![In: On the Move to Meaningful Internet Systems: OTM 2008, OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part I, pp. 484-493, 2008, Springer, 978-3-540-88870-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
clustering, XML, Similarity, keys |
34 | Heiko Stamer |
Completion Attacks and Weak Keys of Oleshchuk's Public Key Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings, pp. 209-220, 2005, Springer, 3-540-30805-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
completion attack, Knuth-Bendix completion, Cryptanalysis, weak keys, Church-Rosser property, string-rewriting systems |
34 | Tzu-Chiang Chiang, Yueh-Min Huang |
Group Keys and the Multicast Security in Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 6-9 October 2003, Kaohsiung, Taiwan, pp. 385-390, 2003, IEEE Computer Society, 0-7695-2018-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Prüfer, ad hoc networks, network security, multicast routing, group keys |
33 | Cleopas O. Angaye, Paul S. Fisher |
Application of FI sequences for authentication in a network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 45th Annual Southeast Regional Conference, 2007, Winston-Salem, North Carolina, USA, March 23-24, 2007, pp. 362-366, 2007, ACM, 978-1-59593-629-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
finite induction, private keys, security, public keys |
33 | Stefan Katzenbeisser 0001, Klaus Kursawe, Frederic Stumpf |
Revocation of TPM Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, pp. 120-132, 2009, Springer, 978-3-642-00586-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Christopher James Hargreaves, Howard Chivers |
Recovery of Encryption Keys from Memory Using a Linear Scan. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1369-1376, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Live Forensics, Encryption, Digital Evidence, Forensic Computing |
33 | Xianping Wu, Phu Dung Le, Balasubramaniam Srinivasan 0002 |
Dynamic Keys Based Sensitive Information System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 1895-1901, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Fang Fang, Robert L. Grossman, Xiangjun Liu |
An Algorithm for Assigning Unique Keys to Metabolic Pathways. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIBM ![In: Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2007, Silicon Valley, CA, USA, November 2-4, 2007, pp. 374-382, 2007, IEEE Computer Society, 0-7695-3031-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Gicheol Wang, Dongsun Park |
Utilizing Secure Three Hop Links to Agree Pairwise Keys in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, Third International Conference, UIC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 946-955, 2006, Springer, 3-540-38091-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | John Patrick McGregor, Ruby B. Lee |
Protecting cryptographic keys and computations via virtual secure coprocessing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGARCH Comput. Archit. News ![In: SIGARCH Comput. Archit. News 33(1), pp. 16-26, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle |
A Note on Weak Keys of PES, IDEA, and Some Extended Variants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 267-279, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Peeter Laud, Ricardo Corin |
Sound Computational Interpretation of Formal Encryption with Composed Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 55-66, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Heejin Park, Kunsoo Park, Yookun Cho |
Deleting Keys of B-trees in Parallel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 15-19 April 2002, Fort Lauderdale, FL, USA, CD-ROM/Abstracts Proceedings, 2002, IEEE Computer Society, 0-7695-1573-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
balanced search trees, dictionary operations, parallel algorithms, B-trees |
33 | Horst H. von Brand |
On the Distribution of Keys by Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCCC ![In: 22nd International Conference of the Chilean Computer Science Society (SCCC 2002), 6-8 November 2002, Copiapo, Chile, pp. 3-6, 2002, IEEE Computer Society, 0-7695-1867-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Wenfei Fan, Peter Schwenzer, Kun Wu |
Keys with Upward Wildcards for XML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 12th International Conference, DEXA 2001 Munich, Germany, September 3-5, 2001, Proceedings, pp. 657-667, 2001, Springer, 3-540-42527-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
33 | Adi Shamir, Nicko van Someren |
Playing "Hide and Seek" with Stored Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings, pp. 118-124, 1999, Springer, 3-540-66362-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
lunchtime attacks, authenticode, key hiding, Cryptanalysis, RSA |
33 | Raymond Fadous, John Forsyth |
Finding Candidate Keys for Relational Data Bases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 1975 ACM SIGMOD International Conference on Management of Data, San Jose, California, USA, May 14-16, 1975., pp. 203-210, 1975, ACM, 978-1-4503-7328-9. The full citation details ...](Pics/full.jpeg) |
1975 |
DBLP DOI BibTeX RDF |
|
32 | Moti Yung |
How to Guard the Guards Themselves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCT ![In: Fundamentals of Computation Theory, 17th International Symposium, FCT 2009, Wroclaw, Poland, September 2-4, 2009. Proceedings, pp. 1-2, 2009, Springer, 978-3-642-03408-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Key Evolving Cryptosystems, Proactive Cryptosystems, Public Key cryptography, Attacks, Leakage, Countermeasures, Physical Security, Threshold cryptosystems, Cryptographic Keys |
32 | Cristina Marinescu |
Discovering the Objectual Meaning of Foreign Key Constraints in Enterprise Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCRE ![In: 14th Working Conference on Reverse Engineering (WCRE 2007), 28-31 October 2007, Vancouver, BC, Canada, pp. 100-109, 2007, IEEE Computer Society, 0-7695-3034-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
foreign keys, RDBMS model, object-oriented model, enterprise applications, data reverse engineering |
32 | Jixue Liu, Millist W. Vincent, Chengfei Liu |
Local XML functional dependencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WIDM ![In: Fifth ACM CIKM International Workshop on Web Information and Data Management (WIDM 2003), New Orleans, Louisiana, USA, November 7-8, 2003, pp. 23-28, 2003, ACM. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
local functional dependency, relative keys, XML |
32 | Goce Jakimoski, Yvo Desmedt |
Related-Key Differential Cryptanalysis of 192-bit Key AES Variants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers, pp. 208-221, 2003, Springer, 3-540-21370-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
related keys, Markov ciphers, Advanced Encryption Standard, Differential cryptanalysis |
32 | Yingjiu Li, Vipin Swarup, Sushil Jajodia |
Constructing a virtual primary key for fingerprinting relational data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003, pp. 133-141, 2003, ACM, 1-58113-786-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
primary keys, robustness, relational databases, fingerprinting |
32 | Krisztián Tichler |
Extremal Theorems for Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FoIKS ![In: Foundations of Information and Knowledge Systems, Second International Symposium, FoIKS 2002 Salzau Castle, Germany, February 20-23, 2002, Proceedings, pp. 197-211, 2002, Springer, 3-540-43220-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
antikeys, labelled directed tree, extremal problems, cliques, keys, maximal independent sets, relational database model |
32 | Alex Biryukov, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle |
New Weak-Key Classes of IDEA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 315-326, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
IDEA cipher, weak keys, NESSIE, boomerang attack |
Displaying result #1 - #100 of 4919 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|