The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SCN"( http://dblp.L3S.de/Venues/SCN )

URL (DBLP): http://dblp.uni-trier.de/db/conf/scn

Publication years (Num. hits)
2002 (26) 2003-2004 (27) 2005-2006 (27) 2008 (28) 2010 (29) 2012 (32) 2014 (35) 2016 (32) 2018 (31) 2020 (34) 2022 (34)
Publication types (Num. hits)
inproceedings(324) proceedings(11)
Venues (Conferences, Journals, ...)
SCN(335)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 93 occurrences of 83 keywords

Results
Found 335 publication records. Showing 335 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Tatiana Bradley, Sky Faber, Gene Tsudik Bounded Size-Hiding Private Set Intersection. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yuyu Wang 0001, Takahiro Matsuda 0002, Goichiro Hanaoka, Keisuke Tanaka Signatures Resilient to Uninvertible Leakage. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Christof Beierle Pen and Paper Arguments for SIMON and SIMON-like Designs. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Matthew D. Green, Jonathan Katz, Alex J. Malozemoff, Hong-Sheng Zhou A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Georg Fuchsbauer, Christian Hanser, Chethan Kamath, Daniel Slamanig Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Amos Beimel, Oriol Farràs, Naty Peter Secret Sharing Schemes for Dense Forbidden Graphs. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ran Cohen, Chris Peikert On Adaptively Secure Multiparty Computation with a Short CRS. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Carsten Baum On Garbling Schemes with and Without Privacy. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alexandra Boldyreva, Taesoo Kim, Richard J. Lipton, Bogdan Warinschi Provably-Secure Remote Memory Attestation for Heap Overflow Protection. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yi Deng 0002, Juan A. Garay, San Ling, Huaxiong Wang, Moti Yung On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Arno Mittelbach, Daniele Venturi 0001 Fiat-Shamir for Highly Sound Protocols Is Instantiable. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zvika Brakerski, Or Dagmi Shorter Circuit Obfuscation in Challenging Security Models. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rafaël del Pino, Vadim Lyubashevsky, David Pointcheval The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Eiichiro Fujisaki Improving Practical UC-Secure Commitments Based on the DDH Assumption. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ashish Choudhury, Emmanuela Orsini, Arpita Patra, Nigel P. Smart Linear Overhead Optimally-Resilient Robust MPC Using Preprocessing. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Chris Peikert How (Not) to Instantiate Ring-LWE. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Silvio Biagioni, Daniel Masny, Daniele Venturi 0001 Naor-Yung Paradigm with Shared Randomness and Applications. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Brett Hemenway, Steve Lu 0001, Rafail Ostrovsky, William Welser IV High-Precision Secure Computation of Satellite Collision Probabilities. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Robert R. Enderlein, Ueli Maurer Memory Erasability Amplification. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Trotta Gnam Zero-Knowledge Made Easy so It Won't Make You Dizzy - (A Tale of Transaction Put in Verse About an Illicit Kind of Commerce). Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shlomi Dolev, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky, Moti Yung Proactive Secret Sharing with a Dishonest Majority. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jie Chen 0021, Benoît Libert, Somindu C. Ramanna Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Carmit Hazay, Muthuramakrishnan Venkitasubramaniam What Security Can We Achieve Within 4 Rounds? Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Leonid Reyzin, Sophia Yakoubov Efficient Asynchronous Accumulators for Distributed PKI. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Antonio Marcedone, Rafael Pass, Abhi Shelat Bounded KDM Security from iO and OWF. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nuttapong Attrapadung, Goichiro Hanaoka, Kazuto Ogawa, Go Ohtake, Hajime Watanabe, Shota Yamada 0001 Attribute-Based Encryption for Range Attributes. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dario Catalano, Mario Di Raimondo, Simone Faro Verifiable Pattern Matching on Outsourced Texts. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin Virtual Smart Cards: How to Sign with a Password and a Server. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Carmit Hazay, Hila Zarosim The Feasibility of Outsourced Database Search in the Plain Model. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vassilis Zikas, Roberto De Prisco (eds.) Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rafail Ostrovsky, Vanishree Rao, Ivan Visconti On Selective-Opening Attacks against Encryption Schemes. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nikolaos Makriyannis On the Classification of Finite Boolean Functions up to Fairness. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Antonio Marcedone, Claudio Orlandi Obfuscation ⇒ (IND-CPA Security !⇒ Circular Security). Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yusuke Naito 0001, Kazuo Ohta Improved Indifferentiable Security Analysis of PHOTON. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Joshua Lampkins, Rafail Ostrovsky Communication-Efficient MPC for General Adversary Structures. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Katsuyuki Takashima Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Abhishek Jain 0002, Omkant Pandey Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Takashi Yamakawa, Shota Yamada 0001, Koji Nuida, Goichiro Hanaoka, Noboru Kunihiro Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jason Perry, Debayan Gupta, Joan Feigenbaum, Rebecca N. Wright Systematizing Secure Computation for Research and Decision Support. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yevgeniy Dodis, Dario Fiore 0001 Interactive Encryption and Message Authentication. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dario Catalano Homomorphic Signatures and Message Authentication Codes. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Helger Lipmaa Efficient NIZK Arguments via Parallel Verification of Benes Networks. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Georg Fuchsbauer Constrained Verifiable Random Functions. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Joël Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov Key-Indistinguishable Message Authentication Codes. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1David Pointcheval, Olivier Sanders Forward Secure Non-Interactive Key Exchange. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Daniel V. Bailey, Markus Dürmuth, Christof Paar Statistics on Password Re-use and Adaptive Strength for Financial Accounts. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Carsten Baum, Ivan Damgård, Claudio Orlandi Publicly Auditable Secure Multi-Party Computation. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yu Sasaki, Lei Wang 0031 Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen Faster Maliciously Secure Two-Party Computation Using the GPU. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michel Abdalla, Roberto De Prisco (eds.) Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Vladimir Kolesnikov, Charles Rackoff, Yevgeniy Vahlis Secure Key Exchange and Sessions without Credentials. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sanjam Garg Program Obfuscation via Multilinear Maps. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1David Naccache, Rainer Steinwandt, Adriana Suárez Corona, Moti Yung Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yu Chen 0003, Zongyang Zhang Publicly Evaluable Pseudorandom Functions and Their Applications. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ashish Choudhury, Arpita Patra, Nigel P. Smart Reducing the Overhead of MPC over a Large Population. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Paul Giura, Vladimir Kolesnikov, Aris Tentes, Yevgeniy Vahlis Efficient Network-Based Enforcement of Data Access Rights. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jie Chen 0021, Hoeteck Wee Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Eduarda S. V. Freire 0001, Julia Hesse, Dennis Hofheinz Universally Composable Non-Interactive Key Exchange. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Andrea G. Forte, Juan A. Garay, Trevor Jim, Yevgeniy Vahlis EyeDecrypt - Private Interactions in Plain Sight. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi Proofs of Space: When Space Is of the Essence. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hoeteck Wee Functional Encryption and Its Impact on Cryptography. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Omkant Pandey, Kim Ramchen, Brent Waters Relaxed Two-to-One Recoding Schemes. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nikolaos P. Karvelas, Aggelos Kiayias Efficient Proofs of Secure Erasure. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Rasmus Lauritsen, Tomas Toft An Empirical Study and Some Improvements of the MiniMac Protocol for Secure Computation. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Muthuramakrishnan Venkitasubramaniam On Adaptively Secure Protocols. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gottfried Herold, Alexander Meurer New Attacks for Knapsack Based Cryptosystems. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Björn Terelius, Douglas Wikström Efficiency Limitations of Σ-Protocols for Group Homomorphisms Revisited. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Gregory Neven Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Guilhem Castagnos, Fabien Laguillaumie Homomorphic Encryption for Multiplications and Pairing Evaluation. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Steven A. Myers, Mona Sergi, Abhi Shelat Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Céline Blondeau, Benoît Gérard, Kaisa Nyberg Multiple Differential Cryptanalysis Using LLR and χ 2 Statistics. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Adriana López-Alt Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Seung Geol Choi, Dana Dachman-Soled, Moti Yung On the Centrality of Off-Line E-Cash to Concrete Partial Information Games. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Marc Fischlin, Anja Lehmann, Dominique Schröder History-Free Sequential Aggregate Signatures. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Arno Mittelbach Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Joshua Baron, Karim El Defrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler 5PM: Secure Pattern Matching. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila Publicly Verifiable Ciphertexts. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xiang Xie, Rui Xue 0001, Rui Zhang 0002 Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Melissa Chase, Markulf Kohlweiss A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ching-Hua Yu, Bo-Yin Yang Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Enrico Thomae Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vladimir Kolesnikov, Ranjit Kumaresan Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Marcel Keller, Enrique Larraia, Christian Miles, Nigel P. Smart Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Stelios Erotokritou, Yvo Desmedt Human Perfectly Secure Message Transmission Protocols and Their Applications. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Duong Hieu Phan, David Pointcheval, Mario Strefler Decentralized Dynamic Broadcast Encryption. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld Active Security in Multiparty Computation over Black-Box Groups. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Tetsuya Izu On the Strength Comparison of the ECDLP and the IFP. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kohei Kasamatsu, Takahiro Matsuda 0002, Keita Emura, Nuttapong Attrapadung, Goichiro Hanaoka, Hideki Imai Time-Specific Encryption from Forward-Secure Encryption. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Helger Lipmaa, Bingsheng Zhang A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ivan Visconti, Roberto De Prisco (eds.) Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Gregory Neven, Markus Rückert Fully Anonymous Attribute Tokens from Lattices. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Olivier Blazy, David Pointcheval, Damien Vergnaud Compact Round-Optimal Partially-Blind Signatures. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kenji Yasunaga Public-Key Encryption with Lazy Parties. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vladimir Kolesnikov MAC Aggregation with Message Multiplicity. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev Efficient Structure-Preserving Signature Scheme from Standard Assumptions. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Margarita Vald Universally Composable Security with Local Adversaries. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart Ring Switching in BGV-Style Homomorphic Encryption. Search on Bibsonomy SCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Markulf Kohlweiss, Claudio Soriente Solving Revocation with Efficient Update of Anonymous Credentials. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Adam L. Young, Moti Yung Kleptography from Standard Assumptions and Applications. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 335 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license