Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Fadoua Ghourabi, Kazuko Takahashi |
What Does Qualitative Spatial Knowledge Tell About Origami Geometric Folds? ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings, pp. 139-154, 2018, Springer, 978-3-319-99956-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Pedro Quaresma |
Automatic Deduction in an AI Geometry Book. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings, pp. 221-226, 2018, Springer, 978-3-319-99956-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Shaofan Liu, Jie Luo 0004 |
FMUS2: An Efficient Algorithm to Compute Minimal Unsatisfiable Subsets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings, pp. 104-118, 2018, Springer, 978-3-319-99956-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jose Divasón, Jesús Aransay |
A Formal Proof of the Computation of Hermite Normal Form in a General Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings, pp. 37-53, 2018, Springer, 978-3-319-99956-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Martin Strecker |
Deciding Extended Modal Logics by Combining State Space Generation and SAT Solving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings, pp. 119-135, 2018, Springer, 978-3-319-99956-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Changbo Chen, Wenyuan Wu |
Revealing Bistability in Neurological Disorder Models By Solving Parametric Polynomial Systems Geometrically. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings, pp. 170-180, 2018, Springer, 978-3-319-99956-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Dongchen Jiang, Xiaoyu Chen 0001, Xin Yang |
A Chinese New Word Detection Approach Based on Independence Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings, pp. 227-236, 2018, Springer, 978-3-319-99956-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sólrún Halla Einarsdóttir, Moa Johansson, Johannes Åman Pohjola |
Into the Infinite - Theory Exploration for Coinduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings, pp. 70-86, 2018, Springer, 978-3-319-99956-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yu Wang, Wenyuan Wu, Bican Xia |
Early Ending in Homotopy Path-Tracking for Real Roots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings, pp. 181-194, 2018, Springer, 978-3-319-99956-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Zoltán Kovács |
Discovering Geometry Theorems in Regular Polygons. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings, pp. 155-169, 2018, Springer, 978-3-319-99956-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Pengcheng Peng, Chenqi Mou, Wei-Tek Tsai |
Game-Theoretic Analysis on the Number of Participants in the Software Crowdsourcing Contest. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings, pp. 255-268, 2018, Springer, 978-3-319-99956-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoyu Chen 0001, Haotian Shuai, Dongming Wang 0001, Jing Yang 0039 |
LaTEX: A Linear Algebra Textbook System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings, pp. 209-214, 2018, Springer, 978-3-319-99956-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Wei Su 0008, Chuan Cai, Jinzhao Wu |
The Accessibility of Mathematical Formulas for the Visually Impaired in China. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings, pp. 237-242, 2018, Springer, 978-3-319-99956-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jacques D. Fleuriot, Dongming Wang 0001, Jacques Calmet (eds.) |
Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![Springer, 978-3-319-99956-2 The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Francisco Botana, Zoltán Kovács, Tomás Recio |
Towards an Automated Geometer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings, pp. 215-220, 2018, Springer, 978-3-319-99956-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | James H. Davenport |
Methodologies of Symbolic Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings, pp. 19-33, 2018, Springer, 978-3-319-99956-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | David Braun, Nicolas Magaud, Pascal Schreck |
Formalizing Some "Small" Finite Models of Projective Geometry in Coq. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings, pp. 54-69, 2018, Springer, 978-3-319-99956-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ilias S. Kotsireas, Jing Yang 0039 |
Autocorrelation via Runs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings, pp. 195-205, 2018, Springer, 978-3-319-99956-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Alan Bundy, Kwabena Nuamah, Christopher Lucas 0001 |
Automated Reasoning in the Age of the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings, pp. 3-18, 2018, Springer, 978-3-319-99956-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Tianshu Song, Feng Zhu 0005, Ke Xu 0001 |
Specialty-Aware Task Assignment in Spatial Crowdsourcing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings, pp. 243-254, 2018, Springer, 978-3-319-99956-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yaqing Jiang, Petros Papapanagiotou, Jacques D. Fleuriot |
Machine Learning for Inductive Theorem Proving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings, pp. 87-103, 2018, Springer, 978-3-319-99956-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | John Shield, Bradley D. Hopkins, Mark R. Beaumont, Chris North 0002 |
Hardware Trojans - A Systemic Threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: 13th Australasian Information Security Conference, AISC 2015, Sydney, Australia, January 2015, pp. 45-51, 2015, Australian Computer Society, 978-1-921770-43-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | Tristan Newby, Duncan A. Grove, Alex Murray, Chris A. Owen, Jim McCarthy, Chris J. North |
Annex: A Middleware for Constructing High-Assurance Software Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: 13th Australasian Information Security Conference, AISC 2015, Sydney, Australia, January 2015, pp. 25-34, 2015, Australian Computer Society, 978-1-921770-43-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | David Myers, Ernest Foo, Kenneth Radke |
Internet-wide Scanning Taxonomy and Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: 13th Australasian Information Security Conference, AISC 2015, Sydney, Australia, January 2015, pp. 61-65, 2015, Australian Computer Society, 978-1-921770-43-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | Binbin Di, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong |
Correcting flaws in Mitchell's analysis of EPBC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: 13th Australasian Information Security Conference, AISC 2015, Sydney, Australia, January 2015, pp. 57-60, 2015, Australian Computer Society, 978-1-921770-43-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | Dilshan Jayarathna, Udaya Kiran Tupakula, Vijay Varadharajan |
Hypervisor-based Security Architecture to Protect Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: 13th Australasian Information Security Conference, AISC 2015, Sydney, Australia, January 2015, pp. 15-24, 2015, Australian Computer Society, 978-1-921770-43-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | Toby J. Richer, Grant Neale, Grant Osborne |
On the E ectiveness of Virtualisation Assisted View Comparison for Rootkit Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: 13th Australasian Information Security Conference, AISC 2015, Sydney, Australia, January 2015, pp. 35-44, 2015, Australian Computer Society, 978-1-921770-43-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | Ian Welch, Xun Yi (eds.) |
13th Australasian Information Security Conference, AISC 2015, Sydney, Australia, January 2015 ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![Australian Computer Society, 978-1-921770-43-2 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | Nicholas R. Rodofile, Kenneth Radke, Ernest Foo |
Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: 13th Australasian Information Security Conference, AISC 2015, Sydney, Australia, January 2015, pp. 67-70, 2015, Australian Computer Society, 978-1-921770-43-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | Adrian Herrera, Ben Cheney |
JMD: A Hybrid Approach for Detecting Java Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: 13th Australasian Information Security Conference, AISC 2015, Sydney, Australia, January 2015, pp. 3-13, 2015, Australian Computer Society, 978-1-921770-43-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | Deepa Mani, Alireza Heravi, Kim-Kwang Raymond Choo, Sameera Mubarak |
Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: 13th Australasian Information Security Conference, AISC 2015, Sydney, Australia, January 2015, pp. 53-56, 2015, Australian Computer Society, 978-1-921770-43-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | Nishchal Kush, Ejaz Ahmed, Mark Branagan, Ernest Foo |
Poisoned GOOSE: Exploiting the GOOSE Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Twelfth Australasian Information Security Conference, AISC 2014, Auckland, New Zealand, January 2014, pp. 17-22, 2014, Australian Computer Society, 978-1-921770-32-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Janaka Seneviratne, Udaya Parampalli, Lars Kulik |
An Authorised Pseudonym System for Privacy Preserving Location Proof Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Twelfth Australasian Information Security Conference, AISC 2014, Auckland, New Zealand, January 2014, pp. 47-56, 2014, Australian Computer Society, 978-1-921770-32-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Kamini Bajaj, Josef Pieprzyk |
A Case Study of User-Level Spam Filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Twelfth Australasian Information Security Conference, AISC 2014, Auckland, New Zealand, January 2014, pp. 67-75, 2014, Australian Computer Society, 978-1-921770-32-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Dilshan Jayarathna, Udaya Kiran Tupakula, Vijay Varadharajan |
Hypervisor-based Security Architecture for Validating DNS Services (Poster). ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Twelfth Australasian Information Security Conference, AISC 2014, Auckland, New Zealand, January 2014, pp. 83-86, 2014, Australian Computer Society, 978-1-921770-32-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong |
Weak key-IV Pairs in the A5/1 Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Twelfth Australasian Information Security Conference, AISC 2014, Auckland, New Zealand, January 2014, pp. 23-36, 2014, Australian Computer Society, 978-1-921770-32-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Sajal Bhatia, Nishchal Kush, Chris I. Djamaludin, Ayodeji James Akande, Ernest Foo |
Practical Modbus Flooding Attack and Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Twelfth Australasian Information Security Conference, AISC 2014, Auckland, New Zealand, January 2014, pp. 57-65, 2014, Australian Computer Society, 978-1-921770-32-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Udaya Parampalli, Ian Welch (eds.) |
Twelfth Australasian Information Security Conference, AISC 2014, Auckland, New Zealand, January 2014 ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![Australian Computer Society, 978-1-921770-32-6 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Masood Mansoori, Ian Welch, Qiang Fu 0011 |
YALIH, Yet Another Low Interaction Honeyclient. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Twelfth Australasian Information Security Conference, AISC 2014, Auckland, New Zealand, January 2014, pp. 7-15, 2014, Australian Computer Society, 978-1-921770-32-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson |
Algebraic analysis of Trivium-like ciphers (Poster). ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Twelfth Australasian Information Security Conference, AISC 2014, Auckland, New Zealand, January 2014, pp. 77-81, 2014, Australian Computer Society, 978-1-921770-32-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Kenneth Radke, Colin Boyd, Juanma González Nieto, Mark Manulis, Douglas Stebila |
Formalising Human Recognition: a Fundamental Building Block for Security Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Twelfth Australasian Information Security Conference, AISC 2014, Auckland, New Zealand, January 2014, pp. 37-45, 2014, Australian Computer Society, 978-1-921770-32-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Juana Sendra, David Gómez 0002, Valerio Morán |
Rational Conchoid and Offset Constructions: Algorithms and Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 12th International Conference, AISC 2014, Seville, Spain, December 11-13, 2014. Proceedings, pp. 168-179, 2014, Springer, 978-3-319-13769-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Volker Sorge |
Combining Systems for Mathematical Creativity (Invited Talk). ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 12th International Conference, AISC 2014, Seville, Spain, December 11-13, 2014. Proceedings, pp. 7-8, 2014, Springer, 978-3-319-13769-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Oumaima Boussarsar, Imen Boukhris, Zied Elouedi |
A Direct Propagation Method in Singly Connected Causal Belief Networks with Conditional Distributions for all Causes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 12th International Conference, AISC 2014, Seville, Spain, December 11-13, 2014. Proceedings, pp. 64-75, 2014, Springer, 978-3-319-13769-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Salvador Lucas, José Meseguer 0001 |
Models for Logics and Conditional Constraints in Automated Proofs of Termination. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 12th International Conference, AISC 2014, Seville, Spain, December 11-13, 2014. Proceedings, pp. 9-20, 2014, Springer, 978-3-319-13769-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Gamallo-Chicano, Eugenio Roanes-Lozano, Carlos Gamallo-Amat |
A Rule-Based Expert System for Vaginal Cytology Diagnosis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 12th International Conference, AISC 2014, Seville, Spain, December 11-13, 2014. Proceedings, pp. 34-48, 2014, Springer, 978-3-319-13769-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Belaïd Benhamou |
Dynamic Symmetry Breaking in Itemset Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 12th International Conference, AISC 2014, Seville, Spain, December 11-13, 2014. Proceedings, pp. 132-146, 2014, Springer, 978-3-319-13769-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Uwe Egly, Martin Kronegger, Florian Lonsing, Andreas Pfandler |
Conformant Planning as a Case Study of Incremental QBF Solving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 12th International Conference, AISC 2014, Seville, Spain, December 11-13, 2014. Proceedings, pp. 120-131, 2014, Springer, 978-3-319-13769-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gonzalo A. Aranda-Corral, Jacques Calmet, Francisco J. Martín-Mateos (eds.) |
Artificial Intelligence and Symbolic Computation - 12th International Conference, AISC 2014, Seville, Spain, December 11-13, 2014. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![Springer, 978-3-319-13769-8 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Salvador Lucas |
Using Representation Theorems for Proving Polynomials Non-negative. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 12th International Conference, AISC 2014, Seville, Spain, December 11-13, 2014. Proceedings, pp. 21-33, 2014, Springer, 978-3-319-13769-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jesús Aransay-Azofra, Jose Divasón, Jónathan Heras, Laureano Lambán, María Vico Pascual, Ángel Luis Rubio, Julio Rubio 0001 |
Obtaining an ACL2 Specification from an Isabelle/HOL Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 12th International Conference, AISC 2014, Seville, Spain, December 11-13, 2014. Proceedings, pp. 49-63, 2014, Springer, 978-3-319-13769-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | José-Luis Ruiz-Reina |
Proving and Computing: Applying Automated Reasoning to the Verification of Symbolic Computation Systems (Invited Talk). ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 12th International Conference, AISC 2014, Seville, Spain, December 11-13, 2014. Proceedings, pp. 1-6, 2014, Springer, 978-3-319-13769-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Lardeux, Éric Monfroy |
From Declarative Set Constraint Models to "Good" SAT Instances. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 12th International Conference, AISC 2014, Seville, Spain, December 11-13, 2014. Proceedings, pp. 76-87, 2014, Springer, 978-3-319-13769-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lubjana Beshaj, Tony Shaska |
Decomposition of Some Jacobian Varieties of Dimension 3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 12th International Conference, AISC 2014, Seville, Spain, December 11-13, 2014. Proceedings, pp. 193-204, 2014, Springer, 978-3-319-13769-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Eugenio Roanes-Lozano, Antonio Hernando |
A Simple GUI for Developing Applications That Use Mathematical Software Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 12th International Conference, AISC 2014, Seville, Spain, December 11-13, 2014. Proceedings, pp. 99-119, 2014, Springer, 978-3-319-13769-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Maricarmen Martínez, Ulf Krumnack, Alan Smaill, Tarek Richard Besold, Ahmed M. H. Abdel-Fattah, Martin Schmidt 0002, Helmar Gust, Kai-Uwe Kühnberger, Markus Guhe, Alison Pease |
Algorithmic Aspects of Theory Blending. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 12th International Conference, AISC 2014, Seville, Spain, December 11-13, 2014. Proceedings, pp. 180-192, 2014, Springer, 978-3-319-13769-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Amira Essaid, Arnaud Martin, Grégory Smits, Boutheina Ben Yaghlane |
A Distance-Based Decision in the Credal Level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 12th International Conference, AISC 2014, Seville, Spain, December 11-13, 2014. Proceedings, pp. 147-156, 2014, Springer, 978-3-319-13769-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shutaro Inoue, Yosuke Sato |
A Mathematical Hierarchy of Sudoku Puzzles and Its Computation by Boolean Gröbner Bases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 12th International Conference, AISC 2014, Seville, Spain, December 11-13, 2014. Proceedings, pp. 88-98, 2014, Springer, 978-3-319-13769-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | David J. Jeffrey |
Multivalued Elementary Functions in Computer-Algebra Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Artificial Intelligence and Symbolic Computation - 12th International Conference, AISC 2014, Seville, Spain, December 11-13, 2014. Proceedings, pp. 157-167, 2014, Springer, 978-3-319-13769-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong |
Slid Pairs in the Initialisation of the A5/1 Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013, pp. 3-12, 2013, Australian Computer Society, 978-1-921770-23-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
1 | Hadi Mohammadzadeh 0002, Masood Mansoori, Ian Welch |
Evaluation of Fingerprinting Techniques and a Windows-based Dynamic Honeypot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013, pp. 59-66, 2013, Australian Computer Society, 978-1-921770-23-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
1 | Aswami Ariffin, Kim-Kwang Raymond Choo, Jill Slay |
Digital Camcorder Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013, pp. 39-48, 2013, Australian Computer Society, 978-1-921770-23-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
1 | Maryam Rajabzadeh Asaar, Ali Vardasbi, Mahmoud Salmasizadeh |
Non-Delegatable Strong Designated Verifier Signature Using a Trusted Third Party without Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013, pp. 13-25, 2013, Australian Computer Society, 978-1-921770-23-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
1 | Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk |
Anatomy of Drive-by Download Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013, pp. 49-58, 2013, Australian Computer Society, 978-1-921770-23-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
1 | Russell Paulet, Xun Yi |
Cryptanalysis of Brenner et al.'s Somewhat Homomorphic Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013, pp. 25-30, 2013, Australian Computer Society, 978-1-921770-23-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
1 | Clark D. Thomborson, Udaya Parampalli (eds.) |
Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013 ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![Australian Computer Society, 978-1-921770-23-4 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
1 | Thomas H. Morris, Rayford B. Vaughn, Elena Sitnikova |
Advances in the Protection of Critical Infrastructure by Improvement in Industrial Control System Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013, pp. 67-76, 2013, Australian Computer Society, 978-1-921770-23-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
1 | Tansu Alpcan |
A Decision and Game Theoretic Approach to Networked System Security with Applications to Power Grid (Invited Lecture). ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013, pp. 77-78, 2013, Australian Computer Society, 978-1-921770-23-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
1 | Duncan A. Grove, Alex Murray, Damien Gerhardy, Benjamin P. Turnbull, Troy Tobin, Christopher Moir |
An Overview of the Parallax BattleMind v1.5 for Computer Network Defence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013, pp. 31-38, 2013, Australian Computer Society, 978-1-921770-23-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
1 | Younes Seifi, Suriadi Suriadi, Ernest Foo, Colin Boyd |
Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Tenth Australasian Information Security Conference, AISC 2012, Melbourne, Australia, January 2012, pp. 47-58, 2012, Australian Computer Society, 978-1-921770-06-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Vorapong Suppakitpaisarn, Masato Edahiro, Hiroshi Imai |
Fast Elliptic Curve Cryptography Using Minimal Weight Conversion of d Integers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Tenth Australasian Information Security Conference, AISC 2012, Melbourne, Australia, January 2012, pp. 15-26, 2012, Australian Computer Society, 978-1-921770-06-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Chris Mills, Colin J. Fidge, Diane Corney |
Tool-Supported Dataflow Analysis of a Security-Critical Embedded Device. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Tenth Australasian Information Security Conference, AISC 2012, Melbourne, Australia, January 2012, pp. 59-70, 2012, Australian Computer Society, 978-1-921770-06-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Kaleb Lee, Juan Manuel González Nieto, Colin Boyd |
Improving the Efficiency of RFID Authentication with Pre-Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Tenth Australasian Information Security Conference, AISC 2012, Melbourne, Australia, January 2012, pp. 91-100, 2012, Australian Computer Society, 978-1-921770-06-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Christophe Hauser, Frédéric Tronel, Jason Reid, Colin J. Fidge |
A taint marking approach to confidentiality violation detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Tenth Australasian Information Security Conference, AISC 2012, Melbourne, Australia, January 2012, pp. 83-90, 2012, Australian Computer Society, 978-1-921770-06-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld |
Cryptanalysis of RC4-Based Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Tenth Australasian Information Security Conference, AISC 2012, Melbourne, Australia, January 2012, pp. 33-38, 2012, Australian Computer Society, 978-1-921770-06-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Peter Hyun-Jeen Lee, Udaya Parampalli, Shivaramakrishnan Narayan |
E cient Identity-based Signcryption without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Tenth Australasian Information Security Conference, AISC 2012, Melbourne, Australia, January 2012, pp. 3-14, 2012, Australian Computer Society, 978-1-921770-06-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Josef Pieprzyk, Clark D. Thomborson (eds.) |
Tenth Australasian Information Security Conference, AISC 2012, Melbourne, Australia, January 2012 ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![Australian Computer Society, 978-1-921770-06-7 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Margot Brereton |
Towards a Secure Human-and-Computer Mutual Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Tenth Australasian Information Security Conference, AISC 2012, Melbourne, Australia, January 2012, pp. 39-46, 2012, Australian Computer Society, 978-1-921770-06-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Ali Al-Hamdan, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong |
State convergence in the initialisation of the Sfinks stream cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Tenth Australasian Information Security Conference, AISC 2012, Melbourne, Australia, January 2012, pp. 27-32, 2012, Australian Computer Society, 978-1-921770-06-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Christopher Doble, Colin J. Fidge, Diane Corney |
Data Flow Analysis of Embedded Program Expressions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Tenth Australasian Information Security Conference, AISC 2012, Melbourne, Australia, January 2012, pp. 71-82, 2012, Australian Computer Society, 978-1-921770-06-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Colin Boyd, Josef Pieprzyk (eds.) |
Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011 ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![Australian Computer Society, 978-1-920682-96-5 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Yun Bai 0001, Khaled M. Khan |
A Modal Logic for Information System Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011, pp. 51-56, 2011, Australian Computer Society, 978-1-920682-96-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk |
Identification of Potential Malicious Web Pages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011, pp. 33-40, 2011, Australian Computer Society, 978-1-920682-96-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Toru Nakamura, Shunsuke Inenaga, Kensuke Baba, Daisuke Ikeda, Hiroto Yasuura |
An Anonymous Authentication Protocol with Single-database PIR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011, pp. 3-8, 2011, Australian Computer Society, 978-1-920682-96-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Thorsten Ries, Radu State, Andriy Panchenko 0001 |
Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011, pp. 77-86, 2011, Australian Computer Society, 978-1-920682-96-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Günther Lackner, Peter Teufl |
IEEE 802.11 Chipset Fingerprinting by the Measurement of Timing Characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011, pp. 41-50, 2011, Australian Computer Society, 978-1-920682-96-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Andrea Agnesse, Marco Pedicini |
Cube Attack in Finite Fields of Higher Order. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011, pp. 9-14, 2011, Australian Computer Society, 978-1-920682-96-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Malcolm Corney, George M. Mohay, Andrew J. Clark |
Detection of Anomalies from User Profiles Generated from System Logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011, pp. 23-32, 2011, Australian Computer Society, 978-1-920682-96-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Scott Campbell, Steve Chan, Jason Lee |
Detection of Fast Flux Service Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011, pp. 57-66, 2011, Australian Computer Society, 978-1-920682-96-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Md. Golam Kaosar, Russell Paulet, Xun Yi |
Secure Two-Party Association Rule Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011, pp. 15-22, 2011, Australian Computer Society, 978-1-920682-96-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Ben Palmer, Kris Bubendorfer, Ian Welch |
Development and Evaluation of a Secure, Privacy Preserving Combinatorial Auction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011, pp. 67-76, 2011, Australian Computer Society, 978-1-920682-96-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Georg Lippold, Juanma González Nieto |
Certificateless Key Agreement in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: 8th Australasian Information Security Conference 2010, AISC 2010, Brisbane, Australia, January 2010, pp. 75-85, 2010, Australian Computer Society, 978-1-920682-86-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Douglas Stebila, Poornaprajna Udupi, Sheueling Chang Shantz |
Multi-Factor Password-Authenticated Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: 8th Australasian Information Security Conference 2010, AISC 2010, Brisbane, Australia, January 2010, pp. 56-66, 2010, Australian Computer Society, 978-1-920682-86-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Ed Dawson, Jason Reid, Farzad Salim, Mark Burdon |
Information Sharing in the 21st century: Progress and Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: 8th Australasian Information Security Conference 2010, AISC 2010, Brisbane, Australia, January 2010, pp. 2, 2010, Australian Computer Society, 978-1-920682-86-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Farzad Salim, Jason Reid, Ed Dawson |
An Administrative Model for UCON ABC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: 8th Australasian Information Security Conference 2010, AISC 2010, Brisbane, Australia, January 2010, pp. 32-38, 2010, Australian Computer Society, 978-1-920682-86-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Kimmo Halunen, Juha Kortelainen, Tuomas Kortelainen |
Combinatorial Multicollision Attacks on Generalized Iterated Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: 8th Australasian Information Security Conference 2010, AISC 2010, Brisbane, Australia, January 2010, pp. 86-93, 2010, Australian Computer Society, 978-1-920682-86-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Maolin Tang, Colin J. Fidge |
Reconstruction of Falsified Computer Logs for Digital Forensics Investigations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: 8th Australasian Information Security Conference 2010, AISC 2010, Brisbane, Australia, January 2010, pp. 12-21, 2010, Australian Computer Society, 978-1-920682-86-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson |
An Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: 8th Australasian Information Security Conference 2010, AISC 2010, Brisbane, Australia, January 2010, pp. 67-74, 2010, Australian Computer Society, 978-1-920682-86-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Peishun Wang, Huaxiong Wang, Josef Pieprzyk |
Secure Coprocessor-based Private Information Retrieval without Periodical Preprocessing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: 8th Australasian Information Security Conference 2010, AISC 2010, Brisbane, Australia, January 2010, pp. 5-11, 2010, Australian Computer Society, 978-1-920682-86-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Natascha Chrobok, Andrew Trotman, Richard A. O'Keefe |
Advantages and vulnerabilities of pull-based email-delivery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: 8th Australasian Information Security Conference 2010, AISC 2010, Brisbane, Australia, January 2010, pp. 22-31, 2010, Australian Computer Society, 978-1-920682-86-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|