The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for CAS with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1967-1978 (17) 1982-1988 (16) 1989-1993 (23) 1994-1996 (20) 1997 (16) 1998-1999 (21) 2000-2001 (41) 2002 (38) 2003 (37) 2004 (52) 2005 (78) 2006 (77) 2007 (70) 2008 (81) 2009 (60) 2010 (53) 2011 (29) 2012 (38) 2013 (32) 2014 (46) 2015 (36) 2016 (57) 2017 (134) 2018 (102) 2019 (62) 2020 (54) 2021 (58) 2022 (54) 2023 (63) 2024 (5)
Publication types (Num. hits)
article(399) book(9) data(1) incollection(6) inproceedings(824) phdthesis(225) proceedings(6)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 460 occurrences of 346 keywords

Results
Found 1499 publication records. Showing 1470 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
26Alexandru Uta, Ove Danner, Cas van der Weegen, Ana-Maria Oprescu, Andreea Sandu, Stefania Costache 0002, Thilo Kielmann MemEFS: A network-aware elastic in-memory runtime distributed file system. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Jiangshan Yu, Mark Ryan 0001, Cas Cremers DECIM: Detecting Endpoint Compromise In Messaging. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Liliya R. Akhmetzyanova, Cas Cremers, Luke Garratt, Stanislav V. Smyshlyaev Security Analysis for Randomness Improvements for Security Protocols. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
26Thanh Binh Nguyen 0003, Christoph Sprenger 0001, Cas Cremers Abstractions for security protocol verification. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26David A. Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Katriel Cohn-Gordon, Cas Cremers, Luke Garratt, Jon Millican, Kevin Milner On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Yanick Douven, Wouter Houtman, Ferry Schoenmakers, Koen Meessen, Harrie van de Loo, Dennis Bruijnen, Wouter H. T. M. Aangenent, Jorrit Olthuis, Cas de Groot, Marzieh Dolatabadi Farahani, Peter van Lith, Pim Scheers, Ruben Sommer, Bob van Ninhuijs, Patrick van Brakel, Jordy Senden, Marjon van't Klooster, Wouter Kuijpers, René van de Molengraft Tech United Eindhoven Middle Size League Winner 2018. Search on Bibsonomy RoboCup The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Cas Cremers, Anja Lehmann (eds.) Security Standardisation Research - 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings Search on Bibsonomy SSR The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26David A. Basin, Cas Cremers, Jannik Dreier, Ralf Sasse Symbolically analyzing security protocols using tamarin. Search on Bibsonomy ACM SIGLOG News The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila ASICS: authenticated key exchange security incorporating certification systems. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Arnaud Arindra Adiyoso Setio, Alberto Traverso, Thomas de Bel, Moira S. N. Berens, Cas van den Bogaard, Piergiorgio Cerello, Hao Chen 0011, Qi Dou 0001, Maria Evelina Fantacci, Bram Geurts, Robbert van der Gugten, Pheng-Ann Heng, Bart Jansen, Michael M. J. de Kaste, Valentin Kotov, Jack Yu-Hung Lin, Jeroen T. M. C. Manders, Alexander Sónora-Mengana, Juan Carlos García-Naranjo, Evgenia Papavasileiou, Mathias Prokop Validation, comparison, and combination of algorithms for automatic detection of pulmonary nodules in computed tomography images: The LUNA16 challenge. Search on Bibsonomy Medical Image Anal. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Cas Cremers, Lucca Hirschi Improving Automated Symbolic Analysis for E-voting Protocols: A Method Based on Sufficient Conditions for Ballot Secrecy. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
26Katriel Cohn-Gordon, Cas Cremers Mind the Gap: Where Provable Security and Real-World Messaging Don't Quite Meet. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
26Katriel Cohn-Gordon, Cas Cremers, Luke Garratt, Jon Millican, Kevin Milner On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
26Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan 0001 Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
26Cas Cremers, Marko Horvat 0002, Jonathan Hoyland, Sam Scott, Thyla van der Merwe A Comprehensive Symbolic Analysis of TLS 1.3. Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan 0001 Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila A Formal Security Analysis of the Signal Messaging Protocol. Search on Bibsonomy EuroS&P The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Martijn J. L. Kors, Karel Millenaar, Erik D. Van der Spek, Gabriele Ferri 0001, Ben A. M. Schouten, Alyea Sandovar, Cas Ketel, Joris Dormans Arguing on the Holodeck.: Designing Immersive Interactive Entertainment with Persuasive Intent. Search on Bibsonomy CHI PLAY (Companion) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Cas Cremers, Martin Dehnel-Wild, Kevin Milner Secure Authentication in the Grid: A Formal Analysis of DNP3: SAv5. Search on Bibsonomy ESORICS (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Cas Cremers Symbolic security analysis using the Tamarin prover. Search on Bibsonomy FMCAD The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Cas Cremers, Marko Horvat 0002 Improving the ISO/IEC 11770 standard for key management techniques. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Arnaud Arindra Adiyoso Setio, Alberto Traverso, Thomas de Bel, Moira S. N. Berens, Cas van den Bogaard, Piergiorgio Cerello, Hao Chen 0011, Qi Dou 0001, Maria Evelina Fantacci, Bram Geurts, Robbert van der Gugten, Pheng-Ann Heng, Bart Jansen, Michael M. J. de Kaste, Valentin Kotov, Jack Yu-Hung Lin, Jeroen T. M. C. Manders, Alexander Sónora-Mengana, Juan Carlos García-Naranjo, Mathias Prokop, Marco Saletta, Cornelia Schaefer-Prokop, Ernst Th. Scholten, Luuk Scholten, Miranda M. Snoeren, Ernesto Lopez Torres, Jef Vandemeulebroucke, Nicole Walasek, Guido C. A. Zuidhof, Bram van Ginneken, Colin Jacobs Validation, comparison, and combination of algorithms for automatic detection of pulmonary nodules in computed tomography images: the LUNA16 challenge. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
26Katriel Cohn-Gordon, Cas Cremers, Luke Garratt On Post-Compromise Security. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
26Ilias Giechaskiel, Cas Cremers, Kasper Bonne Rasmussen On Bitcoin Security in the Presence of Broken Crypto Primitives. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
26Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila A Formal Security Analysis of the Signal Messaging Protocol. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
26Katriel Cohn-Gordon, Cas Cremers, Luke Garratt On Post-compromise Security. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Hanshen Xiao, Cas Cremers, Hari Krishna Garg Symmetric polynomial & CRT based algorithms for multiple frequency determination from undersampled waveforms. Search on Bibsonomy GlobalSIP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Martijn J. L. Kors, Gabriele Ferri 0001, Erik D. Van der Spek, Cas Ketel, Ben A. M. Schouten A Breathtaking Journey. On the Design of an Empathy-Arousing Mixed-Reality Game. Search on Bibsonomy CHI PLAY The full citation details ... 2016 DBLP  BibTeX  RDF
26Ilias Giechaskiel, Cas Cremers, Kasper Bonne Rasmussen On Bitcoin Security in the Presence of Broken Cryptographic Primitives. Search on Bibsonomy ESORICS (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Cas Cremers, Marko Horvat 0002, Sam Scott, Thyla van der Merwe Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Cas Cremers, Michèle Feltz Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26David A. Basin, Cas Cremers, Kunihiko Miyazaki, Sasa Radomirovic, Dai Watanabe Improving the Security of Cryptographic Protocol Standards. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Jiangshan Yu, Mark Ryan 0001, Cas Cremers How to detect unauthorised usage of a key. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
26Andrew C. Simpson, Andrew P. Martin, Cas Cremers, Ivan Flechais, Ivan Martinovic, Kasper Bonne Rasmussen Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security. Search on Bibsonomy ICSE (2) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26David A. Basin, Cas Cremers Know Your Enemy: Compromising Adversaries in Protocol Analysis. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Michèle Feltz, Cas Cremers On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
26Ajay Kapoor, Cas Groot, Gerard Villar Pique, Hamed Fatemi, Juan Diego Echeverri, Leo Sevat, Maarten Vertregt, Maurice Meijer, Vibhu Sharma, Yu Pu, José Pineda de Gyvez Digital Systems Power Management for High Performance Mixed Signal Platforms. Search on Bibsonomy IEEE Trans. Circuits Syst. I Regul. Pap. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26David A. Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski ARPKI: Attack Resilient Public-Key Infrastructure. Search on Bibsonomy CCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26David A. Basin, Cas Cremers, Marko Horvat 0002 Actor Key Compromise: Consequences and Countermeasures. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Cas Cremers, Marko Horvat 0002 Improving the ISO/IEC 11770 Standard for Key Management Techniques. Search on Bibsonomy SSR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Benedikt Schmidt 0002, Ralf Sasse, Cas Cremers, David A. Basin Automated Verification of Group Key Agreement Protocols. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
26David A. Basin, Cas Cremers, Simon Meier Provably repairing the ISO/IEC 9798 standard for entity authentication. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Simon Meier, Cas Cremers, David A. Basin Efficient construction of machine-checked symbolic protocol security proofs. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Simon Meier, Benedikt Schmidt 0002, Cas Cremers, David A. Basin The TAMARIN Prover for the Symbolic Analysis of Security Protocols. Search on Bibsonomy CAV The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Cas Cremers, Michèle Feltz Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
26Cas Cremers, Sjouke Mauw Operational Semantics and Verification of Security Protocols Search on Bibsonomy 2012   DOI  RDF
26David A. Basin, Cas Cremers, Simon Meier Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication. Search on Bibsonomy POST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Benedikt Schmidt 0002, Simon Meier, Cas Cremers, David A. Basin Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Cas Cremers, Kasper Bonne Rasmussen, Srdjan Capkun Distance Hijacking Attacks on Distance Bounding Protocols. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
26Cas Cremers, Michèle Feltz Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Cas Cremers, Kasper Bonne Rasmussen, Benedikt Schmidt 0002, Srdjan Capkun Distance Hijacking Attacks on Distance Bounding Protocols. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Cas Cremers, Michèle Feltz One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
26Cas Cremers, Kasper Bonne Rasmussen, Srdjan Capkun Distance Hijacking Attacks on Distance Bounding Protocols. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
26Johann Cas Ubiquitous Computing, Privacy and Data Protection: Options and Limitations to Reconcile the Unprecedented Contradictions. Search on Bibsonomy Computers, Privacy and Data Protection The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Cas Cremers Examining indistinguishability-based security models for key exchange protocols: the case of CK, CK-HMQV, and eCK. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Cas Cremers Key Exchange in IPsec Revisited: Formal Analysis of IKEv1 and IKEv2. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Jure Cas, Gregor Skorc, Riko Safaric Neural network position control of XY piezo actuator stage by visual feedback. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Cas J. F. Cremers Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol. Search on Bibsonomy Int. J. Appl. Cryptogr. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Johann Cas Privacy and Security: A Brief Synopsis of the Results of the European TA-Project PRISE. Search on Bibsonomy Data Protection in a Profiled World The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Andrés Otero, Angel Morales-Cas, Jorge Portilla, Eduardo de la Torre, Teresa Riesgo A Modular Peripheral to Support Self-Reconfiguration in SoCs. Search on Bibsonomy DSD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Simon Meier, Cas Cremers, David A. Basin Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs. Search on Bibsonomy CSF The full citation details ... 2010 DBLP  DOI  BibTeX  RDF formal methods, theorem proving, security protocols, automatic tools
26David A. Basin, Cas Cremers Modeling and Analyzing Security in the Presence of Compromising Adversaries. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Cas Apanowicz Data Warehouse Discovery Framework: The Foundation. Search on Bibsonomy FGIT-DTA/BSBT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Cas Apanowicz Data Warehouse Discovery Framework: The Case Study. Search on Bibsonomy FGIT-DTA/BSBT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26David A. Basin, Cas Cremers Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries. Search on Bibsonomy CSL The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Christina Pöpper, David A. Basin, Srdjan Capkun, Cas Cremers Keeping data secret under full compromise using porter devices. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Cas J. F. Cremers Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
26David A. Basin, Cas Cremers From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
26Cas J. F. Cremers, Pascal Lafourcade 0001, Philippe Nadeau Comparing State Spaces in Automatic Security Protocol Analysis. Search on Bibsonomy Formal to Practical Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Riko Safaric, Jure Cas, Gregor Skorc, Sirhiy Ivanovich Protsenko Micro and nano robotics. Search on Bibsonomy ICAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Cas J. F. Cremers Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Session- state reveal, Ephemeral Key reveal, Provably-secure, Authenticated Key Exchange
26Cas Apanowicz Data Warehousing and Business Intelligence: Benchmark Project for the Platform Selection. Search on Bibsonomy FGIT-DTA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Allan E. Clark, Cas G. Troskie Time Series and Model Selection. Search on Bibsonomy Commun. Stat. Simul. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Cas J. F. Cremers Session-state Reveal is stronger than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange protocol. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
26Suzana Andova, Cas Cremers, Kristian Gjøsteen, Sjouke Mauw, Stig Fr. Mjølsnes, Sasa Radomirovic A framework for compositional verification of security protocols. Search on Bibsonomy Inf. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Cas J. F. Cremers Unbounded verification, falsification, and characterization of security protocols by pattern refinement. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF falsification, security protocol analysis, unbounded verification, characterization
26Cas Cremers On the protocol composition logic PCL. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security protocol analysis, composition, logic
26Cas J. F. Cremers The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. Search on Bibsonomy CAV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Bojan Cas, Miran Saje, Igor Planinc Buckling of layered wood columns. Search on Bibsonomy Adv. Eng. Softw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Jure Cas, Darko Hercog, Riko Safaric Web based educational tool for neural network robot control. Search on Bibsonomy Int. J. Online Eng. The full citation details ... 2007 DBLP  BibTeX  RDF
26Cas Cremers On the Protocol Composition Logic PCL Search on Bibsonomy CoRR The full citation details ... 2007 DBLP  BibTeX  RDF
26Cas Cremers Complete Characterization of Security Protocols by Pattern Refinement. Search on Bibsonomy Formal Protocol Verification Applied The full citation details ... 2007 DBLP  BibTeX  RDF
26Cas J. F. Cremers, Sjouke Mauw, Erik P. de Vink Injective synchronisation: An extension of the authentication hierarchy. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Suzana Andova, Cas Cremers, Kristian Gjøsteen, Sjouke Mauw, Stig Fr. Mjølsnes, Sasa Radomirovic A framework for compositional verification of security protocols Search on Bibsonomy CoRR The full citation details ... 2006 DBLP  BibTeX  RDF
26Cas Cremers Feasibility of Multi-Protocol Attacks. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Sjouke Mauw, Valérie Issarny, Cas Cremers (eds.) Proceedings of the First International Workshop on Security and Trust Management, STM 2005, Milan, Italy, September 15, 2005 Search on Bibsonomy STM The full citation details ... 2006 DBLP  BibTeX  RDF
26Sjouke Mauw, Valérie Issarny, Cas Cremers Preface. Search on Bibsonomy STM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Cas J. F. Cremers, Sjouke Mauw, Erik P. de Vink A Syntactic Criterion for Injectivity of Authentication Protocols. Search on Bibsonomy ARSPA@ICALP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Johann Cas Privacy in pervasive computing environments - a contradiction in terms? Search on Bibsonomy IEEE Technol. Soc. Mag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Cas Cremers Compositionality of Security Protocols: A Research Agenda. Search on Bibsonomy VODCA@FOSAD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Cas J. F. Cremers, Sjouke Mauw Checking Secrecy by Means of Partial Order Reduction. Search on Bibsonomy SAM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Cas Cremers, Sjouke Mauw Operational Semantics of Security Protocols. Search on Bibsonomy Scenarios: Models, Transformations and Tools The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Andrew Grant, Gwyneth Grant, Jean Gagné, Carl Blanchette, Émilie Comeau, Guillaume Brodeur, Jonathon Dionne, Alphonse Ayite, Piotr Synak, Jakub Wroblewski, Cas Apanowicz Examination of Routine Practice Patterns in the Hospital Information Data Warehouse: Use of OLAP and Rough Set Analysis with Clinician Feedback. Search on Bibsonomy AMIA The full citation details ... 2001 DBLP  BibTeX  RDF
26Klemen Cas Integration von Kosten- und Marktdaten in einem Entscheidungsassistenten. Search on Bibsonomy Wirtschaftsinf. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
26Klemen Cas Rechnergestützte Integration von Rechnungswesen-Informationen und Marktforschungsdaten: der Weg vom Symptom zur Therapie. Search on Bibsonomy 1999   RDF
26John Cas Czelen Legal Implications of Intelligent Autonomous Systems. Search on Bibsonomy IAS The full citation details ... 1986 DBLP  BibTeX  RDF
25 CAS Query. Search on Bibsonomy Encyclopedia of Database Systems The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 1470 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license