Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
86 | Hugo Krawczyk |
Blinding of Credit Card Numbers in the SET Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings, pp. 17-28, 1999, Springer, 3-540-66362-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
72 | Colin D. Walter |
Issues of Security with the Oswald-Aigner Exponentiation Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings, pp. 208-221, 2004, Springer, 3-540-20996-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Addition-subtraction chains, randomized exponentiation, elliptic curve cryptography, ECC, DPA, blinding, power analysis, smartcard, SPA, DEMA, point multiplication, SEMA |
64 | Jay Summet, Matthew Flagg, Tat-Jen Cham, James M. Rehg, Rahul Sukthankar |
Shadow Elimination and Blinding Light Suppression for Interactive Projected Displays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Vis. Comput. Graph. ![In: IEEE Trans. Vis. Comput. Graph. 13(3), pp. 508-517, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Shadow elimination, blinding light suppression, multiple projector display, projector calibration |
56 | Christoph Herbst, Marcel Medwed |
Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers, pp. 1-13, 2008, Springer, 978-3-642-00305-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Montgomery Ladder, Base Point Blinding, Smart Cards, RSA, Side- Channel Attacks, Power Analysis, Microcontroller, Template Attacks |
56 | Colin D. Walter |
Sliding Windows Succumbs to Big Mac Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, pp. 286-299, 2001, Springer, 3-540-42521-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Cryptography, smart card, RSA, differential power analysis, DPA, blinding, sliding windows, exponentiation |
55 | H. X. Yang, F. M. Chen, Z. M. Li, Z. Q. Wu |
Study on the Engineering Factors of Jamming Effect of the Laser Blinding and Computer Simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (4) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 4: Embedded Programming / Database Technology / Neural Networks and Applications / Other Applications, December 12-14, 2008, Wuhan, China, pp. 134-137, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Colin D. Walter |
Seeing through MIST Given a Small Fraction of an RSA Private Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 391-402, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
division chains, randomized exponentiation, Mist, randomary exponentiation, RSA, DPA, blinding, power analysis, smartcard, SPA, Addition chains, DEMA, side channel leakage, SEMA |
40 | Colin D. Walter |
MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings, pp. 53-66, 2002, Springer, 3-540-43224-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Mist exponentiation algorithm, division chains, smart card, DPA, blinding, power analysis, addition chains |
40 | Colin D. Walter |
Some Security Aspects of the M IST Randomized Exponentiation Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, pp. 276-290, 2002, Springer, 3-540-00409-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Randomary exponentiation, Mist exponentiation algorithm, division chains, DPA, blinding, power analysis, smartcard, addition chains, DEMA |
40 | Ron Steinfeld, Laurence Bull, Yuliang Zheng 0001 |
Content Extraction Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 285-304, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
fragment-extraction, content blinding, fact verification, content verification, digital signatures, provable security, Content-extraction |
40 | Stuart G. Stubblebine, Paul F. Syverson, David M. Goldschlag |
Unlinkable serial transactions: protocols and applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 2(4), pp. 354-389, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
anoymity, unlinkable serial transactions, cryptographic protocols, blinding |
40 | Feng Bao 0001, Robert H. Deng |
A New type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 1-11, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
e-commerce, traceability, blinding signatures, anonymity revocation |
39 | Lidong Zhou, Michael A. Marsh, Fred B. Schneider, Anna Redz |
Distributed Blinding for Distributed ElGamal Re-Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 25th International Conference on Distributed Computing Systems (ICDCS 2005), 6-10 June 2005, Columbus, OH, USA, pp. 815-824, 2005, IEEE Computer Society, 0-7695-2331-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Desney S. Tan, Randy Pausch |
Pre-emptive shadows: eliminating the blinding light from projectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended abstracts of the 2002 Conference on Human Factors in Computing Systems, CHI 2002, Minneapolis, Minnesota, USA, April 20-25, 2002, pp. 682-683, 2002, ACM, 1-58113-454-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
infrared tracking, projection, shadow, display, camera |
39 | Stefan Brands |
Restrictive Blinding of Secret-Key Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding, pp. 231-247, 1995, Springer, 3-540-59409-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
39 | Matthew K. Franklin, Moti Yung |
The Blinding of Weak Signatures (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings, pp. 67-76, 1994, Springer, 3-540-60176-7. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
25 | Richard T. Snodgrass |
Editorial: Single- versus double-blind reviewing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 32(1), pp. 1, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Anonymous citation, blinding efficacy, double-blind review, gender bias, single-blind review, status bias |
23 | Anastasiia Kropova, Igor Korkin |
ALPC Is In Danger: ALPChecker Detects Spoofing and Blinding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.01376, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Mario Stipcevic |
Enhancing the Security of the BB84 Quantum Key Distribution Protocol against Detector-Blinding Attacks via the Use of an Active Quantum Entropy Source in the Receiving Station. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 25(11), pp. 1518, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Bart Mennink, Charlotte Lefevre |
Generic Security of the Ascon Mode: On the Power of Key Blinding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 796, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
23 | Edward Eaton, Tancrède Lepoint, Christopher A. Wood |
Security Analysis of Signature Schemes with Key Blinding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 380, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
23 | Ivo Maffei, Andrew William Roscoe |
Optimally-Fair Exchange of Secrets via Delay Encryption and Commutative Blinding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FC (1) ![In: Financial Cryptography and Data Security - 27th International Conference, FC 2023, Bol, Brač, Croatia, May 1-5, 2023, Revised Selected Papers, Part I, pp. 94-111, 2023, Springer, 978-3-031-47753-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Genqing Bian, Yanru Fu, Bilin Shao, Fan Zhang |
Data Integrity Audit Based on Data Blinding for Cloud and Fog Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 39743-39751, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Ying Zhang, Minghui Ge, Xin Chen, Jiaqi Yao, Zhiming Mao |
Blinding HT: Hiding Hardware Trojan signals traced across multiple sequential levels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Circuits Devices Syst. ![In: IET Circuits Devices Syst. 16(1), pp. 105-115, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | K. A. Jeeva, V. S. Sheeba |
Privacy preserving reversible watermarking in the encrypted domain through self-blinding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Bioinform. Res. Appl. ![In: Int. J. Bioinform. Res. Appl. 18(1/2), pp. 49-67, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Denis Pogonin, Igor Korkin |
Microsoft Defender Will Be Defended: MemoryRanger Prevents Blinding Windows AV. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.02821, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Wen-Bo Liu, Yu-Shuo Lu, Yao Fu, Si-Cheng Huang, Ze-Jie Yin, Kun Jiang, Hua-Lei Yin, Zeng-Bing Chen |
Source-independent quantum random number generator against detector blinding attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2204.12156, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Xavier Salleras, Sergi Rovira, Vanesa Daza |
FORT: Right-proving and Attribute-blinding Self-sovereign Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2202.09136, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
23 | Yuanyuan Zhou 0006, Joop van de Pol, Yu Yu 0001, François-Xavier Standaert |
A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1163, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
23 | Minglang Dong |
Multi-Point HashDH OPRF using Multiplicative Blinding with Application to Private Set Intersection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1482, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
23 | Jiacheng Chen, Xia Sun, Xin Jin, Richard F. E. Sutcliffe |
Extracting drug-drug interactions from no-blinding texts using key semantic sentences and GHM loss. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Biomed. Informatics ![In: J. Biomed. Informatics 135, pp. 104192, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Felix Berlakovich, Matthias Neugschwandtner, Gergö Barany |
Look Ma, no constants: practical constant blinding in GraalVM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSec@EUROSYS ![In: EuroSec@EUROSYS 2022: Proceedings of the 15th European Workshop on Systems Security, Rennes, France, April 5-8, 2022, pp. 36-42, 2022, ACM, 978-1-4503-9255-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Yuanyuan Zhou 0006, Joop van de Pol, Yu Yu 0001, François-Xavier Standaert |
A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (4) ![In: Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part IV, pp. 508-536, 2022, Springer, 978-3-031-22971-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Rong Wang, Yaqi Wang, Weiquan Yu, Suiyu Zhang, Jiaojiao Wang, Dingguo Yu |
Recognition of Blinding Diseases from Ocular OCT Images Based on Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIRA (4) ![In: Intelligent Robotics and Applications - 15th International Conference, ICIRA 2022, Harbin, China, August 1-3, 2022, Proceedings, Part IV, pp. 181-190, 2022, Springer, 978-3-031-13840-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Bien-Cuong Nguyen, Cong-Kha Pham |
A Combined Blinding-Shuffling Online Template Attacks Countermeasure Based on Randomized Domain Montgomery Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE ![In: IEEE International Conference on Consumer Electronics, ICCE 2022, Las Vegas, NV, USA, January 7-9, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-4154-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Gilles Dutilh, Alexandra Sarafoglou, Eric-Jan Wagenmakers |
Flexible yet fair: blinding analyses in experimental psychology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Synth. ![In: Synth. 198(23), pp. 5745-5772, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Yajie Wang, Haoran Lv, Xiaohui Kuang, Gang Zhao, Yu-an Tan 0001, Quanxin Zhang, Jingjing Hu |
Towards a physical-world adversarial patch for blinding object detection models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 556, pp. 459-471, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Johannes Bjerva, Isabelle Augenstein |
Does Typological Blinding Impede Cross-Lingual Sharing? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2101.11888, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
23 | Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu |
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 273, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
23 | Edward Eaton, Douglas Stebila, Roy Stracovsky |
Post-Quantum Key-Blinding for Authentication in Anonymity Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 963, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
23 | Carlos Navas-Merlo, Juan Carlos García-Escartín |
Detector blinding attacks on counterfactual quantum key distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantum Inf. Process. ![In: Quantum Inf. Process. 20(6), pp. 196, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Margaux Dugardin, Werner Schindler, Sylvain Guilley |
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Math. Cryptol. ![In: J. Math. Cryptol. 15(1), pp. 408-433, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Johannes Bjerva, Isabelle Augenstein |
Does Typological Blinding Impede Cross-Lingual Sharing? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EACL ![In: Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume, EACL 2021, Online, April 19 - 23, 2021, pp. 480-486, 2021, Association for Computational Linguistics, 978-1-954085-02-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu |
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part II, pp. 380-409, 2021, Springer, 978-3-030-75247-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Edward Eaton, Douglas Stebila, Roy Stracovsky |
Post-quantum Key-Blinding for Authentication in Anonymity Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LATINCRYPT ![In: Progress in Cryptology - LATINCRYPT 2021 - 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6-8, 2021, Proceedings, pp. 67-87, 2021, Springer, 978-3-030-88237-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Abdullah Aljuffri, Cezar Reinbrecht, Said Hamdioui, Mottaqiallah Taouil |
Multi-Bit Blinding: A Countermeasure for RSA Against Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTS ![In: 39th IEEE VLSI Test Symposium, VTS 2021, San Diego, CA, USA, April 25-28, 2021, pp. 1-6, 2021, IEEE, 978-1-6654-1949-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Bin Yan 0004, Dong Wang 0004, Huchuan Lu, Xiaoyun Yang |
Cooling-Shrinking Attack: Blinding the Tracker with Imperceptible Noises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2003.09595, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
23 | Yanjun Pan, Yao Zheng, Ming Li 0003 |
ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2002.07355, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
23 | Ming-Deh A. Huang |
Algebraic blinding and cryptographic trilinear maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2002.07923, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
23 | Hsuan-Yin Lin, Po-Ning Chen, Yunghsiang S. Han, Pramod K. Varshney |
Minimum Byzantine Effort for Blinding Distributed Detection in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Signal Process. ![In: IEEE Trans. Signal Process. 68, pp. 647-661, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Hridoy Jyoti Mahanta, Ajoy Kumar Khan |
A secured modular exponentiation for RSA and CRT-RSA with dual blinding to resist power analysis attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 12(2/3), pp. 112-129, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Yanjun Pan, Yao Zheng, Ming Li 0003 |
ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: 39th IEEE Conference on Computer Communications, INFOCOM 2020, Toronto, ON, Canada, July 6-9, 2020, pp. 1927-1936, 2020, IEEE, 978-1-7281-6412-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Bin Yan 0004, Dong Wang 0004, Huchuan Lu, Xiaoyun Yang |
Cooling-Shrinking Attack: Blinding the Tracker With Imperceptible Noises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR ![In: 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2020, Seattle, WA, USA, June 13-19, 2020, pp. 987-996, 2020, Computer Vision Foundation / IEEE, 978-1-7281-7168-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
23 | Wunan Wan, Jun Chen, Shibing Zhang, Jinyue Xia |
A Cluster Correlation power analysis against double blinding exponentiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 48, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Thomas F. Stafford |
Blinding Me with Science; or, It's All Digital: The Story of The DATA BASE Taking its Review System Online. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Base ![In: Data Base 50(1), pp. 48-50, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Jennifer Anne Cooper, David Jenkinson, Sian Taylor-Phillips |
Blinding of the second reader in mammography screening: impact on behaviour and cancer detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Medical Imaging: Image Perception, Observer Performance, and Technology Assessment ![In: Medical Imaging 2019: Image Perception, Observer Performance, and Technology Assessment, San Diego, California, United States, 16-21 February 2019, pp. 109520T, 2019, SPIE. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Nan Hu, Kevin E. Dow, Alain Yee-Loong Chong, Ling Liu |
Double learning or double blinding: an investigation of vendor private information acquisition and consumer learning via online reviews. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 270(1-2), pp. 213-234, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Hui Wang, Wei Guo 0005, Jizeng Wei |
Practical chosen-message CPA attack on message blinding exponentiation algorithm and its efficient countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
World Wide Web ![In: World Wide Web 21(1), pp. 201-217, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Robert Fonod, Tal Shima |
Blinding Guidance Against Missiles Sharing Bearings-Only Measurements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Aerosp. Electron. Syst. ![In: IEEE Trans. Aerosp. Electron. Syst. 54(1), pp. 205-216, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Markku-Juhani O. Saarinen |
Arithmetic coding and blinding countermeasures for lattice signatures - Engineering a side-channel resistant post-quantum signature scheme with compact signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 8(1), pp. 71-84, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Monodeep Kar, Arvind Singh, Sanu Mathew, Santosh Ghosh, Anand Rajan, Vivek De, Raheem A. Beyah, Saibal Mukhopadhyay |
Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1802.09096, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
23 | Hao Qin 0005, Rupesh Kumar, Vadim Makarov, Romain Alléaume |
Homodyne-detector-blinding attack in continuous-variable quantum key distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1805.01620, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
23 | Chenyu Wang, Tao Huang 0015, Hongjun Wu 0001 |
On the Weakness of Constant Blinding PRNG in Flash Player. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings, pp. 107-123, 2018, Springer, 978-3-030-01949-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | HeeSeok Kim |
Thwarting side-channel analysis against RSA cryptosystems with additive blinding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 412, pp. 36-49, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Werner Schindler, Andreas Wiemers |
Generic power attacks on RSA with CRT and exponent blinding: new results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 7(4), pp. 255-272, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Karolina Wartolowska, David Beard, Andrew Carr |
Blinding in trials of interventional procedures is possible and worthwhile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
F1000Research ![In: F1000Research 6, pp. 1663-, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Blakeley B. McShane, David Gal |
Blinding Us to the Obvious? The Effect of Statistical Training on the Evaluation of Evidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Manag. Sci. ![In: Manag. Sci. 62(6), pp. 1707-1718, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Werner Schindler |
Exclusive exponent blinding is not enough to prevent any timing attack on RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 6(2), pp. 101-119, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Markku-Juhani O. Saarinen |
Arithmetic Coding and Blinding Countermeasures for Ring-LWE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 276, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
23 | Siddhant Deshmukh, Henry Carter, Grant Hernandez, Patrick Traynor, Kevin R. B. Butler |
Efficient and secure template blinding for biometric authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: 2016 IEEE Conference on Communications and Network Security, CNS 2016, Philadelphia, PA, USA, October 17-19, 2016, pp. 480-488, 2016, IEEE, 978-1-5090-3065-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Yao Zheng, Matthias Schulz 0001, Wenjing Lou, Y. Thomas Hou 0001, Matthias Hollick |
Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WISEC 2016, Darmstadt, Germany, July 18-22, 2016, pp. 21-30, 2016, ACM, 978-1-4503-4270-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Yao Zheng, Matthias Schulz 0001, Wenjing Lou, Yiwei Thomas Hou, Matthias Hollick |
Highly Efficient Known-Plaintext Attacks Against Orthogonal Blinding Based Physical Layer Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Wirel. Commun. Lett. ![In: IEEE Wirel. Commun. Lett. 4(1), pp. 34-37, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Melinda L. Korzaan, Nita G. Brooks |
The Binding and Blinding Influence of Project Commitment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Resour. Manag. J. ![In: Inf. Resour. Manag. J. 28(1), pp. 57-74, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Scott R. Fluhrer |
Scalar Blinding on Elliptic Curves based on Primes with Special Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 801, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
23 | Stelvio Cimato, Silvia Mella, Ruggero Susella |
New Results for Partial Key Exposure on RSA with Exponent Blinding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015., pp. 136-147, 2015, SciTePress, 978-989-758-117-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Alexander Meschtscherjakov, Hubert Scharfetter, Stefan Paul Kernjak, Nino Marcel Kratzer, Julian Stadon |
Adaptive digital sunshade: blocking the sun from blinding the driver. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AutomotiveUI (adjunct) ![In: Adjunct Proceedings of the 7th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, AutomotiveUI 2015, Nottingham, United Kingdom, September 1-3, 2015, pp. 78-83, 2015, ACM, 978-1-4503-3858-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Nadia El Mrabet, Emmanuel Fouotsa |
Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
C2SI ![In: Codes, Cryptology, and Information Security - First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger, pp. 259-273, 2015, Springer, 978-3-319-18680-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Stelvio Cimato, Silvia Mella, Ruggero Susella |
Partial Key Exposure Attacks on RSA with Exponent Blinding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICETE (Selected Papers) ![In: E-Business and Telecommunications - 12th International Joint Conference, ICETE 2015, Colmar, France, July 20-22, 2015, Revised Selected Papers, pp. 364-385, 2015, Springer, 978-3-319-30221-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Werner Schindler |
Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings, pp. 229-247, 2015, Springer, 978-3-662-48323-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Werner Schindler, Andreas Wiemers |
Power attacks in the presence of exponent blinding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 4(4), pp. 213-236, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | HeeSeok Kim, Dong-Guk Han, Seokhie Hong, JaeCheol Ha |
Message blinding method requiring no multiplicative inversion for RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Embed. Comput. Syst. ![In: ACM Trans. Embed. Comput. Syst. 13(4), pp. 80:1-80:10, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Werner Schindler |
Exponent Blinding May Not Prevent Timing Attacks on RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 869, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
23 | Karine Gandolfi-Villegas, Nabil Hamzi |
Dynamic Runtime Methods to Enhance Private Key Blinding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 447, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
23 | Rkia Aouinatou, Mostafa Belkasmi |
An efficient classification in IBE Provide with an improvement of BB2 to an efficient Commutative Blinding scheme ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1208.1217, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
23 | Sven Bauer |
Attacking Exponent Blinding in RSA without CRT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COSADE ![In: Constructive Side-Channel Analysis and Secure Design - Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings, pp. 82-88, 2012, Springer, 978-3-642-29911-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Raoni Rajão, Niall Hayes |
Boundary Objects and Blinding: the Contradictory Role of GIS in the Protection of the Amazon Rainforest. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECIS ![In: 20th European Conference on Information Systems, ECIS 2012, Barcelona, Spain, June 10-13, 2012, pp. 76, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
23 | Ognjen Arandjelovic |
Assessing Blinding in Clinical Trials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NIPS ![In: Advances in Neural Information Processing Systems 25: 26th Annual Conference on Neural Information Processing Systems 2012. Proceedings of a meeting held December 3-6, 2012, Lake Tahoe, Nevada, United States., pp. 530-538, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
23 | Gerrit Bleumer |
Blinding Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 150-152, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Tiziano Bianchi, Alessandro Piva, Mauro Barni |
Analysis of the security of linear blinding techniques from an information theoretical point of view. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2011, May 22-27, 2011, Prague Congress Center, Prague, Czech Republic, pp. 5852-5855, 2011, IEEE, 978-1-4577-0539-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Sjouke Mauw |
Selective Location Blinding Using Hash Chains (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 142-149, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Gabriele Lenzini, Sjouke Mauw, Jun Pang 0001 |
Selective Location Blinding Using Hash Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 132-141, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Werner Schindler, Kouichi Itoh |
Exponent Blinding Does Not Always Lift (Partial) Spa Resistance to Higher-Level Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings, pp. 73-90, 2011, 978-3-642-21553-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Yu Chen 0003, Song Luo, Jian-bin Hu, Zhong Chen 0001 |
A Novel Commutative Blinding Identity Based Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPS ![In: Foundations and Practice of Security - 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers, pp. 73-89, 2011, Springer, 978-3-642-27900-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Saeed Sedghi, Pieter H. Hartel, Willem Jonker, Svetla Nikova |
Privacy Enhanced Access Control by Means of Policy Blinding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings, pp. 108-122, 2011, Springer, 978-3-642-21030-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Marc F. Witteman, Jasper G. J. van Woudenberg, Federico Menarini |
Defeating RSA Multiply-Always and Message Blinding Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings, pp. 77-88, 2011, Springer, 978-3-642-19073-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Bing-feng Dong, Yunjie Qiu, Hongtao Lu |
A novel blinding digital watermark algorithm based on lab color space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIP ![In: Second International Conference on Digital Image Processing, ICDIP 2010, Singapore, Singapore, February 26-28, 2010, pp. 75460C, 2010, SPIE, 978-0-8194-7942-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
23 | Michael Tunstall, Marc Joye |
Coordinate Blinding over Large Prime Fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings, pp. 443-455, 2010, Springer, 978-3-642-15030-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
23 | Xavier Boyen |
Flexible IBE and Beyond in the Commutative-Blinding Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Identity-Based Cryptography ![In: Identity-Based Cryptography, pp. 65-82, 2009, IOS Press, 978-1-58603-947-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Greg Goth |
Faster than Smoke? More Blinding than Mirrors?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Distributed Syst. Online ![In: IEEE Distributed Syst. Online 8(7), 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Christoffer Rosenkilde Nielsen, Hanne Riis Nielson |
Static Analysis for Blinding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Nord. J. Comput. ![In: Nord. J. Comput. 13(1-2), pp. 98-116, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|