The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "IMACC"( http://dblp.L3S.de/Venues/IMACC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ima

Publication years (Num. hits)
1995 (31) 1997 (36) 1999 (36) 2001 (39) 2003 (30) 2005 (30) 2007 (25) 2009 (29) 2011 (29) 2013 (21) 2015 (20) 2017 (20) 2019 (18) 2021 (15) 2023-2024 (15)
Publication types (Num. hits)
inproceedings(379) proceedings(15)
Venues (Conferences, Journals, ...)
IMACC(394)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 141 occurrences of 116 keywords

Results
Found 394 publication records. Showing 394 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Elizabeth A. Quaglia (eds.) Cryptography and Coding - 19th IMA International Conference, IMACC 2023, London, UK, December 12-14, 2023, Proceedings Search on Bibsonomy IMACC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Shahla Atapoor Identity-Based Threshold Signatures from Isogenies. Search on Bibsonomy IMACC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Colin Putman, Keith M. Martin Selective Delegation of Attributes in Mercurial Signature Credentials. Search on Bibsonomy IMACC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Étienne Burle, Ayoub Otmani An Upper-Bound on the Decoding Failure Probability of the LRPC Decoder. Search on Bibsonomy IMACC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Cong Ling 0001, Andrew Mendelsohn Middle-Products of Skew Polynomials and Learning with Errors. Search on Bibsonomy IMACC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Wenchang Zhou, Jiqiang Lu Rectangle Attacks on Reduced Versions of the FBC Block Cipher. Search on Bibsonomy IMACC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Kento Tsuji, Tetsu Iwata Feistel Ciphers Based on a Single Primitive. Search on Bibsonomy IMACC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Claude Carlet, Serge Feukoua, Ana Salagean Coset Leaders of the First Order Reed-Muller Codes in the Classes of Niho Functions and Threshold Functions. Search on Bibsonomy IMACC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Nigel P. Smart Practical and Efficient FHE-Based MPC. Search on Bibsonomy IMACC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Xuan-Thanh Do, Dang Truong Mac, Quoc-Huy Vu zk-SNARKs from Codes with Rank Metrics. Search on Bibsonomy IMACC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Andre Esser 0001 Revisiting Nearest-Neighbor-Based Information Set Decoding. Search on Bibsonomy IMACC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Lennart Braun, Cyprien Delpech de Saint Guilhem, Robin Jadoul, Emmanuela Orsini, Nigel P. Smart, Titouan Tanguy ZK-for-Z2K: MPC-in-the-Head Zero-Knowledge Proofs for $\mathbb {Z}_{2^k}$. Search on Bibsonomy IMACC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Sermin Kocaman, Younes Talibi Alaoui Efficient Secure Two Party ECDSA. Search on Bibsonomy IMACC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Cyprien Delpech de Saint Guilhem, Ehsan Ebrahimi, Barry Van Leeuwen Zero-Knowledge Systems from MPC-in-the-Head and Oblivious Transfer. Search on Bibsonomy IMACC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Alessandro Melloni, Martijn Stam, Øyvind Ytrehus Dynamic Security Aspects of Onion Routing. Search on Bibsonomy IMACC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jiahui Liu, Satyanarayana Vusirikala Secure Multiparty Computation in the Bounded Storage Model. Search on Bibsonomy IMACC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Shoichi Hirose, Hidenori Kuwakado A Note on Quantum Collision Resistance of Double-Block-Length Compression Functions. Search on Bibsonomy IMACC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Karim Baghery, Daniele Cozzo, Robi Pedersen An Isogeny-Based ID Protocol Using Structured Public Keys. Search on Bibsonomy IMACC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Elena Kirshanova, Alexander May 0001 How to Find Ternary LWE Keys Using Locality Sensitive Hashing. Search on Bibsonomy IMACC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Hans Heum, Martijn Stam Tightness Subtleties for Multi-user PKE Notions. Search on Bibsonomy IMACC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Srinivas Vivek 0001 Attacks on a Privacy-Preserving Publish-Subscribe System and a Ride-Hailing Service. Search on Bibsonomy IMACC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Vlad-Florin Dragoi, Andreea Szocs Structural Properties of Self-dual Monomial Codes with Application to Code-Based Cryptography. Search on Bibsonomy IMACC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Travis Baumbaugh, Haley Colgate, Tim Jackman, Felice Manganiello Batch Codes from Affine Cartesian Codes and Quotient Spaces. Search on Bibsonomy IMACC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Nicolas Aragon, Maxime Bros, Philippe Gaborit Cryptanalysis of the Rank Preserving Signature. Search on Bibsonomy IMACC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Satoshi Nakamura 0004, Masaya Yasuda An Extension of Kannan's Embedding for Solving Ring-Based LWE Problems. Search on Bibsonomy IMACC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Sebastian H. Faller, Pascal Baumer, Michael Klooß, Alexander Koch 0001, Astrid Ottenhues, Markus Raiber Black-Box Accumulation Based on Lattices. Search on Bibsonomy IMACC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Maura B. Paterson (eds.) Cryptography and Coding - 18th IMA International Conference, IMACC 2021, Virtual Event, December 14-15, 2021, Proceedings Search on Bibsonomy IMACC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Hirokazu Kobayashi, Yohei Watanabe 0001, Junji Shikata Asymptotically Tight Lower Bounds in Anonymous Broadcast Encryption and Authentication. Search on Bibsonomy IMACC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Kelong Cong, Karim Eldefrawy, Nigel P. Smart Optimizing Registration Based Encryption. Search on Bibsonomy IMACC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Hao Chen 0030, Ilia Iliashenko, Kim Laine When HEAAN Meets FV: A New Somewhat Homomorphic Encryption with Reduced Memory Overhead. Search on Bibsonomy IMACC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Shyam Murthy, Srinivas Vivek 0001 Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data. Search on Bibsonomy IMACC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Helene Haagh, Michael Nielsen 0001, Claudio Orlandi Commodity-Based 2PC for Arithmetic Circuits. Search on Bibsonomy IMACC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Martin Albrecht 0001 (eds.) Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16-18, 2019, Proceedings Search on Bibsonomy IMACC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Behzad Abdolmaleki, Hamidreza Khoshakhlagh, Daniel Slamanig A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing. Search on Bibsonomy IMACC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Terry Shue Chien Lau, Chik How Tan, Theo Fanuela Prabowo Key Recovery Attacks on Some Rank Metric Code-Based Signatures. Search on Bibsonomy IMACC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Pedro Branco 0005, Jintai Ding, Manuel Goulão, Paulo Mateus A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange. Search on Bibsonomy IMACC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Claire Delaplace, Andre Esser 0001, Alexander May 0001 Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions. Search on Bibsonomy IMACC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Marcel Armour, Bertram Poettering Subverting Decryption in AEAD. Search on Bibsonomy IMACC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ramiro Martínez, Paz Morillo RLWE-Based Zero-Knowledge Proofs for Linear and Multiplicative Relations. Search on Bibsonomy IMACC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Daniele Cozzo, Nigel P. Smart Sharing the LUOV: Threshold Post-quantum Signatures. Search on Bibsonomy IMACC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Maria Dubovitskaya, Patrick Towa Efficient Fully Secure Leakage-Deterring Encryption. Search on Bibsonomy IMACC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Shingo Sato, Junji Shikata SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model. Search on Bibsonomy IMACC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nigel P. Smart, Younes Talibi Alaoui Distributing Any Elliptic Curve Based Protocol. Search on Bibsonomy IMACC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Karim Baghery Subversion-Resistant Simulation (Knowledge) Sound NIZKs. Search on Bibsonomy IMACC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Shingo Sato, Junji Shikata Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes. Search on Bibsonomy IMACC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hyang-Sook Lee, Jeongeun Park 0001 On the Security of Multikey Homomorphic Encryption. Search on Bibsonomy IMACC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Rowena Alma L. Betty, Akihiro Munemasa Classification of Self-dual Codes of Length 20 over ℤ4 and Length at Most 18 over 2+u2. Search on Bibsonomy IMACC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Maria Eichlseder, Daniel Kales, Markus Schofnegger Forgery Attacks on FlexAE and FlexAEAD. Search on Bibsonomy IMACC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Paulo S. L. M. Barreto, Shay Gueron, Tim Güneysu, Rafael Misoczki, Edoardo Persichetti, Nicolas Sendrier, Jean-Pierre Tillich CAKE: Code-Based Algorithm for Key Encapsulation. Search on Bibsonomy IMACC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Essam Ghadafi Subset Signatures with Controlled Context-Hiding. Search on Bibsonomy IMACC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ali El Kaafarani, Essam Ghadafi Attribute-Based Signatures with User-Controlled Linkability Without Random Oracles. Search on Bibsonomy IMACC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1James Dyer, Martin E. Dyer, Jie Xu 0007 Practical Homomorphic Encryption Over the Integers for Secure Computation in the Cloud. Search on Bibsonomy IMACC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Raghvendra Rohit 0001, Riham AlTawy, Guang Gong MILP-Based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher. Search on Bibsonomy IMACC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Essam Ghadafi How Low Can You Go? Short Structure-Preserving Signatures for Diffie-Hellman Vectors. Search on Bibsonomy IMACC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Taechan Kim 0001, Changmin Lee 0001 Lattice Reductions over Euclidean Rings with Applications to Cryptanalysis. Search on Bibsonomy IMACC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sarah McCarthy, Neil Smyth, Elizabeth O'Sullivan A Practical Implementation of Identity-Based Encryption Over NTRU Lattices. Search on Bibsonomy IMACC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thierry Mefenza, Damien Vergnaud Lattice Attacks on Pairing-Based Signatures. Search on Bibsonomy IMACC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Máire O'Neill (eds.) Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings Search on Bibsonomy IMACC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ayan Mahalanobis, Pralhad Shinde Bilinear Cryptography Using Groups of Nilpotency Class 2. Search on Bibsonomy IMACC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Helene Haagh, Yue Ji, Chenxing Li, Claudio Orlandi, Yifan Song Revealing Encryption for Partial Ordering. Search on Bibsonomy IMACC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chik How Tan, Theo Fanuela Prabowo Orthogonal MDS Diffusion Matrices over Galois Rings. Search on Bibsonomy IMACC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Martin R. Albrecht, Alex Davidson, Enrique Larraia Notes on GGH13 Without the Presence of Ideals. Search on Bibsonomy IMACC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ryo Hiromasa, Yutaka Kawai Dynamic Multi Target Homomorphic Attribute-Based Encryption. Search on Bibsonomy IMACC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marco Frego On the Probability of Incorrect Decoding for Linear Codes. Search on Bibsonomy IMACC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peter Scholl, Nigel P. Smart, Tim Wood 0003 When It's All Just Too Much: Outsourcing MPC-Preprocessing. Search on Bibsonomy IMACC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Michael Scott A Note on the Implementation of the Number Theoretic Transform. Search on Bibsonomy IMACC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lucas Schabhüser, Johannes Buchmann 0001, Patrick Struck A Linearly Homomorphic Signature Scheme from Weaker Assumptions. Search on Bibsonomy IMACC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Han Zhang 0004 Improvement on Minimum Distance of Symbol-Pair Codes. Search on Bibsonomy IMACC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Claude Crépeau, Raza Ali Kazmi Zero-Knowledge Interactive Proof Systems for New Lattice Problems. Search on Bibsonomy IMACC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shota Goto, Junji Shikata A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer. Search on Bibsonomy IMACC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christian Badertscher, Christian Matt 0002, Ueli Maurer, Phillip Rogaway, Björn Tackmann Robust Authenticated Encryption and the Limits of Symmetric Cryptography. Search on Bibsonomy IMACC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Daniel P. Martin 0001, Elisabeth Oswald, Martijn Stam, Marcin Wójcik A Leakage Resilient MAC. Search on Bibsonomy IMACC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Janaka Alawatugoda 0001, Douglas Stebila, Colin Boyd Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. Search on Bibsonomy IMACC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Guy Barwell, Daniel Page, Martijn Stam Rogue Decryption Failures: Reconciling AE Robustness Notions. Search on Bibsonomy IMACC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Giuseppe Ateniese, Antonio Faonio, Seny Kamara Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage. Search on Bibsonomy IMACC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jian Liu 0004, Sihem Mesnager, Lusheng Chen On the Diffusion Property of Iterated Functions. Search on Bibsonomy IMACC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wenbin Zhang 0003, Chik How Tan MI-T-HFE, A New Multivariate Signature Scheme. Search on Bibsonomy IMACC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maciej Skórski Shannon Entropy Versus Renyi Entropy from a Cryptographic Viewpoint. Search on Bibsonomy IMACC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kazuhiko Minematsu, Tetsu Iwata Tweak-Length Extension for Tweakable Blockciphers. Search on Bibsonomy IMACC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Grigory Kabatiansky, Serge G. Vladut, Cédric Tavernier On the Doubly Sparse Compressed Sensing Problem. Search on Bibsonomy IMACC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sihem Mesnager, Gérard D. Cohen, David Madore On Existence (Based on an Arithmetical Problem) and Constructions of Bent Functions. Search on Bibsonomy IMACC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, Hoeteck Wee Security Against Related Randomness Attacks via Reconstructive Extractors. Search on Bibsonomy IMACC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mónica C. Liberatori, Leonardo J. Arnone, Jorge Castiñeira Moreira, Patrick Guy Farrell Soft Distance Metric Decoding of Polar Codes. Search on Bibsonomy IMACC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jens Groth (eds.) Cryptography and Coding - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings Search on Bibsonomy IMACC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nese Koçak, Sihem Mesnager, Ferruh Özbudak Bent and Semi-bent Functions via Linear Translators. Search on Bibsonomy IMACC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Richard Winter, Ana Salagean, Raphael C.-W. Phan Comparison of Cube Attacks Over Different Vector Spaces. Search on Bibsonomy IMACC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1David Derler, Christian Hanser, Daniel Slamanig A New Approach to Efficient Revocable Attribute-Based Anonymous Credentials. Search on Bibsonomy IMACC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Torleiv Kløve Codes of Length 2 Correcting Single Errors of Limited Size. Search on Bibsonomy IMACC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pierre-Alain Fouque, Pierre Karpman Security Amplification against Meet-in-the-Middle Attacks Using Whitening. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Essam Ghadafi Sub-linear Blind Ring Signatures without Random Oracles. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1David Galindo, Srinivas Vivek 0001 A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter Secure Key Management in the Cloud. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bart Mennink Indifferentiability of Double Length Compression Functions. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Joppe W. Bos, Kristin E. Lauter, Jake Loftus, Michael Naehrig Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gérard D. Cohen, Sihem Mesnager, Alain Patey On Minimal and Quasi-minimal Linear Codes. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Carlos Aguilar Melchor, Slim Bettaieb, Philippe Gaborit, Julien Schrek A Code-Based Undeniable Signature Scheme. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Joop van de Pol, Nigel P. Smart Estimating Key Sizes for High Dimensional Lattice-Based Systems. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Somindu C. Ramanna, Palash Sarkar 0001 Anonymous Constant-Size Ciphertext HIBE from Asymmetric Pairings. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1David Gardner, Ana Salagean, Raphael C.-W. Phan Efficient Generation of Elementary Sequences. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Martijn Stam (eds.) Cryptography and Coding - 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 394 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license