The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "TCC"( http://dblp.L3S.de/Venues/TCC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/tcc

Publication years (Num. hits)
2004 (29) 2005 (33) 2006 (32) 2007 (32) 2008 (35) 2009 (36) 2010 (36) 2011 (38) 2012 (37) 2013 (42) 2014 (31)
Publication types (Num. hits)
inproceedings(370) proceedings(11)
Venues (Conferences, Journals, ...)
TCC(381)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 58 occurrences of 51 keywords

Results
Found 381 publication records. Showing 381 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova 0001 Two-Round Secure MPC from Indistinguishability Obfuscation. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai Obfuscation for Evasive Functions. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alexandra Berkoff, Feng-Hao Liu Leakage Resilient Fully Homomorphic Encryption. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shashank Agrawal, Prabhanjan Ananth, Vipul Goyal, Manoj Prabhakaran 0001, Alon Rosen Lower Bounds in the Hardware Token Model. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dana Dachman-Soled, Mohammad Mahmoody, Tal Malkin Can Optimally-Fair Coin Tossing Be Based on One-Way Functions? Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Martin Hirt, Ueli Maurer, Pavel Raykov Broadcast Amplification. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Claudio Orlandi, Rafail Ostrovsky, Vanishree Rao, Amit Sahai, Ivan Visconti Statistical Concurrent Non-malleable Zero Knowledge. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohammad Mahmoody, Hemanta K. Maji, Manoj Prabhakaran 0001 On the Power of Public-Key Encryption in Secure Computation. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi 0001 Continuous Non-malleable Codes. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yuval Ishai, Mor Weiss Probabilistically Checkable Proofs of Proximity with Zero-Knowledge. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yehuda Lindell (eds.) Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dana Dachman-Soled, Yael Tauman Kalai Securing Circuits and Protocols against 1/poly(k) Tampering Rate. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Takahiro Matsuda 0002 On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kai-Min Chung, Rafail Ostrovsky, Rafael Pass, Muthuramakrishnan Venkitasubramaniam, Ivan Visconti 4-Round Resettably-Sound Zero Knowledge. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mahdi Cheraghchi, Venkatesan Guruswami Non-malleable Coding against Bit-Wise and Split-State Tampering. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Elette Boyle, Kai-Min Chung, Rafael Pass On Extractability Obfuscation. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dennis Hofheinz, Andy Rupp Standard versus Selective Opening Security: Separation and Equivalence Results. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Amos Beimel, Aner Ben-Efraim, Carles Padró, Ilya Tyomkin Multi-linear Secret-Sharing Schemes. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zvika Brakerski, Guy N. Rothblum Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dimitar Jetchev, Krzysztof Pietrzak How to Fake Auxiliary Input. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky Locally Updatable and Locally Decodable Codes. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gilad Asharov Towards Characterizing Complete Fairness in Secure Two-Party Computation. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Carmit Hazay, Arpita Patra One-Sided Adaptively Secure Two-Party Computation. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hoeteck Wee Dual System Encryption via Predicate Encodings. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Amos Beimel, Yuval Ishai, Ranjit Kumaresan, Eyal Kushilevitz On the Cryptographic Complexity of the Worst Functions. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Takahiro Matsuda 0002, Goichiro Hanaoka Chosen Ciphertext Security via Point Obfuscation. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Masayuki Abe, Jan Camenisch, Rafael Dowsley, Maria Dubovitskaya On the Impossibility of Structure-Preserving Deterministic Primitives. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Omkant Pandey Achieving Constant Round Leakage-Resilient Zero-Knowledge. Search on Bibsonomy TCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shiva Prasad Kasiviswanathan, Kobbi Nissim, Sofya Raskhodnikova, Adam D. Smith Analyzing Graphs with Node Differential Privacy. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn Succinct Malleable NIZKs and an Application to Compact Shuffles. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohammad Mahmoody, David Xiao Languages with Efficient Zero-Knowledge PCPs are in SZK. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dario Catalano, Dario Fiore 0001, Rosario Gennaro, Konstantinos Vamvourellis Algebraic (Trapdoor) One-Way Functions and Their Applications. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Serge Fehr, Jonathan Katz, Fang Song 0001, Hong-Sheng Zhou, Vassilis Zikas Feasibility and Completeness of Cryptographic Tasks in the Quantum World. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid Multi-Client Non-interactive Verifiable Computation. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Iftach Haitner, Eran Omri, Hila Zarosim Limits on the Usefulness of Random Oracles. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Benny Applebaum Cryptographic Hardness of Random Local Functions-Survey. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Prabhanjan Ananth, Raghav Bhaskar, Vipul Goyal, Vanishree Rao On the (In)security of Fischlin's Paradigm. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Steven A. Myers, Mona Sergi, Abhi Shelat Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Eleanor Birrell, Kai-Min Chung, Rafael Pass, Sidharth Telang Randomness-Dependent Message Security. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nico Döttling, Thilo Mie, Jörn Müller-Quade, Tobias Nilges Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yuval Ishai, Eyal Kushilevitz, Sigurd Meldgaard, Claudio Orlandi, Anat Paskin-Cherniavsky On the Power of Correlated Randomness in Secure Computation. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Charalampos Papamanthou, Elaine Shi, Roberto Tamassia Signatures of Correct Computation. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rafael Pass Unprovable Security of Perfect NIZK and Non-interactive Non-malleable Commitments. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor Hardness Preserving Reductions via Cuckoo Hashing. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Huijia Lin, Omer Paneth Public-Coin Concurrent Zero-Knowledge in the Global Hash Model. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zvika Brakerski When Homomorphism Becomes a Liability. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Craig Gentry Encrypted Messages from the Heights of Cryptomania. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yevgeniy Dodis, Yu Yu 0001 Overcoming Weak Expectations. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xavier Boyen Attribute-Based Functional Encryption on Lattices. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tal Malkin Secure Computation for Big Data. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yehuda Lindell, Hila Zarosim On the Feasibility of Extending Oblivious Transfer. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Sarah Zakarias Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Benny Applebaum Garbling XOR Gates "For Free" in the Standard Model. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gilad Asharov, Yehuda Lindell, Tal Rabin A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth Erratum: Succinct Non-interactive Arguments via Linear Interactive Proofs. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Amit Sahai (eds.) Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jonathan Katz, Ueli Maurer, Björn Tackmann, Vassilis Zikas Universally Composable Synchronous Computation. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Steve Lu 0001, Rafail Ostrovsky Distributed Oblivious RAM for Secure Two-Party Computation. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kfir Barhum, Thomas Holenstein A Cookbook for Black-Box Separations and a Recipe for UOWHFs. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1R. Amzi Jeffs, Mike Rosulek Characterizing the Cryptographic Properties of Reactive 2-Party Functionalities. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth Succinct Non-interactive Arguments via Linear Interactive Proofs. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohammad Hajiabadi, Bruce M. Kapron Computational Soundness of Coinductive Symbolic Security under Active Attacks. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Elette Boyle, Shafi Goldwasser, Stefano Tessaro Communication Locality in Secure Multi-party Computation - How to Run Sublinear Algorithms in a Distributed Setting. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kashyap Dixit, Madhav Jha, Sofya Raskhodnikova, Abhradeep Thakurta Testing the Lipschitz Property over Product Distributions with Applications to Data Privacy. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Vipul Goyal, Abhishek Jain 0002, Rafail Ostrovsky, Silas Richelson, Ivan Visconti Concurrent Zero Knowledge in the Bounded Player Model. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Stephan Krenn, Krzysztof Pietrzak, Akshay Wadia A Counterexample to the Chain Rule for Conditional HILL Entropy - And What Deniable Encryption Has to Do with It. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ron Rothblum On the Circular Security of Bit-Encryption. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1David Xiao Errata to (Nearly) Round-Optimal Black-Box Constructions of Commitments Secure against Selective Opening Attacks. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nir Bitansky, Dana Dachman-Soled, Sanjam Garg, Abhishek Jain 0002, Yael Tauman Kalai, Adriana López-Alt, Daniel Wichs Why "Fiat-Shamir for Proofs" Lacks a Proof. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rafail Ostrovsky, Vanishree Rao, Alessandra Scafuro, Ivan Visconti Revisiting Lower and Upper Bounds for Selective Decommitments. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Anupam Gupta 0001, Aaron Roth 0001, Jonathan R. Ullman Iterative Constructions and Private Data Release. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vipul Goyal, Virendra Kumar, Satyanarayana V. Lokam, Mohammad Mahmoody On Black-Box Reductions between Predicate Encryption Schemes. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Krzysztof Pietrzak, Alon Rosen, Gil Segev 0001 Lossy Functions Do Not Amplify Well. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dario Fiore 0001, Dominique Schröder Uniqueness Is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Itay Berman, Iftach Haitner From Non-adaptive to Adaptive Pseudorandom Functions. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shafi Goldwasser, Allison B. Lewko, David A. Wilson Bounded-Collusion IBE from Key Homomorphism. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nishanth Chandran, Melissa Chase, Vinod Vaikuntanathan Functional Re-encryption and Collusion-Resistant Obfuscation. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Stefan Dziembowski, Sebastian Faust Leakage-Resilient Circuits without Computational Assumptions. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zvika Brakerski, Yael Tauman Kalai A Parallel Repetition Theorem for Leakage Resilience. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nir Bitansky, Omer Paneth Point Obfuscation and 3-Round Zero-Knowledge. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Helger Lipmaa Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yuval Ishai, Mohammad Mahmoody, Amit Sahai On Efficient Zero-Knowledge PCPs. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jae Hong Seo, Jung Hee Cheon Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Sebastian Faust, Carmit Hazay Secure Two-Party Computation with Low Communication. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Benoît Libert, Moti Yung Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Anindya De Lower Bounds in Differential Privacy. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters Computing on Authenticated Data. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yevgeniy Dodis, Abhishek Jain 0002, Tal Moran, Daniel Wichs Counterexamples to Hardness Amplification beyond Negligible. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou On the Security of the "Free-XOR" Technique. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nir Bitansky, Ran Canetti, Shai Halevi Leakage-Tolerant Interactive Protocols. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dimitar Jetchev, Onur Özen, Martijn Stam Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yevgeniy Dodis, Iftach Haitner, Aris Tentes On the Instantiability of Hash-and-Sign RSA Signatures. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kai-Min Chung, Rafael Pass, Wei-Lung Dustin Tseng The Knowledge Tightness of Parallel Zero-Knowledge. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Chongwon Cho, Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti Simultaneously Resettable Arguments of Knowledge. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Benny Applebaum, Andrej Bogdanov, Alon Rosen A Dichotomy for Local Small-Bias Generators. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Benjamin Fuller 0001, Adam O'Neill, Leonid Reyzin A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yevgeniy Dodis, Thomas Ristenpart, Salil P. Vadhan Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 381 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license