|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 33 occurrences of 18 keywords
|
|
|
Results
Found 50 publication records. Showing 46 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
120 | Kazumaro Aoki, Yu Sasaki |
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 70-89, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SHA-1, preimage, one-way, meet-in-the-middle, SHA-0 |
97 | Christophe De Cannière, Christian Rechberger |
Preimages for Reduced SHA-0 and SHA-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 179-202, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
directed random graph, cryptanalysis, hash function, SHA-1, preimages, SHA-0 |
89 | Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings, pp. 242-256, 2006, Springer, 3-540-38080-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
81 | Stéphane Manuel, Thomas Peyrin |
Collisions on SHA-0 in One Hour. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, pp. 16-35, 2008, Springer, 978-3-540-71038-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
hash functions, SHA-0, boomerang attack |
81 | Xiaoyun Wang 0001, Hongbo Yu, Yiqun Lisa Yin |
Efficient Collision Search Attacks on SHA-0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, pp. 1-16, 2005, Springer, 3-540-28114-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Collision search attacks, Hash functions, SHA-1, SHA-0 |
78 | Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby |
Collisions of SHA-0 and Reduced SHA-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, pp. 36-57, 2005, Springer, 3-540-25910-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
76 | Xiaoyun Wang 0001, Yiqun Lisa Yin, Hongbo Yu |
Finding Collisions in the Full SHA-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, pp. 17-36, 2005, Springer, 3-540-28114-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
collision search attacks, Hash functions, SHA-1, SHA-0 |
73 | Roshni Chatterjee, Moiz A. Saifee, Dipanwita Roy Chowdhury |
Modifications of SHA-0 to Prevent Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 277-289, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
73 | Eli Biham, Rafi Chen |
Near-Collisions of SHA-0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings, pp. 290-305, 2004, Springer, 3-540-22668-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
68 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Attacking Reduced Round SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pp. 130-143, 2008, 978-3-540-68913-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Florent Chabaud, Antoine Joux |
Differential Collisions in SHA-0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 56-71, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
50 | Yusuke Naito 0001, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta |
Improved Collision Search for SHA-0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 21-36, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Helena Handschuh |
SHA-0, SHA-1, SHA-2 (Secure Hash Algorithm). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 1190-1193, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
45 | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Impact of Rotations in SHA-1 and Related Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers, pp. 261-275, 2005, Springer, 3-540-33108-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Donghoon Chang, Kishan Chand Gupta, Mridul Nandi |
RC4-Hash: A New Hash Function Based on RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 80-94, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Hash Function, Collision Attack, RC4, Preimage Attack |
34 | Lars R. Knudsen |
SMASH - A Cryptographic Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers, pp. 228-242, 2005, Springer, 3-540-26541-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Eli Biham, Rafi Chen, Antoine Joux |
Cryptanalysis of SHA-0 and Reduced SHA-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 28(1), pp. 110-160, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Tim Polk, Lily Chen, Sean Turner, Paul E. Hoffman |
Security Considerations for the SHA-0 and SHA-1 Message-Digest Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6194, pp. 1-7, March 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
33 | Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 187, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
33 | Praveen Gauravaram, William Millan, Juanma González Nieto |
Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 391, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
23 | Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen |
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 13-30, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
collisions, MD5, key-recovery, HMAC, MD4, NMAC, differential path |
23 | Antoine Joux, Thomas Peyrin |
Hash Functions and the (Amplified) Boomerang Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 244-263, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
hash functions, SHA-1, boomerang attack |
23 | Scott Contini, Yiqun Lisa Yin |
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 37-53, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan |
Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 407-420, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Merkle-Damgård construction, MBCA, 3C, 3C+ |
23 | Yu Sasaki, Yusuke Naito 0001, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta |
How to Construct Sufficient Conditions for Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VIETCRYPT ![In: Progressin Cryptology - VIETCRYPT 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers, pp. 243-259, 2006, Springer, 3-540-68799-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Shuang Wu 0004, Dengguo Feng, Wenling Wu |
New Disturbance Vector for SHA-0 Collision. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. Eng. ![In: J. Inf. Sci. Eng. 26(6), pp. 2143-2157, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
16 | Yusuke Naito 0001, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta |
Message Modification for Step 21-23 on SHA-0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 16, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
16 | Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida |
Complexity of Differential Attacks on SHA-0 with Various Message Schedules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(12), pp. 3668-3671, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida |
Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2004, pp. 325, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
16 | Eli Biham, Rafi Chen |
Near-Collisions of SHA-0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2004, pp. 146, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
11 | Ahto Buldas, Sven Laur |
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, pp. 50-65, 2006, 3-540-34703-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Shang Gao 0010, Shijie Pan, Yuguang Yang 0001 |
Quantum algorithm for kernelized correlation filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Inf. Sci. ![In: Sci. China Inf. Sci. 66(2), February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Shang Gao 0010, Shijie Pan, Guang-Bao Xu, Yu-Guang Yang 0001 |
Quantum average neighborhood margin maximization for feature extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantum Inf. Process. ![In: Quantum Inf. Process. 22(3), pp. 152, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Yu-Guang Yang 0001, Hong-Mei Fu, Shang Gao 0010, Yi-Hua Zhou 0001, Wei-Min Shi |
Intrusion detection: A model based on the improved vision transformer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Emerg. Telecommun. Technol. ![In: Trans. Emerg. Telecommun. Technol. 33(9), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yu-Guang Yang 0001, Guo-Dong Cao, Rui-Chen Huang, Shang Gao 0010, Yi-Hua Zhou 0001, Wei-Min Shi, Guang-Bao Xu |
Multiparty anonymous quantum communication without multipartite entanglement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantum Inf. Process. ![In: Quantum Inf. Process. 21(6), pp. 196, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Manik Gupta, Bhisham Sharma, Akarsh Tripathi, Shashank Singh 0010, Abhishek Bhola, Rajani Singh, Ashutosh Dhar Dwivedi |
n-Player Stochastic Duel Game Model with Applied Deep Learning and Its Modern Implications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(6), pp. 2422, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yu-Guang Yang 0001, Xiao-Xiao Liu, Shang Gao 0010, Yihua Zhou 0001, Wei-Min Shi, Jian Li 0035, Dan Li 0018 |
Detector-device-independent quantum secret sharing based on hyper-encoding and single-photon Bell-state measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantum Eng. ![In: Quantum Eng. 3(3), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yu-Guang Yang 0001, Xiao-Xiao Liu, Shang Gao 0010, Xiu-Bo Chen, Dan Li 0018, Yi-Hua Zhou 0001, Wei-Min Shi |
A stronger participant attack on the measurement-device-independent protocol for deterministic quantum secret sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantum Inf. Process. ![In: Quantum Inf. Process. 20(7), pp. 1-12, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yu-Guang Yang 0001, Shang Gao 0010, Dan Li 0018, Yi-Hua Zhou 0001, Wei-Min Shi |
Three-party quantum secret sharing against collective noise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantum Inf. Process. ![In: Quantum Inf. Process. 18(7), pp. 215, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yu-Guang Yang 0001, Shang Gao 0010, Dan Li 0018, Yi-Hua Zhou 0001, Wei-Min Shi |
Two-party quantum key agreement over a collective noisy channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantum Inf. Process. ![In: Quantum Inf. Process. 18(3), pp. 74, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Shaohua Wang 0010 |
Intensive evaluation and development strategies of tourist attractions' land utilization - A case study of Gulou District in the City of Kaifeng. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Geoinformatics ![In: 21st International Conference on Geoinformatics, Geoinformatics 2013, Kaifeng, China, June 20-22, 2013, pp. 1-5, 2013, IEEE. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shaohua Wang 0010 |
The evaluation and research on Chinese ancient passes as tourist resources - A case study of the ancient passes in Shanxi Province. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Geoinformatics ![In: 21st International Conference on Geoinformatics, Geoinformatics 2013, Kaifeng, China, June 20-22, 2013, pp. 1-5, 2013, IEEE. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Judee K. Burgoon, Douglas P. Twitchell, Matthew L. Jensen, Thomas O. Meservy, Mark Adkins, John Kruse, Amit V. Deokar, Gabriel Tsechpenakis, Shan Lu 0010, Dimitris N. Metaxas, Jay F. Nunamaker Jr., Robert Younger |
Detecting Concealment of Intent in Transportation Screening: A Proof of Concept. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Intell. Transp. Syst. ![In: IEEE Trans. Intell. Transp. Syst. 10(1), pp. 103-112, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shan Lu 0010, Gabriel Tsechpenakis, Dimitris N. Metaxas, Matthew L. Jensen, John Kruse |
Blob Analysis of the Head and Hands: A Method for Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Judee K. Burgoon, Mark Adkins, John Kruse, Matthew L. Jensen, Thomas O. Meservy, Douglas P. Twitchell, Amit V. Deokar, Jay F. Nunamaker Jr., Shan Lu 0010, Gabriel Tsechpenakis, Dimitris N. Metaxas, Robert Younger |
An Approach for Intent Identification by Building on Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Shan Lu 0010, Dimitris N. Metaxas, Dimitris Samaras, John Oliensis |
Using Multiple Cues for Hand Tracking and Model Refinement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR (2) ![In: 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2003), 16-22 June 2003, Madison, WI, USA, pp. 443-450, 2003, IEEE Computer Society, 0-7695-1900-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #46 of 46 (100 per page; Change: )
|
|