Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
76 | Ivan Damgård, Lars R. Knudsen |
The Breaking of the AR Hash Function. |
EUROCRYPT |
1993 |
DBLP DOI BibTeX RDF |
|
64 | Lars R. Knudsen, Bart Preneel |
Hash Functions Based on Block Ciphers and Quaternary Codes. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
61 | Jens Groth |
A Verifiable Secret Shuffle of Homomorphic Encryptions. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
51 | Xiaorui Sun, Xuejia Lai |
Improved Integral Attacks on MISTY1. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
51 | Duo Lei, Chao Li, Keqin Feng |
New Observation on Camellia. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Adam L. Young, Moti Yung |
Questionable Encryption and Its Applications. |
Mycrypt |
2005 |
DBLP DOI BibTeX RDF |
|
51 | John Kelsey, Bruce Schneier |
Key-Schedule Cryptanalysis of DEAL. |
Selected Areas in Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
48 | Huafei Zhu, Feng Bao 0001 |
Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
non-committing encryption, oblivious Naor-Pinkas cryptosystem, Naor-Pinkas randomizer, adaptive security |
45 | Yuan Chen 0008, Qingkuan Dong |
RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions. |
Secur. Commun. Networks |
2014 |
DBLP DOI BibTeX RDF |
|
45 | Seiko Arita, Koji Tsurudome |
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
threshold public-key encryption schemes, tag-based encryption schemes, the decisional bilinear Diffie-Hellman assumption, the decisional linear assumption |
42 | R. Elijah Blessing, V. Rhymend Uthariaraj |
Design of Secure Multicast Models for Mobile Services. |
SOFSEM |
2004 |
DBLP DOI BibTeX RDF |
Basic simple model, Enhanced LeaSel, security, mobile, complexity, Multicast, encryptions, key distribution |
42 | R. Elijah Blessing, V. Rhymend Uthariaraj |
Evaluation and Analysis of Computational Complexity for Secure Multicast Models. |
ICCSA (2) |
2003 |
DBLP DOI BibTeX RDF |
LeaSel, security, computational complexity, scalability, Multicast, encryptions, key distribution |
38 | Meiqin Wang, Jorge Nakahara Jr., Yue Sun |
Cryptanalysis of the Full MMB Block Cipher. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
MMB block cipher, square cryptanalysis, differential cryptanalysis, modular multiplication, linear cryptanalysis |
38 | Mridul Nandi |
Fast and Secure CBC-Type MAC Algorithms. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
OMAC, padding rule, prf-security, CBC-MAC |
38 | Bing Sun 0001, Longjiang Qu, Chao Li 0002 |
New Cryptanalysis of Block Ciphers with Low Algebraic Degree. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
interpolation attack, integral attack, block cipher, Feistel cipher |
38 | X. Brian Zhang, Simon S. Lam, Dong-Young Lee, Yang Richard Yang |
Protocol design for scalable and reliable group rekeying. |
IEEE/ACM Trans. Netw. |
2003 |
DBLP DOI BibTeX RDF |
adaptive FEC, proactive FEC, reliable multicast, group key management, secure multicast |
38 | Charanjit S. Jutla |
Encryption Modes with Almost Free Message Integrity. |
EUROCRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
35 | Sebastiaan de Hoogh, Berry Schoenmakers, Boris Skoric, José Villegas |
Verifiable Rotation of Homomorphic Encryptions. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Akihiro Yamamura |
Homomorphic Encryptions of Sums of Groups. |
AAECC |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Rui Xue 0001, Dengguo Feng |
Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Ritesh Mukherjee, J. William Atwood |
Proxy Encryptions for Secure Multicast Key Management. |
LCN |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Jonathan Katz, Moti Yung |
Characterization of Security Notions for Probabilistic Private-Key Encryption. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
Private-key encryptions, Definitions |
29 | Ran Canetti, Rosario Gennaro |
Incoercible Multiparty Computation (extended abstract). |
FOCS |
1996 |
DBLP DOI BibTeX RDF |
incoercible multiparty computation, secure multiparty protocols, coercion resilience, computationally bounded adversaries, public communication channels, adaptive security problem, deniable encryptions, protocols, trapdoor permutations |
25 | Mikhail J. Atallah, Keith B. Frikken |
Securely outsourcing linear algebra computations. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
computational outsourcing, privacy, cryptographic protocols |
25 | Yongzhuang Wei, YuPu Hu |
New related-key rectangle attacks on reduced AES-192 and AES-256. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
block cipher, Advanced Encryption Standard, time complexity, related-key rectangle attack |
25 | Xiaorui Sun, Xuejia Lai |
The Key-Dependent Attack on Block Ciphers. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Key-Dependent Attack, Block Cipher, IDEA |
25 | Julia Borghoff, Lars R. Knudsen, Gregor Leander, Krystian Matusiewicz |
Cryptanalysis of C2. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
S-box recovery, Cryptomeria, block cipher, C2, key recovery, boomerang attack |
25 | Dinei A. F. Florêncio, Cormac Herley |
One-Time Password Access to Any Server without Changing the Server. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
replay resistance, authentication, Passwords, one-time passwords |
25 | Dennis Hofheinz, Dominique Unruh |
Towards Key-Dependent Message Security in the Standard Model. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Key-dependent message security, symmetric encryption schemes, security proofs |
25 | Michael Gorski, Stefan Lucks |
New Related-Key Boomerang Attacks on AES. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
related-key boomerang attack, block ciphers, AES, differential cryptanalysis |
25 | Jie Chen 0055, YuPu Hu, Yueyu Zhang |
Impossible differential cryptanalysis of Advanced Encryption Standard. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
cryptanalysis, block cipher, advanced encryption standard, impossible differential cryptanalysis |
25 | Andrey Bogdanov |
Linear Slide Attacks on the KeeLoq Block Cipher. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
KeeLoq, hopping codes, rolling codes, identify friend-or-foe, cryptanalysis, authentication protocols, linear cryptanalysis, key generation, slide attacks |
25 | Eli Biham, Orr Dunkelman, Nathan Keller |
A Simple Related-Key Attack on the Full SHACAL-1. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Michael Hutter, Stefan Mangard, Martin Feldhofer |
Power and EM Attacks on Passive 13.56 MHz RFID Devices. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
EM Attacks, RFID, AES, Side-Channel Attacks, DPA, Power Analysis, DEMA |
25 | Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky |
Efficient Arguments without Short PCPs. |
CCC |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Duo Lei, Chao Li, Keqin Feng |
Square Like Attack on Camellia. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
Square attack, Block Cipher, Camellia |
25 | Eli Biham, Orr Dunkelman, Nathan Keller |
New Cryptanalytic Results on IDEA. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Guan Jie, Zhang Zhongya |
Improved Collision Attack on Reduced Round Camellia. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
Block cipher, Collision attack, Camellia |
25 | X. Brian Zhang, Simon S. Lam, Huaiyu Liu |
Efficient Group Rekeying Using Application-Layer Multicast. |
ICDCS |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Youngdai Ko, Changhoon Lee, Seokhie Hong, Sangjin Lee 0002 |
Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
CIKS-1, Related Key differential attack, Data-dependent rotation, SPECTR-H64 |
25 | Jen-Chiun Lin, Chien-Hua Tzeng, Feipei Lai, Hung-Chang Lee |
Optimizing Centralized Secure Group Communications with Binary Key Tree Recomposition. |
AINA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Sung Yong Kim, Jin Wook Shin, Sun Young Sim, Dong Sun Park |
New Mechanisms for End-to-End Security Using IPSec in NAT-Based Private Networks. |
Human.Society@Internet 2003 |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Carl D'Halluin, Gert Bijnens, Vincent Rijmen, Bart Preneel |
Attack on Six Rounds of Crypton. |
FSE |
1999 |
DBLP DOI BibTeX RDF |
|
25 | Stefan Lucks |
Attacking Triple Encryption. |
FSE |
1998 |
DBLP DOI BibTeX RDF |
|
25 | Phong Q. Nguyen, Jacques Stern |
Cryptanalysis of the Ajtai-Dwork Cryptosystem. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
25 | Don Coppersmith |
Finding a Small Root of a Univariate Modular Equation. |
EUROCRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
25 | Johan van Tilburg |
Two Chosen Plaintext Attacks on the Li-Wang Joint Authentication and Encryption Scheme. |
AAECC |
1993 |
DBLP DOI BibTeX RDF |
|
22 | Kota Takahashi, Keitaro Hashimoto, Wakaha Ogata |
Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext. |
Des. Codes Cryptogr. |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Fouzia El Azzaby, Nabil El Akkad, Khalid Sabour |
The coupling of a multiplicative group and the theory of chaos in the encryptions of images. |
Int. Arab J. Inf. Technol. |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Xiao Yang, Chengru Zhang, Haiyang Xue, Man Ho Au |
Efficient Verifiably Encrypted ECDSA Schemes From Castagnos-Laguillaumie and Joye-Libert Encryptions. |
IEEE Trans. Inf. Forensics Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Gérald Gavin, Sandrine Tainturier |
Designing homomorphic encryptions with rational functions. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
22 | Ziqi Zhu, Jiangtao Li, Kai Zhang 0016, Junqing Gong 0001, Haifeng Qian |
Registered Functional Encryptions from Pairings. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
22 | Duy Nguyen |
Dynamic Decentralized Functional Encryptions from Pairings in the Standard Model. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
22 | ZaHyun Koo, Joon-Woo Lee, Jong-Seon No, Young-Sik Kim |
Key Reduction in Multi-Key and Threshold Multi-Key Homomorphic Encryptions by Reusing Error. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Anit Kumar Ghosal, Dipanwita Roychowdhury |
Continuously Non-Malleable Codes from Authenticated Encryptions in 2-Split-State Model. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
22 | Kyosuke Yamashita, Keisuke Hara |
On the Black-Box Separation Between Ring Signatures and Public Key Encryptions. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
22 | Chao Chen, Fangguo Zhang |
Verifiable delay functions and delay encryptions from hyperelliptic curves. |
Cybersecur. |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Sigurd Eskeland |
Private set intersection using RSA subgroups with constant-size encryptions. |
PST |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Mridul Nandi, Tapas Pandit |
Efficient fully CCA-secure predicate encryptions from pair encodings. |
Adv. Math. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Jing Pan, Jiang Zhang, Fangguo Zhang, Xiaofeng Chen 0001, Willy Susilo |
Lattice-based group encryptions with only one trapdoor. |
Sci. China Inf. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Ranganath Ponnaboyina, Ramesh Makala, Chinnam Subbarao, Venkata Ramana Gupta Nallagattla |
An effective text compression-encryption using tight and indirect encryptions. |
Soft Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Jonathan Takeshita, Zachariah Carmichael, Ryan Karl, Taeho Jung |
TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
22 | Yi Deng 0002, Shunli Ma, Xinxuan Zhang, Hailong Wang, Xuyang Song, Xiang Xie |
Promise Σ-protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
22 | Anit Kumar Ghosal, Dipanwita Roychowdhury |
Continuously Non-malleable Codes from Authenticated Encryptions in 2-Split-State Model. |
ATIS |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Jonathan Takeshita, Zachariah Carmichael, Ryan Karl, Taeho Jung |
TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation. |
SecureComm |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Shokofeh VahidianSadegh, Lena Wiese, Michael Brenner 0003 |
SeCCA: Towards Privacy-Preserving Biclustering Algorithm with Homomorphic Encryptions. |
Privacy and Identity Management |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Zi Wang 0006, Benjamin Carrión Schäfer |
Locking the Re-usability of Behavioral IPs: Discriminating the Search Space through Partial Encryptions. |
DATE |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Yi Deng 0002, Shunli Ma, Xinxuan Zhang, Hailong Wang, Xuyang Song, Xiang Xie |
Promise $\varSigma $-Protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups. |
ASIACRYPT (4) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Jing Pan, Xiaofeng Chen 0001, Fangguo Zhang, Willy Susilo |
Forward-Secure Group Encryptions from Lattices. |
ACISP |
2021 |
DBLP DOI BibTeX RDF |
|
22 | V. Vani, S. R. Anantha Lakshmi |
Soft computing approaches for character credential and word prophecy analysis with stone encryptions. |
Soft Comput. |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Huige Wang, Kefei Chen, Tianyu Pan, Yunlei Zhao |
Practical CCA-Secure Functional Encryptions for Deterministic Functions. |
Secur. Commun. Networks |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Tapas Pal, Ratna Dutta |
Chosen-Ciphertext Secure Attribute-Hiding Non-Zero Inner Product Encryptions and Its Applications. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
22 | Sébastien Carré, Sylvain Guilley, Olivier Rioul |
Persistent Fault Analysis With Few Encryptions. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
22 | Shotaro Sawataishi, Rei Ueno, Naofumi Homma |
Unified Hardware for High-Throughput AES-Based Authenticated Encryptions. |
IEEE Trans. Circuits Syst. II Express Briefs |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Sébastien Carré, Sylvain Guilley, Olivier Rioul |
Persistent Fault Analysis with Few Encryptions. |
COSADE |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay |
Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions. |
J. Inf. Secur. Appl. |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Miodrag J. Mihaljevic, Frédérique E. Oggier |
Security evaluation and design elements for a class of randomised encryptions. |
IET Inf. Secur. |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Marwan Majeed Nayyef, Ali Makki Sagheer |
Design of Public-Key Algorithms Based on Partial Homomorphic Encryptions. |
Int. J. Inf. Secur. Priv. |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Yuan Chen 0008, Qingkuan Dong, Yannan Li, Qiqi Lai, Zhedong Wang |
Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms. |
J. Univers. Comput. Sci. |
2019 |
DBLP BibTeX RDF |
|
22 | Tapas Pal, Ratna Dutta |
Non-zero Inner Product Encryptions: Strong Security under Standard Assumptions. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
22 | Yuanqi Shen, You Li, Shuyu Kong, Amin Rezaei 0001, Hai Zhou 0001 |
SigAttack: New High-level SAT-based Attack on Logic Encryptions. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
22 | Yuanqi Shen, You Li, Shuyu Kong, Amin Rezaei 0001, Hai Zhou 0001 |
SigAttack: New High-level SAT-based Attack on Logic Encryptions. |
DATE |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Xiong Fan |
Attribute-based Encryptions and Formal Verification of Lattice-based Cryptography. |
|
2019 |
RDF |
|
22 | Binbin Tu, Yu Chen 0003, Xueli Wang |
Threshold and Revocation Encryptions via Threshold Trapdoor Function. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
22 | Yuanqi Shen, Amin Rezaei 0001, Hai Zhou 0001 |
SAT-based bit-flipping attack on logic encryptions. |
DATE |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Yuanqi Shen, Amin Rezaei 0001, Hai Zhou 0001 |
A comparative investigation of approximate attacks on logic encryptions. |
ASP-DAC |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Jiangtao Li 0003, Junqing Gong 0001 |
Improved Anonymous Broadcast Encryptions - Tight Security and Shorter Ciphertext. |
ACNS |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Xin Wang, Bei Liang, Shimin Li, Rui Xue 0001 |
On Constructing Pairing-Free Identity-Based Encryptions. |
ISC |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Mostapha Derfouf, Mohsine Eleuldj |
Cloud Secured Protocol based on Partial Homomorphic Encryptions. |
Cloudtech |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Dan Yamamoto, Wakaha Ogata |
Multi-Divisible On-Line/Off-Line Encryptions. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Y. Sreenivasa Rao, Ratna Dutta |
Computational friendly attribute-based encryptions with short ciphertext. |
Theor. Comput. Sci. |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Kwangsu Lee |
Efficient Hidden Vector Encryptions and Its Applications. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
22 | Fanbao Liu, Fengmei Liu |
Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
22 | Yuanqi Shen, Amin Rezaei 0001, Hai Zhou 0001 |
A Comparative Investigation of Approximate Attacks on Logic Encryptions. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
22 | Yusuke Naito 0001 |
Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
22 | Hai Zhou 0001, Ruifeng Jiang, Shuyu Kong |
CycSAT: SAT-Based Attack on Cyclic Logic Encryptions. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
22 | Yuanqi Shen, Amin Rezaei 0001, Hai Zhou 0001 |
SAT-based Bit-flipping Attack on Logic Encryptions. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
22 | Yusuke Naito 0001 |
Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security. |
IACR Trans. Symmetric Cryptol. |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Rainer Schnell, Anke Richter, Christian Borgs |
A Comparison of Statistical Linkage Keys with Bloom Filter-based Encryptions for Privacy-preserving Record Linkage using Real-world Mammography Data. |
HEALTHINF |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Hai Zhou 0001, Ruifeng Jiang, Shuyu Kong |
CycSAT: SAT-based attack on cyclic logic encryptions. |
ICCAD |
2017 |
DBLP DOI BibTeX RDF |
|