The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for guessing with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1970-1990 (15) 1991-1995 (17) 1996-1997 (15) 1998-1999 (24) 2000-2001 (24) 2002 (20) 2003 (20) 2004 (26) 2005 (46) 2006 (54) 2007 (44) 2008 (41) 2009 (32) 2010 (19) 2011 (18) 2012-2013 (31) 2014-2015 (37) 2016 (27) 2017 (36) 2018 (41) 2019 (48) 2020 (60) 2021 (56) 2022 (62) 2023 (59) 2024 (6)
Publication types (Num. hits)
article(413) data(1) incollection(3) inproceedings(456) phdthesis(5)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 396 occurrences of 248 keywords

Results
Found 878 publication records. Showing 878 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
117Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò 0001 A Formalization of Off-Line Guessing for Security Protocol Analysis. Search on Bibsonomy LPAR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
93Sreekanth Malladi, Jim Alves-Foss What are Multi-Protocol Guessing Attacks and How to Prevent Them. Search on Bibsonomy WETICE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Multi-protocol guessing attacks, weak secrets, mixed strand spaces, EKE
82Li Gong Optimal authentication protocols resistant to password guessing attacks. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF optimal authentification protocols, user passwords, protocols, message authentication, password guessing attacks
79John A. Trono Comments on "Tagged Semaphores". Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
77Stéphanie Delaune, Steve Kremer, Mark Ryan 0001 Composition of Password-Based Protocols. Search on Bibsonomy CSF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF composition, security protocols, guessing attacks
71Taekyoung Kwon 0002, JooSeok Song Security and efficiency in authentication protocols resistant to password guessing attack. Search on Bibsonomy LCN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF password guessing attack resistance, secret, user-chosen weak secret, security-oriented protocols, cipher operations, protocol steps, poorly-chosen weak secret protection, security, efficiency, cryptographic protocols, key exchange, message authentication, authentication protocols, secure communications, random numbers, dictionary attacks
66Eun-Jun Yoon, Kee-Young Yoo New Efficient Simple Authenticated Key Agreement Protocol. Search on Bibsonomy COCOON The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Modification attack, Elliptic curve discrete logarithm problem, Authenticated key agreement, Password guessing attack
61Daniel E. O'Leary Intelligent Guessing. Search on Bibsonomy IEEE Intell. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF artificial intelligence, research and development
61Darrin C. Edwards, Charles E. Metz, Robert M. Nishikawa The hypervolume under the ROC hypersurface of "Near-Guessing" and Near-Perfect" observers in N-class classification tasks. Search on Bibsonomy IEEE Trans. Medical Imaging The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
60Wei-Chuen Yau, Swee-Huay Heng, Bok-Min Goi Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF off-line keyword guessing attack, privacy, public key encryption, database security, Searching on encrypted data
60Mathieu Baudet Deciding security of protocols against off-line guessing attacks. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF second-order e-unification, formal methods, security protocols, guessing attacks
55Wei-Chi Ku, Min-Hung Chiang, Shen-Tien Chang Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF hash function, password authentication, guessing attack, denial-of-service attack, stolen-verifier attack
50Marcel Fernandez, Miguel Soriano Protecting Intellectual Property by Guessing Secrets. Search on Bibsonomy EC-Web The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
49Stephen Keung, Kai-Yeung Siu Efficient protocols secure against guessing and replay attacks. Search on Bibsonomy ICCCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF password guessing, efficient protocols, password protection, nonces minimisation, protocols, multicast communications, secure communications, peer-to-peer communication, replay attacks
48Persi Diaconis, Ronald L. Graham, Sam Spiro Guessing about Guessing: Practical Strategies for Card Guessing with Feedback. Search on Bibsonomy Am. Math. Mon. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
44Eun-Jun Yoon, Kee-Young Yoo New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Authentication, Smart card, Password, Guessing attack
44Sung-Woon Lee, Hyun-Sung Kim 0001, Kee-Young Yoo Cryptanalysis of a user authentication scheme using hash functions. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF authentication, cryptography, hash function, password, guessing attack
44Wei-Chi Ku, Chien-Ming Chen 0001, Hui-Lung Lee Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF hash function, password authentication, guessing attack, denial-of-service attack, stolen-verifier attack
38Bogdan Groza, Marius Minea A Calculus to Detect Guessing Attacks. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Noga Alon, Venkatesan Guruswami, Tali Kaufman, Madhu Sudan 0001 Guessing secrets efficiently via list decoding. Search on Bibsonomy ACM Trans. Algorithms The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ?-biased spaces, 20 questions, k-universal sets, error-correcting codes, decoding algorithms
38Rajesh Sundaresan Guessing Under Source Uncertainty. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
38Jin Wook Byun, Hyun Suk Rhee, Hyun-A Park, Dong Hoon Lee 0001 Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data. Search on Bibsonomy Secure Data Management The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
38Chin-Chen Chang 0001, Timothy K. Shih, Iuon-Chang Lin Guessing by neighbors: an efficient reconstruction method for transmitting image progressively. Search on Bibsonomy Vis. Comput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Bitmapped graphics, Web applications, Progressive image transmission
38Noga Alon, Venkatesan Guruswami, Tali Kaufman, Madhu Sudan 0001 Guessing secrets efficiently via list decoding. Search on Bibsonomy SODA The full citation details ... 2002 DBLP  BibTeX  RDF
38Erik Zenner On the Efficiency of theClock Control Guessing Attack. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Block/Stream Ciphers, Cryptographic Primitives
34Shin-Jia Hwang, Ming-Jhang Chai A New Authenticated Key Agreement Protocol for Wireless Mobile Networks. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Annie W. Y. Ng, Alan H. S. Chan Culture Issues in Traffic Sign Usability. Search on Bibsonomy HCI (10) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF sign concreteness, usability, culture, traffic sign
34Joseph Chee Ming Teo, Chik How Tan Denial-of-service resilience password-based group key agreement for wireless networks. Search on Bibsonomy Q2SWinet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF denial-of-service, group key agreement, secure group communication, password-based authentication
34Yoav Weiss, Elena Gabriela Barrantes Known/Chosen Key Attacks against Software Instruction Set Randomization. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Eun-Jun Yoon, Kee-Young Yoo New Multi-server Password Authentication Scheme Using Neural Networks. Search on Bibsonomy ICNC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Ulrich Dorndorf, Erwin Pesch, Toàn Phan Huy Constraint Propagation and Problem Decomposition: A Preprocessing Procedure for the Job Shop Problem. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
34David P. Jablon Password Authentication Using Multiple Servers. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
34Benny Chor, Oded Goldreich 0001, Shafi Goldwasser The Bit Security of Modular Squaring Given Partial Factorization of the Modulos. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
33Youngsook Lee, Dongho Won Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment. Search on Bibsonomy ICCSA (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-server environments, remote user authentication scheme, smart card, impersonation attack, password security, password guessing attack
33Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo Secure PAP-Based RADIUS Protocol in Wireless Networks. Search on Bibsonomy ICIC (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RADIUS protocol, Off-line password guessing attack, Wireless network, Cryptography, Replay attack
33Jai-Boo Oh, Jun-Cheol Jeon, Kee-Young Yoo Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Off-line guessing Attack, Authentication, Bilinear Pairing, Replay Attack, Forgery Attack
33Ya-Fen Chang, Chin-Chen Chang 0001, Yu-Wei Su A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authentication, password, password guessing attack
33Cheng-Chi Lee, Li-Hua Li, Min-Shiang Hwang A remote user authentication scheme using hash functions. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF cryptography, hash function, password, guessing attack, digest
33Sarvar Patel Number Theoretic Attacks on Secure Password Schemes. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF number theoretic attacks, secure password schemes, Encrypted Key Exchange, EKE, authenticated information exchange, insecure network, secret key cryptography, randomized confounders, RSA version, half encrypted versions, Direct Authentication Protocol, Secret Public Key Protocol versions, secure protocols, message authentication, dictionary attacks, active attacks, password guessing attacks
32David Asperó Guessing and non-guessing of canonical functions. Search on Bibsonomy Ann. Pure Appl. Log. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Nicholas B. Chang, Mingyan Liu Constrained Sequential Resource Allocation and Guessing Games. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Krister Lindén A Probabilistic Model for Guessing Base Forms of New Words by Analogy. Search on Bibsonomy CICLing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Takayuki Osogami, Sei Kato Optimizing system configurations quickly by guessing at the performance. Search on Bibsonomy SIGMETRICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF configuration parameters, regression, performance optimization, web system, ranking and selection
27Bin Yan 0001, Zhe-Ming Lu, Sheng-He Sun Security of autoregressive speech watermarking model under guessing attack. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Martín Abadi, Mathieu Baudet, Bogdan Warinschi Guessing Attacks and the Computational Soundness of Static Equivalence. Search on Bibsonomy FoSSaCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau Tracing Traitors by Guessing Secrets. The q-Ary Case. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Her-Tyan Yeh, Hung-Min Sun Simple authenticated key agreement protocol resistant to password guessing attacks. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF cryptography, provable security, key agreement, key exchange, password authentication
27Yun Ding, Patrick Horster Undetectable On-line Password Guessing Attacks. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
22Tomasz Woloszynski, Marek Kurzynski On a New Measure of Classifier Competence Applied to the Design of Multiclassifier Systems. Search on Bibsonomy ICIAP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Shai Halevi, Tal Rabin Degradation and Amplification of Computational Hardness. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Eun-Jun Yoon, Eun-Jung Lee, Kee-Young Yoo Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Cryptography, Cryptanalysis, Smart card, Password, Session key
22Onur Aciiçmez, Werner Schindler A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Instruction-Cache Attack, MicroArchitectural Analysis, RSA, Stochastic Process, Side Channel Analysis, Montgomery Multiplication
22Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MISTY1, Block cipher, Impossible differential cryptanalysis, Camellia
22Amirali Salehi-Abari, Julie Thorpe, Paul C. van Oorschot On Purely Automated Attacks and Click-Based Graphical Passwords. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Hyunsoo Song, Taekyoung Kwon 0002 Security Analysis of Secure Password Authentication for Keystroke Dynamics. Search on Bibsonomy KES (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Hwa-Young Jeong Learner's Tailoring E-Learning System on the Item Revision Difficulty Using PetriNet. Search on Bibsonomy VSMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Peter D. Turney, Michael L. Littman Corpus-based Learning of Analogies and Semantic Relations. Search on Bibsonomy Mach. Learn. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF noun-modifier pairs, metaphor, analogy, vector space model, semantic relations, cosine similarity
22Ertem Tuncel, Jayanth Nayak, Kenneth Rose On hierarchical type covering. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Bruno Martins 0001, Mário J. Silva Language identification in web pages. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Saeed Rajput, Jihong Chen, Sam Hsu State based authentication. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF rule-based attack, syllable attack, security, authentication, access control, attack, password, help-desk, vulnerabilities, dictionary attack, unauthorized access, password management
22Michel Abdalla, Pierre-Alain Fouque, David Pointcheval Password-Based Authenticated Key Exchange in the Three-Party Setting. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Password, key distribution, authenticated key exchange, multi-party protocols
22Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee A key authentication scheme with non-repudiation. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF non-repudiation security, authentication, certificate, discrete logarithm, public key
22Marcel Fernandez, Miguel Soriano Efficient Recovery of Secrets. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Eun-Kyung Ryu, Kee-Won Kim, Kee-Young Yoo A Promising Key Agreement Protocol. Search on Bibsonomy ISAAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Günther Eibl, Karl Peter Pfeiffer How to Make AdaBoost.M1 Work for Weak Base Classifiers by Changing Only One Line of the Code. Search on Bibsonomy ECML The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Michel Raynal Quiescent Uniform Reliable Broadcast as an Introduction to Failure Detector Oracles. Search on Bibsonomy PaCT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Fair Lossy Channels, Quiescent Protocol, Uniform Reliable Broadcast, Fault-Tolerance, Oracles, Failure Detectors, Asynchronous Distributed Systems, Process Crashes
22Shai Halevi, Hugo Krawczyk Public-Key Cryptography and Password Protocols. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF hand-held certificates, public passwords, public-key protocols, passwords, key exchange, dictionary attacks
21Stephen Farrell Leaky or Guessable Session Identifiers. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF session identifier security, brute-force, guessing, information leakage
21Yanjiang Yang, Feng Bao 0001 Enabling Use of Single Password over Multiple Servers in Two-Server Model. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF two-server model, password authentication, guessing attacks
21Tzong-Chen Wu, Hung-Yu Chien Comments on Gateway-Oriented Password-Based Authenticated Key Exchange Protocol. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, authentication, semantic security, password guessing attack
21Marko Hölbl, Tatjana Welzer Cryptanalysis and Improvement of an "Improved Remote Authentication Scheme with Smart Card". Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF off-line password guessing attack, authentication, smart card, password
21Eun-Jun Yoon, Kee-Young Yoo Improving the Generalized Password-Based Authenticated Key Agreement Protocol. Search on Bibsonomy GPC Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Cryptography, Password, Key agreement, Guessing attack
21Chin-Chen Chang 0001, Jung-San Lee, Ting-Fang Cheng Security design for three-party encrypted key exchange protocol using smart cards. Search on Bibsonomy ICUIMC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF 3PEKE, off-line password guessing attack, communications, smart cards
21Hung-Yu Chien, Tzong-Chen Wu Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication, key agreement, random oracle, impersonation attack, guessing attack
16Markus Kuba, Alois Panholzer On card guessing games: Limit law for no feedback one-time riffle shuffle. Search on Bibsonomy Adv. Appl. Math. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Noé José Zapata, Gerardo Pérez, Lucas Bonilla, Pedro Núñez, Pilar Bachiller, Pablo Bustos Guessing human intentions to avoid dangerous situations in caregiving robots. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Xiao Ma Guessing What, Noise or Codeword? Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Zhiyuan Chang, Mingyang Li, Yi Liu, Junjie Wang, Qing Wang, Yang Liu Play Guessing Game with LLM: Indirect Jailbreak Attack with Implicit Clues. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Julien Béguinot, Olivier Rioul What can Information Guess? Guessing Advantage vs. Rényi Entropy for Small Leakages. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Aleksei Latyshev, Konstantin Kokhas Hat guessing number for the class of planar graphs is at least 22. Search on Bibsonomy Discret. Math. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Xiaoyu Ji 0001, Yushi Cheng, Wenyuan Xu 0001, Yuehan Chi, Hao Pan 0003, Zhuangdi Zhu, Chuang-Wen You, Yi-Chao Chen 0001, Lili Qiu No Seeing is Also Believing: Electromagnetic-Emission-Based Application Guessing Attacks via Smartphones. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Diogo Cruz, Francisco A. Monteiro, Bruno C. Coutinho Quantum Error Correction Via Noise Guessing Decoding. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Peiming Xu, Jiahui Chen 0002, Yiwei Yang 0006, Jianting Ning DuMSE: Toward Practical and Dynamic Multiuser Search Over Encrypted Cloud Data Against Keyword Guessing Attack. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Andrea Ottolini, Stefan Steinerberger Guessing cards with complete feedback. Search on Bibsonomy Adv. Appl. Math. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Maike Jansen, Tobias Meisen, Christiane Plociennik, Holger Berg, André Pomp, Waldemar Windholz Stop Guessing in the Dark: Identified Requirements for Digital Product Passport Systems. Search on Bibsonomy Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Charlotte Knierim, Anders Martinsson, Raphael Steiner Hat Guessing Numbers of Strongly Degenerate Graphs. Search on Bibsonomy SIAM J. Discret. Math. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Thomas Van Hoey, Arthur L. Thompson, Youngah Do, Mark Dingemanse Iconicity in Ideophones: Guessing, Memorizing, and Reassessing. Search on Bibsonomy Cogn. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Omer Ben-Neria, Jing Zhang Compactness and guessing principles in the Radin extensions. Search on Bibsonomy J. Math. Log. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Muhammad Alfian, Umi Laili Yuhana, Eric Pardede, Akbar Noto Ponco Bimantoro Correction of Threshold Determination in Rapid-Guessing Behaviour Detection. Search on Bibsonomy Inf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Qing Fan, Debiao He, Jianhua Chen 0002, Cong Peng 0005, Lianhai Wang Isoga: An Isogeny-Based Quantum-Resist Searchable Encryption Scheme Against Keyword Guessing Attacks. Search on Bibsonomy IEEE Syst. J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Kefan Wang, Yuejun Wei, Zhenyuan Chen, Huarui Yin, Liping Li, Wenyi Zhang 0001 Reduced-search guessing random additive noise decoding of polar codes. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16András Z. Salamon, Michael Wehar Effective Guessing Has Unlikely Consequences. Search on Bibsonomy Theory Comput. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Shota Saito Soft Guessing Under Log-Loss Distortion Allowing Errors. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Jan Kretínský, Tobias Meggendorfer, Maximilian Prokop, Sabine Rieder Guessing Winning Policies in LTL Synthesis by Semantic Learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Emanuele Francazi, Aurélien Lucchi, Marco Baity-Jesi Initial Guessing Bias: How Untrained Networks Favor Some Classes. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Jeremy Chizewer, Ian M. J. McInnis, Mehrdad Sohrabi, Shriya Kaistha The Hat Guessing Number of Cactus Graphs and Cycles. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Michael Cunanan, Michael Thielscher On Optimal Strategies for Wordle and General Guessing Games. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Jeffrey O. Shallit Proof of Irvine's Conjecture via Mechanized Guessing. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 878 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license