The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase T-box (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1960-1974 (15) 1975-1982 (17) 1983-1985 (18) 1986-1987 (31) 1988 (21) 1989 (18) 1990 (31) 1991 (19) 1992 (30) 1993 (44) 1994 (44) 1995 (50) 1996 (59) 1997 (69) 1998 (102) 1999 (107) 2000 (167) 2001 (204) 2002 (225) 2003 (240) 2004 (323) 2005 (403) 2006 (458) 2007 (492) 2008 (507) 2009 (466) 2010 (287) 2011 (231) 2012 (250) 2013 (273) 2014 (311) 2015 (317) 2016 (354) 2017 (432) 2018 (539) 2019 (767) 2020 (856) 2021 (1014) 2022 (974) 2023 (1188) 2024 (295)
Publication types (Num. hits)
article(5507) book(12) data(4) incollection(64) inproceedings(6557) phdthesis(104)
Venues (Conferences, Journals, ...)
CoRR(1734) IACR Cryptol. ePrint Arch.(237) IEEE Access(152) GECCO (Companion)(122) NeurIPS(72) AAAI(67) GECCO(63) ICML(63) Sensors(59) CVPR(57) Multim. Tools Appl.(55) J. Glob. Optim.(53) FOCS(50) STOC(46) CRYPTO(45) TCC(44) More (+10 of total 3154)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 4266 occurrences of 2412 keywords

Results
Found 12285 publication records. Showing 12248 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
78Ran Raz, Amir Shpilka On the Power of Quantum Proofs. Search on Bibsonomy CCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
74Laurent Granvilliers, Frédéric Goualard, Frédéric Benhamou Box Consistency through Weak Box Consistency. Search on Bibsonomy ICTAI The full citation details ... 1999 DBLP  DOI  BibTeX  RDF box consistency, constraint satisfaction, constraint propagation, numerical constraint
73Jun Wu, Yong-Bin Kim, Minsu Choi Low-power side-channel attack-resistant asynchronous S-box design for AES cryptosystems. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF substitution box, substitution box (S-box), differential power/noise analysis, power/noise measurement, security, advanced encryption standard, advanced encryption standard, side-channel attacks (SCA), null convention logic
71Wil Michiels, Paul Gorissen Mechanism for software tamper resistance: an application of white-box cryptography. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software tamper resistance, white-box cryptography, software protection
66Sergei Kojarski, David H. Lorenz Comparing White-Box, Black-Box, and Glass-Box Composition of Aspect Mechanisms. Search on Bibsonomy ICSR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
62Md. Saidur Rahman 0001, Shin-Ichi Nakano, Takao Nishizeki Box-Rectangular Drawings of Plane Graphs. Search on Bibsonomy WG The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Rectangular Drawing, Box-drawing, Box-rectangular drawing, Algorithm, Graph, Graph Drawing
58Bogdan Korel Black-Box Understanding of COTS Components. Search on Bibsonomy IWPC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Black-Box understanding, Interface probing, Black-box testing, Automated test generation, COTS component, White-box testing
58Jianqiang Zhuo, Paul W. Oman, Ramkumar V. Pichai, Sujay Sahni Using Relative Complexity To Allocate Resources In Gray-Box Testing Of Object-Oriented Code. Search on Bibsonomy IEEE METRICS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF gray box testing, object oriented code, software testing costs, relative complexity metric, software quality assessments, industrial C++ software subsystem, rank order, minor test areas, relative test complexity, reliability, object-oriented programming, resource allocation, maintainability, black box, white box testing, testing engineers
57M. J. Box, R. M. Box Computation of the Variance Ratio Distribution. Search on Bibsonomy Comput. J. The full citation details ... 1969 DBLP  DOI  BibTeX  RDF
56Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank Black-box constructions for secure computation. Search on Bibsonomy STOC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF theory of cryptography, oblivious transfer, secure computation, black-box reductions
55Steven Halim, Roland H. C. Yap, Hoong Chuin Lau An Integrated White+Black Box Approach for Designing and Tuning Stochastic Local Search. Search on Bibsonomy CP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
52Stefan Tillich, Martin Feldhofer, Thomas Popp, Johann Großschädl Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box. Search on Bibsonomy J. Signal Process. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF substitution box (S-box), inversion in the finite field GF($28$), standard cell implementation, Advanced Encryption Standard (AES), power consumption, silicon area, critical path delay
51Alireza Entezari, Torsten Möller Extensions of the Zwart-Powell Box Spline for Volumetric Data Reconstruction on the Cartesian Lattice. Search on Bibsonomy IEEE Trans. Vis. Comput. Graph. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Volumetric data interpolation, reconstruction, box splines
51Seok-Yong Jin, Jong-Min Baek, Hong-Yeop Song Improved Rijndael-Like S-Box and Its Transform Domain Analysis. Search on Bibsonomy SETA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Avalanche transform, AES, S-box, Rijndael, Hadamard transform
50Aggelos Kiayias, Moti Yung Self Protecting Pirates and Black-Box Traitor Tracing. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
46Jean-Pierre Croisille A Hermitian Box-scheme for One-dimensional Elliptic Equations - Application to Problems with High Contrasts in the Ellipticity. Search on Bibsonomy Computing The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Box-scheme, porous media equation, Keller box-scheme, high-order compact scheme, hermitian scheme, Mehrstellenverfahren, finite volume method, collocation method, mixed method, elliptic problems
45Per Kristian Lehre, Carsten Witt Black-box search by unbiased variation. Search on Bibsonomy GECCO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF black-box complexity, runtime analysis
45Minho Kim, Jörg Peters 0001 Fast and stable evaluation of box-splines via the BB-form. Search on Bibsonomy Numer. Algorithms The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Exact evaluation, Rational coefficients, Bernstein-Bézier-form, Face-centered cubic lattice, Spline, Box-spline
45Renfei Liu, Keshab K. Parhi Fast composite field S-box architectures for advanced encryption standard. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF advanced encryption standard (aes), composite finite field, s-box, precomputation
45Svetla Nikova, Vincent Rijmen, Martin Schläffer Using Normal Bases for Compact Hardware Implementations of the AES S-Box. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES, hardware implementation, S-box, normal basis
45Ueli M. Maurer, Dominik Raub Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Black-box fields, computational algebra, homomorphic encryption, generic algorithms, one-way permutations
45Hongbing Fan, Jiping Liu, Yu-Liang Wu General Models and a Reduction Design Technique for FPGA Switch Box Designs. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF hyper-universal, FPGA, global routing, detailed routing, reduction technique, optimum design, switch box
45Adam L. Young, Moti Yung Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography
45Sami Beydeda, Volker Gruhn, Michael Stachorski A Graphical Class Representation for Integrated Black- and White-Box Testing. Search on Bibsonomy ICSM The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Class-level testing, integrated black- and white-box testing, selective regression testing, test suite reduction
45Ja-Young Sung, Aaron M. Levisohn, Ji-won Song, Ben Tomassetti, Ali Mazalek Shadow Box: an interactive learning toy for children. Search on Bibsonomy DIGITEL The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
45Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau Information and Control in Gray-Box Systems. Search on Bibsonomy SOSP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
43Achim D. Brucker, Burkhart Wolff Interactive Testing with HOL-TestGen. Search on Bibsonomy FATES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF symbolic test case generations, theorem proving, black box testing, white box testing, interactive testing
43Steven S. Seiden, Rob van Stee New Bounds for Multidimensional Packing. Search on Bibsonomy Algorithmica The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Box packing, Approximation algorithms, Online algorithms, Bin packing
42Wil Michiels Opportunities in White-Box Cryptography. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF black-box cryptography, gray-box cryptography, white-box cryptography, crypto corner, cryptography, security & privacy
42Hoijin Yoon, Byoungju Choi An Effective Testing Technique for Component Composition in EJBs. Search on Bibsonomy APSEC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Jaekyu Ha, Robert M. Haralick, Ihsin T. Phillips Document page decomposition by the bounding-box project. Search on Bibsonomy ICDAR The full citation details ... 1995 DBLP  DOI  BibTeX  RDF document page decomposition, bounding-box project, words extraction, textlines, text blocks, spatial configuration, black pixels, clustering problem, 2-dimensional discrete domain, document decomposition hierarchy, image segmentation, image segmentation, document image analysis, document image, bounding box
40Rafael Pass, Hoeteck Wee Black-Box Constructions of Two-Party Protocols from One-Way Functions. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF black-box constructions, zero-knowledge arguments, trapdoor commitments, parallel coin-tossing, non-malleable commitments, secure two-party computation
40Huafei Zhu Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Black-box constructions, defensible adversary, malicious adversary, oblivious transfer protocols
40Jun Furukawa 0001, Nuttapong Attrapadung Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys. Search on Bibsonomy ICALP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fully Collusion Resistant, Revocation, Traitor Tracing, Black-Box
40Debojyoti Bhattacharya, Nitin Bansal, Amitava Banerjee, Dipanwita Roy Chowdhury A Near Optimal S-Box Design. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cellular Automata, Algebraic Attack, S-box, Power Attack
40Tatsuyuki Matsushita, Hideki Imai Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hierarchical key assignment, black-box tracing, reduced ciphertext size
40Amrit Tiwana Beyond the Black Box: Knowledge Overlaps in Software Outsourcing. Search on Bibsonomy IEEE Softw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF congruence framework, software project risk, black-box development, knowledge management, software development, outsourcing
40Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi Cryptanalysis of a White Box AES Implementation. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF white box, implementation, block ciphers, AES, tamper resistance, software piracy
40Tatsuyuki Matsushita, Hideki Imai A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Public-key traitor tracing, Black-box tracing, Self-defensive pirates
40Elena Montañés, José Ramón Quevedo, Maria M. Prieto, César O. Menéndez Forecasting Time Series Combining Machine Learning and Box-Jenkins Time Series. Search on Bibsonomy IBERAMIA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Box-Jenkins Time Series, Continuous Machine Learning Systems, Neural Networks, Forecasting
40Tatsuyuki Matsushita A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Flexible revocation, Black-box tracing, Traitor tracing
40Sami Beydeda, Volker Gruhn Integrating White- and Black-Box Techniques for Class-Level Regression Testing. Search on Bibsonomy COMPSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Integrated White- and Black-Box Testing, Class-level Testing, Regression Testing
39Hiroshi Kudou, Shunn-ichiro Nakayama, Atsushi Watanabe, Tomoyuki Nagase, Yoshio Yoshioka A Reconfigurable-Permutation Algorithm for M_S-Box. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
39Herman J. Haverkort, Freek van Walderveen Locality and Bounding-Box Quality of Two-Dimensional Space-Filling Curves. Search on Bibsonomy ESA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Babak Zakeri, Mahmoud Salmasizadeh, Amir Moradi 0001, Mahmoud Tabandeh, Mohammad T. Manzuri Shalmani Compact and Secure Design of Masked AES S-Box. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Composite field arithmetic, AES, Side-Channel Attack, Masking
39Sumio Morioka, Akashi Satoh A 10-Gbps full-AES crypto design with a twisted BDD S-Box architecture. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
39Sumio Morioka, Akashi Satoh A 10 Gbps Full-AES Crypto Design with a Twisted-BDD S-Box Architecture. Search on Bibsonomy ICCD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
39Mehran Mozaffari Kermani, Arash Reyhani-Masoleh A Low-Power High-Performance Concurrent Fault Detection Approach for the Composite Field S-Box and Inverse S-Box. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2011 DBLP  DOI  BibTeX  RDF inverse S-box, fault detection, Advanced encryption standard, S-box, composite fields
38Yehuda Lindell Lower Bounds and Impossibility Results for Concurrent Self Composition. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Self and general composition, Non-black-box and black-box simulation, Lower bounds, Secure computation, Protocol composition, Impossibility results
38Susan S. Chen, James M. Keller, Richard M. Crownover On the Calculation of Fractal Features from Images. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF fractal feature calculation, box size lower bound, image characteristics, fractal surfaces, mass density function, box counting, feature extraction, parameter estimation, images, fractals, heuristic approach, fractal geometry
37Hongbing Fan, Yu-Liang Wu, Ray Chak-Chung Cheung, Jiping Liu Decomposition Design Theory and Methodology for Arbitrary-Shaped Switch Boxes. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF reconfigurable interconnection network, switch block, hyperuniversal, FPGA, universal, switch box
37Charles R. Tolle, Timothy R. McJunkin, David J. Gorisch Suboptimal Minimum Cluster Volume Cover-Based Method for Measuring Fractal Dimension. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF suboptimal cover, box counting, clustering, texture analysis, Fuzzy-C means, Fractal dimension
36Aasia Riasat, Syed Sajjad Rizvi, Farheen Zehara, Faraz Arain The Role of System Dynamics in Learning Environments. Search on Bibsonomy Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Aggelos Kiayias, Moti Yung Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2008 DBLP  DOI  BibTeX  RDF error correcting codes, traitor tracing
36Amos Beimel, Tal Malkin A Quantitative Approach to Reductions in Secure Computation. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Huo Yan Chen, T. H. Tse, F. T. Chan, Tsong Yueh Chen In Black and White: An Integrated Approach to Class-Level Testing of Object-Oriented Programs. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF software-testing methodologies, object-oriented programming, abstract data types, algebraic specification, observational equivalence
36Luiz Velho 0001 Semi-Regular 4-8 Refinement and Box Spline Surfaces. Search on Bibsonomy SIBGRAPI The full citation details ... 2000 DBLP  DOI  BibTeX  RDF semi-regular 4-8 refinement, box spline surfaces, mesh refinement method, semiregular 3-direction hierarchical structure, control meshes, 2D manifolds, conforming variable-resolution mesh extraction, spatially varying adaptation functions, generalized four direction box spline surfaces, subdivision surfaces, splines (mathematics), smoothing method, arbitrary topology, subdivision scheme
35Ian T. Foster Computing outside the box. Search on Bibsonomy ICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF computing outside the box
35David Canright, Lejla Batina A Very Compact "Perfectly Masked" S-Box for AES. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF composite Galois field, AES, DPA, S-box, masking
35Gerald Kotonya An Architecture-Centric Development Environment for Black-Box Component-Based Systems. Search on Bibsonomy ECSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF black-box components, architecture, Development environment
35Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang On Secure Multi-party Computation in Black-Box Groups. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Planar Graph, Graph Colouring, Black-Box, Multi-Party Computation, Non-Abelian Group
35Wayne Eberly, Mark Giesbrecht, Pascal Giorgi, Arne Storjohann, Gilles Villard Faster inversion and other black box matrix computations using efficient block projections. Search on Bibsonomy ISSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF black box linear algebra, linear system solving, sparse integer matrix, structured integer matrix
35Kwang Ik Seo, Eun Man Choi Comparison of Five Black-box Testing Methods for Object-Oriented Software. Search on Bibsonomy SERA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Comparison of testing methods, Performance of testing methods, Specification-based test, Black-box test
35Conor Nugent, Padraig Cunningham A Case-Based Explanation System for Black-Box Systems. Search on Bibsonomy Artif. Intell. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF black-box systems, case-based reasoning, explanation
35Aurelian Bejancu, Malcolm A. Sabin Maximal approximation order for a box-spline semi-cardinal interpolation scheme on the three-direction mesh. Search on Bibsonomy Adv. Comput. Math. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF not-a-knot, semi-cardinal, Wiener-Hopf, boundary conditions, difference equations, multivariable interpolation, approximation order, box splines
35Mark Last, Shay Eyal, Abraham Kandel Effective Black-Box Testing with Genetic Algorithms. Search on Bibsonomy Haifa Verification Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Genetic algorithms, Fuzzy logic, Computational intelligence, Black-box testing, Test prioritization
35Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF inversion in GF(2n), smart card implementation, AES, S-box, composite fields
35Hongbing Fan, Yu-Liang Wu, Chak-Chung Cheung, Jiping Liu On Optimal Irregular Switch Box Designs. Search on Bibsonomy FPL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF FPGA, Configurable computing, on-chip network, switch box
35Shoichi Hirose Provably Secure Double-Block-Length Hash Functions in a Black-Box Model. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF block cipher, black-box model, double-block-length hash function
35Aman Shaikh, Albert G. Greenberg Experience in black-box OSPF measurement. Search on Bibsonomy Internet Measurement Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF SPF calculation, black-box measurements, routing, OSPF
35Patrick J. Schroeder, Bogdan Korel Black-box test reduction using input-output analysis. Search on Bibsonomy ISSTA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF input-output analysis, test reduction, black-box testing, combinatorial testing
35Zhonglin He, Geoff Staples, Margaret Ross 0001, Ian Court Software Black Box Mechanism: A Pragmatic Method for Software Crash Diagnosis and Usage Maintenance Testing. Search on Bibsonomy ICSM The full citation details ... 1997 DBLP  DOI  BibTeX  RDF software maintenance testing, software usage testing, software crash diagnosis, software black box mechanism
34Mehran Mozaffari Kermani, Arash Reyhani-Masoleh A low-cost S-box for the Advanced Encryption Standard using normal basis. Search on Bibsonomy EIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Neil A. Dodgson, Ursula H. Augsdörfer, Thomas J. Cashman 0001, Malcolm A. Sabin Deriving Box-Spline Subdivision Schemes. Search on Bibsonomy IMA Conference on the Mathematics of Surfaces The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Iftach Haitner Semi-honest to Malicious Oblivious Transfer - The Black-Box Way. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Yan He, Dmitri D. Perkins, Bin Huang S-Box: A scalability analysis framework for ad hoc routing protocols. Search on Bibsonomy ISCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Xuxian Jiang, Xinyuan Wang 0005, Dongyan Xu Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF virtual machines, malware detection, rootkits
34Atsushi Watanabe, Hiroshi Haruki, Shun Shimotomai, Takeshi Saito, Tomoyuki Nagase, Yoshio Yoshioka, Yoshiei Hasegawa A New Mutable Nonlinear Transformation Algorithm for S-box. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Xin Han, Kazuo Iwama, Rolf Klein, Andrzej Lingas Approximating the Maximum Independent Set and Minimum Vertex Coloring on Box Graphs. Search on Bibsonomy AAIM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Boaz Barak Non-black-box Techniques in Cryptography. Search on Bibsonomy CSR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Akihiro Mikoda, Shuichi Inokuchi, Yoshihiro Mizoguchi, Mitsuhiko Fujio The Number of Orbits of Periodic Box-Ball Systems. Search on Bibsonomy UC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Mehran Mozaffari Kermani, Arash Reyhani-Masoleh Parity-Based Fault Detection Architecture of S-box for Advanced Encryption Standard. Search on Bibsonomy DFT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Wei Shi, Wanlei Zhou 0001 Frequency Distribution of TATA Box and Extension Sequences on Human Promoters. Search on Bibsonomy IMSCCS (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Sandeep Uttamchandani, Xiaoxin Yin, John Palmer, Gul A. Agha Monitormining: creating domain knowledge for system automation using a gray-box approach. Search on Bibsonomy Integrated Network Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Zhanfei Zhou Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Frank Lammermann, Stefan Wappler Benefits of software measures for evolutionary white-box testing. Search on Bibsonomy GECCO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF metric, software measurement, evolutionary testing, automated test case generation
34Jingmei Liu, Baodian Wei, Xiangguo Cheng, Xinmei Wang An AES S-Box to Increase Complexity and Cryptographic Analysis. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34David Canright A Very Compact S-Box for AES. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Runjie Shen, Wen He, Guangqing Wang, Zichen Chen Simulation and experiment on temperature control of temperature box in centrifugal field. Search on Bibsonomy ICARCV The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Pankaj K. Agarwal, Mark de Berg, Joachim Gudmundsson, Mikael Hammar, Herman J. Haverkort Box-Trees and R-Trees with Near-Optimal Query Time. Search on Bibsonomy Discret. Comput. Geom. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
34Ronald Cramer, Serge Fehr Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
34Pankaj K. Agarwal, Mark de Berg, Joachim Gudmundsson, Mikael Hammar, Herman J. Haverkort Box-trees and R-trees with near-optimal query time. Search on Bibsonomy SCG The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
34B. David Saunders Black box methods for least squares problems. Search on Bibsonomy ISSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
34Martin Hesketh, Maciej Koutny An Axiomatisation of Duplication Equivalence in the Petri Box Calculus. Search on Bibsonomy ICATPN The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Net-based algebra, analysis of structure of nets, verification using nets, equivalence and axiomatisation
33Arvind S. Krishna, Balachandran Natarajan, Aniruddha S. Gokhale, Douglas C. Schmidt, Nanbor Wang, Gautam H. Thaker CCMPerf: A Benchmarking Tool for CORBA Component Model Implementations. Search on Bibsonomy Real Time Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF CCMPerf, white-box metrics, black-box metrics, benchmarking, CCM
33Arvind S. Krishna, Balachandran Natarajan, Aniruddha S. Gokhale, Douglas C. Schmidt, Nanbor Wang, Gautam H. Thaker CCMPerf: A Benchmarking Tool for CORBA Component Model Implementations. Search on Bibsonomy IEEE Real-Time and Embedded Technology and Applications Symposium The full citation details ... 2004 DBLP  DOI  BibTeX  RDF CCMPerf, white-box metrics, black-box metrics, Benchmarking, CCM
33Stéphane Ducasse, Thomas Hofmann, Oscar Nierstrasz OpenSpaces: An Object-Oriented Framework for Reconfigurable Coordination Spaces. Search on Bibsonomy COORDINATION The full citation details ... 2000 DBLP  DOI  BibTeX  RDF White Box Reuse, Black Box Reuse, Frameworks, Dynamic Reconfiguration, Object-Oriented Languages
33John Esch Contexts and Concepts, Abstraction Duals. Search on Bibsonomy ICCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF White Box, Relation Instances, Contexts, Aggregations, Contraction, Concepts, Conceptual Graphs, Expansion, Black Box, Individuals
33Barry W. Boehm, Philip N. Papaccio Understanding and Controlling Software Costs. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF glass-box, cost distribution, integrated software productivity, software productivity opportunity tree, software budgets, end-user system objectives, software engineering, software productivity, value chain, DP management, black-box, quality improvement, software costs, influence-function
32Yoni De Mulder White-Box Cryptography: Analysis of White-Box AES Implementations (White-Box Cryptografie: Analyse van White-Box AES implementaties). (PDF / PS) Search on Bibsonomy 2014   RDF
Displaying result #1 - #100 of 12248 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license