|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3849 occurrences of 1722 keywords
|
|
|
Results
Found 4942 publication records. Showing 4919 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
92 | Michael A. Bender, Haodong Hu, Bradley C. Kuszmaul |
Performance guarantees for B-trees with different-sized atomic keys.  |
PODS  |
2010 |
DBLP DOI BibTeX RDF |
B-tree with different-sized keys, atomic keys, dynamic programming |
71 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys.  |
DRMTICS  |
2005 |
DBLP DOI BibTeX RDF |
time-limited services, cryptographic keys management, time-bound keys, one-way mappings, broadcast encryption, pseudorandom number generators |
55 | José A. Ramírez-Ruiz, Carlos F. Pfeiffer, Juan Arturo Nolazco-Flores |
Cryptographic Keys Generation Using FingerCodes.  |
IBERAMIA-SBIA  |
2006 |
DBLP DOI BibTeX RDF |
FingerCode, Support Vector Machine, Biometrics, Cryptographic Keys |
54 | Donggang Liu, Qi Dong 0001 |
Detecting Misused Keys in Wireless Sensor Networks.  |
IPCCC  |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Shari Trewin, Helen Pain |
A Model of Keyboard Configuration Requirements.  |
International ACM Conference on Assistive Technologies  |
1998 |
DBLP DOI BibTeX RDF |
Bounce Keys, Repeat Keys, Sticky Keys, keyboard configuration, empirical studies, user modelling, keyboards, motor disabilities |
49 | Kapali Viswanathan, Ashutosh Saxena |
Towards Logically and Physically Secure Public-Key Infrastructures.  |
INDOCRYPT  |
2002 |
DBLP DOI BibTeX RDF |
critical keys, private keys, controlled use, PKI, backup |
48 | Amitanand S. Aiyer, Lorenzo Alvisi, Mohamed G. Gouda |
Key Grids: A Protocol Family for Assigning Symmetric Keys.  |
ICNP  |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Sayyed Arash Ostadzadeh, M. Amir Moulavi, Zeinab Zeinalpour |
Massive Concurrent Deletion of Keys in B*-Tree.  |
PPAM  |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki |
1-out-of-n Signatures from a Variety of Keys.  |
ASIACRYPT  |
2002 |
DBLP DOI BibTeX RDF |
|
46 | Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein Harn |
Location-aware key management scheme for wireless sensor networks.  |
SASN  |
2004 |
DBLP DOI BibTeX RDF |
sensor networks, key management, probabilistic key sharing |
45 | Peter Buneman, Susan B. Davidson, Wenfei Fan, Carmem S. Hara, Wang Chiew Tan |
Keys for XML.  |
WWW  |
2001 |
DBLP DOI BibTeX RDF |
relative keys, XML, keys |
45 | Georg Lausen |
Relational Databases in RDF: Keys and Foreign Keys.  |
SWDB-ODBIS  |
2007 |
DBLP DOI BibTeX RDF |
|
43 | Hongbo Li, Li Zhou |
Use Closure of Relevant Sets of Attributes to Efficiently Find Candidate Keys.  |
CSSE (1)  |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Gösta Grahne, Jianfei Zhu |
Discovering approximate keys in XML data.  |
CIKM  |
2002 |
DBLP DOI BibTeX RDF |
|
43 | Peter Buneman, Susan B. Davidson, Wenfei Fan, Carmem S. Hara, Wang Chiew Tan |
Reasoning about Keys for XML.  |
DBPL  |
2001 |
DBLP DOI BibTeX RDF |
|
43 | Eiji Okamoto, K. Nakamura |
Lifetimes of Keys in Cryptographic Key Management Systems.  |
CRYPTO  |
1985 |
DBLP DOI BibTeX RDF |
|
42 | Ehab S. Elmallah, Mohamed G. Gouda, Sandeep S. Kulkarni |
Logarithmic keying.  |
ACM Trans. Auton. Adapt. Syst.  |
2008 |
DBLP DOI BibTeX RDF |
keying scheme, Secure communications, symmetric keys |
42 | Mohamed G. Gouda, Sandeep S. Kulkarni, Ehab S. Elmallah |
Logarithmic Keying of Communication Networks.  |
SSS  |
2006 |
DBLP DOI BibTeX RDF |
keying scheme, Secure communications, symmetric keys |
41 | Gianni Franceschini, Roberto Grossi |
No Sorting? Better Searching!  |
FOCS  |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Benny Pinkas |
Efficient State Updates for Key Management.  |
Digital Rights Management Workshop  |
2001 |
DBLP DOI BibTeX RDF |
|
41 | Tok Wang Ling, Ge Yu 0001, Jiaheng Lu, Wei Wang 0011 (eds.) |
Proceedings of the Third International Workshop on Keyword Search on Structured Data, KEYS 2012, Scottsdale, AZ, USA, May 20, 2012  |
KEYS  |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Rajvardhan Patil, Zhengxin Chen |
STRUCT: incorporating contextual information for English query search on relational databases.  |
KEYS  |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Jaime Iván López-Veyna, Víctor Jesús Sosa Sosa, Ivan López-Arévalo |
KESOSD: keyword search over structured data.  |
KEYS  |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Carlos Garcia-Alvarado, Carlos Ordonez 0001 |
Integrating and querying source code of programs working on a database.  |
KEYS  |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Sina Fakhraee, Farshad Fotouhi |
DBSemSXplorer: semantic-based keyword search system over relational databases for knowledge discovery.  |
KEYS  |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Cong Yu 0001 |
Towards a high quality and web-scalable table search engine.  |
KEYS  |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Hany Azzam, Sirvan Yahyaei, Marco Bonzanini, Thomas Roelleke |
A schema-driven approach for knowledge-oriented retrieval and query formulation.  |
KEYS  |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Aggeliki Dimitriou, Dimitri Theodoratos |
Efficient keyword search on large tree structured datasets.  |
KEYS  |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Yufei Tao 0001 |
Theoretical results on keyword search and related problems.  |
KEYS  |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Zhong Zeng, Zhifeng Bao, Tok Wang Ling, Mong-Li Lee |
iSearch: an interpretation based framework for keyword search in relational databases.  |
KEYS  |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Yong Zeng, Zhifeng Bao, Tok Wang Ling, Luochen Li |
MALEX: a MAp-like exploration model on XML database.  |
KEYS  |
2012 |
DBLP DOI BibTeX RDF |
|
41 | |
Proceedings of the Second International Workshop on Keyword Search on Structured Data, KEYS 2010, Indianapolis, Indiana, USA, June 6, 2010  |
KEYS  |
2010 |
DBLP DOI BibTeX RDF |
|
41 | Truls Amundsen Bjørklund, Michaela Götz, Johannes Gehrke |
Search in social networks with access control.  |
KEYS  |
2010 |
DBLP DOI BibTeX RDF |
|
41 | Carlos Garcia-Alvarado, Carlos Ordonez 0001 |
Keyword search across databases and documents.  |
KEYS  |
2010 |
DBLP DOI BibTeX RDF |
|
41 | Carlos Garcia-Alvarado, Carlos Ordonez 0001, Zhibo Chen 0002 |
Query recommendation in digital libraries using OLAP.  |
KEYS  |
2010 |
DBLP DOI BibTeX RDF |
|
41 | Joel Coffman, Alfred C. Weaver |
Structured data retrieval using cover density ranking.  |
KEYS  |
2010 |
DBLP DOI BibTeX RDF |
|
41 | Ilaria Bartolini, Paolo Ciaccia |
Multi-dimensional keyword-based image annotation and search.  |
KEYS  |
2010 |
DBLP DOI BibTeX RDF |
|
41 | Hannah Bast, Marjan Celikik |
Efficient two-sided error-tolerant search.  |
KEYS  |
2010 |
DBLP DOI BibTeX RDF |
|
41 | M. Tamer Özsu, Yi Chen, Lei Chen 0002 (eds.) |
Proceedings of the First International Workshop on Keyword Search on Structured Data, KEYS 2009, Providence, Rhode Island, USA, June 28, 2009  |
KEYS  |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Elena Demidova, Irina Oelze, Peter Fankhauser |
Do we mean the same?: disambiguation of extracted keyword queries for database search.  |
KEYS  |
2009 |
DBLP DOI BibTeX RDF |
extracted keyword queries, keyword disambiguation |
41 | Xiaohui Yu 0001, Huxia Shi |
Query segmentation using conditional random fields.  |
KEYS  |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Ken Q. Pu |
Keyword query cleaning using hidden Markov models.  |
KEYS  |
2009 |
DBLP DOI BibTeX RDF |
query cleaning, segmentation, hidden Markov models, keyword search |
41 | Surajit Chaudhuri |
Structured data and web documents: better together?  |
KEYS  |
2009 |
DBLP DOI BibTeX RDF |
World Wide Web (WWW) |
41 | Shiyuan Wang, Jun'ichi Tatemura, Arsany Sawires, Oliver Po, Divyakant Agrawal, Amr El Abbadi |
Hierarchical result views for keyword queries over relational databases.  |
KEYS  |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Jiaheng Lu, Zhifeng Bao, Tok Wang Ling, Xiaofeng Meng 0001 |
XML keyword query refinement.  |
KEYS  |
2009 |
DBLP DOI BibTeX RDF |
XML, keyword search, query refinement |
41 | Arash Termehchy, Marianne Winslett |
Generic and effective semi-structured keyword search.  |
KEYS  |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Tommy Ellkvist, Lena Strömbäck, Lauro Didier Lins, Juliana Freire |
A first study on strategies for generating workflow snippets.  |
KEYS  |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Rares Vernica, Chen Li 0001 |
Efficient top-k algorithms for fuzzy search in string collections.  |
KEYS  |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Carlos Garcia-Alvarado, Carlos Ordonez 0001, Zhibo Chen 0002 |
DBDOC: querying and browsing databases and interrelated documents.  |
KEYS  |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Ron Avnur |
Building search applications with Marklogic Server.  |
KEYS  |
2009 |
DBLP DOI BibTeX RDF |
XML |
41 | Shady Elbassuoni, Maya Ramanath, Gerhard Weikum |
Language-model-based ranking in entity-relation graphs.  |
KEYS  |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Luis Gravano |
Querying text databases and the web: beyond traditional keyword search.  |
KEYS  |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Kiyoshi Yanagimoto, Takaaki Hasegawa, Makoto Takano |
A New Encoding Approach Realizing High Security and High Performance Based on Double Common Encryption Using Static Keys and Dynamic Keys.  |
APNOMS  |
2006 |
DBLP DOI BibTeX RDF |
Common key encryption, Security, Network security, Database security |
39 | Subhamoy Maitra, Santanu Sarkar 0001 |
Revisiting Wiener's Attack - New Weak Keys in RSA.  |
ISC  |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, RSA, Factorization, Weak Keys |
39 | Dhilak Damodaran, Rohit Singh 0004, Phu Dung Le |
Group Key Management in Wireless Networks Using Session Keys.  |
ITNG  |
2006 |
DBLP DOI BibTeX RDF |
Forward and Backward Secrecy, Multicast, Wireless, Portable, Group Key, Session Keys |
39 | Michal Ren, Tanmoy Kanti Das, Jianying Zhou 0001 |
Diverging Keys in Wireless Sensor Networks.  |
ISC  |
2006 |
DBLP DOI BibTeX RDF |
Node Compromise Attack, Diverging Keys, Sensor Network Security |
39 | Aviel D. Rubin |
Extending NCP for protocols using public keys.  |
ICCCN  |
1995 |
DBLP DOI BibTeX RDF |
nonmonotonic cryptographic protocols, asymmetric keys, update function, principals, binding requirements, public key protocol, protocols, certificates, inference rules |
38 | Caimei Wang, Zhengmao Li |
Self-selecting Sub-secret Keys Sharing Scheme Based on Polynomials over Elliptic Curve.  |
IAS  |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Sven Hartmann, Sebastian Link |
Expressive, yet tractable XML keys.  |
EDBT  |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Yi-Ru Liu, Wen-Guey Tzeng |
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time.  |
Public Key Cryptography  |
2008 |
DBLP DOI BibTeX RDF |
Broadcast encryption, collusion, polynomial interpolation |
38 | Orhun Kara, Cevat Manap |
A New Class of Weak Keys for Blowfish.  |
FSE  |
2007 |
DBLP DOI BibTeX RDF |
Blowfish, key dependent S-Box, self similarity analysis, cryptanalysis, fixed point, weak key, reflection attack |
38 | Sven Hartmann, Sebastian Link |
Unlocking Keys for XML Trees.  |
ICDT  |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Aggelos Kiayias, Serdar Pehlivanoglu |
Pirate Evolution: How to Make the Most of Your Traitor Keys.  |
CRYPTO  |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Wai Kuan Yip, Alwyn Goh, David Ngo Chek Ling, Andrew Teoh Beng Jin |
Generation of Replaceable Cryptographic Keys from Dynamic Handwritten Signatures.  |
ICB  |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Joan Daemen, René Govaerts, Joos Vandewalle |
Weak Keys for IDEA.  |
CRYPTO  |
1993 |
DBLP DOI BibTeX RDF |
|
38 | Marc Girault |
Self-Certified Public Keys.  |
EUROCRYPT  |
1991 |
DBLP DOI BibTeX RDF |
|
36 | Hector Ouilhet |
Google Sky Map: using your phone as an interface.  |
Mobile HCI  |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Muhammad J. Bohio, Ali Miri |
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network.  |
CNSR  |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Ranjan Sinha |
Using Compact Tries for Cache-Efficient Sorting of Integers.  |
WEA  |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Marcelo Arenas, Wenfei Fan, Leonid Libkin |
On Verifying Consistency of XML Specifications. (PDF / PS)  |
PODS  |
2002 |
DBLP DOI BibTeX RDF |
XML |
36 | Rolf Blom |
An Optimal Class of Symmetric Key Generation Systems.  |
EUROCRYPT  |
1984 |
DBLP DOI BibTeX RDF |
|
35 | Martin Necaský, Irena Mlýnková |
Discovering XML keys and foreign keys in queries.  |
SAC  |
2009 |
DBLP DOI BibTeX RDF |
XML schema, integrity constraints, DTD, schema inference |
35 | Luca Cabibbo |
On keys, foreign keys and nullable attributes in relational mapping systems.  |
EDBT  |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Steve Mann 0001 |
"fl Huge UId streams": fountains that are keyboards with nozzle spray as keys that give rich tactile feedback and are more expressive and more fun than plastic keys.  |
ACM Multimedia  |
2005 |
DBLP DOI BibTeX RDF |
FUNtain, computer mediated reality, direct user interfaces, frolic in the fountains, funits (units of fun), poseidophone, water-based immersive multimedia, immersive, fluid-user-interfaces |
34 | Waraporn Viyanon, Sanjay Kumar Madria |
XML-SIM: Structure and Content Semantic Similarity Detection Using Keys.  |
OTM Conferences (2)  |
2009 |
DBLP DOI BibTeX RDF |
XML Similarity Detection, clustering, matching, keys |
34 | David Toman 0001, Grant E. Weddell |
On Keys and Functional Dependencies as First-Class Citizens in Description Logics.  |
J. Autom. Reason.  |
2008 |
DBLP DOI BibTeX RDF |
Path-functional dependency, Relational keys, Description logics |
34 | Waraporn Viyanon, Sanjay Kumar Madria, Sourav S. Bhowmick |
XML Data Integration Based on Content and Structure Similarity Using Keys.  |
OTM Conferences (1)  |
2008 |
DBLP DOI BibTeX RDF |
clustering, XML, Similarity, keys |
34 | Heiko Stamer |
Completion Attacks and Weak Keys of Oleshchuk's Public Key Cryptosystem.  |
INDOCRYPT  |
2005 |
DBLP DOI BibTeX RDF |
completion attack, Knuth-Bendix completion, Cryptanalysis, weak keys, Church-Rosser property, string-rewriting systems |
34 | Tzu-Chiang Chiang, Yueh-Min Huang |
Group Keys and the Multicast Security in Ad Hoc Networks.  |
ICPP Workshops  |
2003 |
DBLP DOI BibTeX RDF |
Prüfer, ad hoc networks, network security, multicast routing, group keys |
33 | Cleopas O. Angaye, Paul S. Fisher |
Application of FI sequences for authentication in a network.  |
ACM Southeast Regional Conference  |
2007 |
DBLP DOI BibTeX RDF |
finite induction, private keys, security, public keys |
33 | Stefan Katzenbeisser 0001, Klaus Kursawe, Frederic Stumpf |
Revocation of TPM Keys.  |
TRUST  |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Christopher James Hargreaves, Howard Chivers |
Recovery of Encryption Keys from Memory Using a Linear Scan.  |
ARES  |
2008 |
DBLP DOI BibTeX RDF |
Live Forensics, Encryption, Digital Evidence, Forensic Computing |
33 | Xianping Wu, Phu Dung Le, Balasubramaniam Srinivasan 0002 |
Dynamic Keys Based Sensitive Information System.  |
ICYCS  |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Fang Fang, Robert L. Grossman, Xiangjun Liu |
An Algorithm for Assigning Unique Keys to Metabolic Pathways.  |
BIBM  |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Gicheol Wang, Dongsun Park |
Utilizing Secure Three Hop Links to Agree Pairwise Keys in Wireless Sensor Networks.  |
UIC  |
2006 |
DBLP DOI BibTeX RDF |
|
33 | John Patrick McGregor, Ruby B. Lee |
Protecting cryptographic keys and computations via virtual secure coprocessing.  |
SIGARCH Comput. Archit. News  |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle |
A Note on Weak Keys of PES, IDEA, and Some Extended Variants.  |
ISC  |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Peeter Laud, Ricardo Corin |
Sound Computational Interpretation of Formal Encryption with Composed Keys.  |
ICISC  |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Heejin Park, Kunsoo Park, Yookun Cho |
Deleting Keys of B-trees in Parallel.  |
IPDPS  |
2002 |
DBLP DOI BibTeX RDF |
balanced search trees, dictionary operations, parallel algorithms, B-trees |
33 | Horst H. von Brand |
On the Distribution of Keys by Hashing.  |
SCCC  |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Wenfei Fan, Peter Schwenzer, Kun Wu |
Keys with Upward Wildcards for XML.  |
DEXA  |
2001 |
DBLP DOI BibTeX RDF |
|
33 | Adi Shamir, Nicko van Someren |
Playing "Hide and Seek" with Stored Keys.  |
Financial Cryptography  |
1999 |
DBLP DOI BibTeX RDF |
lunchtime attacks, authenticode, key hiding, Cryptanalysis, RSA |
33 | Raymond Fadous, John Forsyth |
Finding Candidate Keys for Relational Data Bases.  |
SIGMOD Conference  |
1975 |
DBLP DOI BibTeX RDF |
|
32 | Moti Yung |
How to Guard the Guards Themselves.  |
FCT  |
2009 |
DBLP DOI BibTeX RDF |
Key Evolving Cryptosystems, Proactive Cryptosystems, Public Key cryptography, Attacks, Leakage, Countermeasures, Physical Security, Threshold cryptosystems, Cryptographic Keys |
32 | Cristina Marinescu |
Discovering the Objectual Meaning of Foreign Key Constraints in Enterprise Applications.  |
WCRE  |
2007 |
DBLP DOI BibTeX RDF |
foreign keys, RDBMS model, object-oriented model, enterprise applications, data reverse engineering |
32 | Jixue Liu, Millist W. Vincent, Chengfei Liu |
Local XML functional dependencies.  |
WIDM  |
2003 |
DBLP DOI BibTeX RDF |
local functional dependency, relative keys, XML |
32 | Goce Jakimoski, Yvo Desmedt |
Related-Key Differential Cryptanalysis of 192-bit Key AES Variants.  |
Selected Areas in Cryptography  |
2003 |
DBLP DOI BibTeX RDF |
related keys, Markov ciphers, Advanced Encryption Standard, Differential cryptanalysis |
32 | Yingjiu Li, Vipin Swarup, Sushil Jajodia |
Constructing a virtual primary key for fingerprinting relational data.  |
Digital Rights Management Workshop  |
2003 |
DBLP DOI BibTeX RDF |
primary keys, robustness, relational databases, fingerprinting |
32 | Krisztián Tichler |
Extremal Theorems for Databases.  |
FoIKS  |
2002 |
DBLP DOI BibTeX RDF |
antikeys, labelled directed tree, extremal problems, cliques, keys, maximal independent sets, relational database model |
32 | Alex Biryukov, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle |
New Weak-Key Classes of IDEA.  |
ICICS  |
2002 |
DBLP DOI BibTeX RDF |
IDEA cipher, weak keys, NESSIE, boomerang attack |
Displaying result #1 - #100 of 4919 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|