The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CSF"( http://dblp.L3S.de/Venues/CSF )

URL (DBLP): http://dblp.uni-trier.de/db/conf/csfw

Publication years (Num. hits)
2007 (27) 2008 (23) 2009 (23) 2010 (24) 2011 (22) 2012 (26) 2013 (20) 2014 (30) 2015 (36) 2016 (35) 2017 (35) 2018 (28) 2019 (31) 2020 (29) 2021 (44) 2022 (33) 2023 (39)
Publication types (Num. hits)
inproceedings(488) proceedings(17)
Venues (Conferences, Journals, ...)
CSF(505)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 191 occurrences of 127 keywords

Results
Found 505 publication records. Showing 505 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1David A. Basin, Sasa Radomirovic, Lara Schmid Alethea: A Provably Secure Random Sample Voting Protocol. Search on Bibsonomy CSF The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hongxu Chen 0001, Alwen Tiu, Zhiwu Xu 0001, Yang Liu 0003 A Permission-Dependent Type System for Secure Information Flow Analysis. Search on Bibsonomy CSF The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Marc Fischlin, Sogol Mazaheri Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks. Search on Bibsonomy CSF The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vineet Rajani, Deepak Garg 0001 Types for Information Flow Control: Labeling Granularity and Semantic Models. Search on Bibsonomy CSF The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Riccardo Focardi, Marco Squarcina Run-Time Attack Detection in Cryptographic APIs. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marco Guarnieri, Srdjan Marinovic, David A. Basin Securing Databases from Probabilistic Inference. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hubert Comon, Adrien Koutsos Formal Computational Unlinkability Proofs of RFID Protocols. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bruno Blanchet Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Stéphanie Delaune, Steve Kremer, Ludovic Robin Formal Verification of Protocols Based on Short Authenticated Strings. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin UC-Secure Non-interactive Public-Key Encryption. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1M. H. R. Khouzani, Pasquale Malacaria Leakage-Minimal Design: Universality, Limitations, and Applications. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ruggero Lanotte, Massimo Merro, Riccardo Muradore, Luca Viganò 0001 A Formal Approach to Cyber-Physical Attacks. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Stefano Calzavara, Ilya Grishchenko, Adrien Koutsos, Matteo Maffei A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marco Vassena, Joachim Breitner, Alejandro Russo Securing Concurrent Lazy Programs Against Information Leakage. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Vincent Cheval, Véronique Cortier, Bogdan Warinschi Secure Composition of PKIs with Public Key Protocols. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rafael Pass, Elaine Shi Rethinking Large-Scale Consensus. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marco Patrignani, Deepak Garg 0001 Secure Compilation and Hyperproperty Preservation. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Martín Abadi, Úlfar Erlingsson, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Nicolas Papernot, Kunal Talwar, Li Zhang 0001 On the Protection of Private Information in Machine Learning Systems: Two Recent Approches. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Li Zhou, Mingsheng Ying Differential Privacy in Quantum Computation. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Andreas Viktor Hess, Sebastian Mödersheim Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alexandra Boldyreva, Shan Chen, Pierre-Alain Dupont, David Pointcheval Human Computing for Handling Strong Corruptions in Authenticated Key Exchange. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017 Search on Bibsonomy CSF The full citation details ... 2017 DBLP  BibTeX  RDF
1Michael Backes 0001, Manuel Gomez-Rodriguez, Praveen Manoharan 0001, Bartlomiej Surma Reconciling Privacy and Utility in Continuous-Time Diffusion Networks. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ivan Gazeau, Tom Chothia, Dominic Duggan Types for Location and Data Security in Cloud Environments. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ilya Mironov Rényi Differential Privacy. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hyoukjun Kwon, William Harris, Hadi Esmaeilzadeh Proving Flow Security of Sequential Logic via Automatically-Synthesized Relational Invariants. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alley Stoughton, Mayank Varia Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peixuan Li, Danfeng Zhang Towards a Flow- and Path-Sensitive Information Flow Analysis. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daniel Fett, Ralf Küsters, Guido Schmitz The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1David Baelde, Stéphanie Delaune, Ivan Gazeau, Steve Kremer Symbolic Verification of Privacy-Type Properties for Security Protocols with XOR. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gilles Barthe, Sandrine Blazy, Vincent Laporte, David Pichardie, Alix Trieu Verified Translation Validation of Static Analyses. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Quoc-Sang Phan, Lucas Bang, Corina S. Pasareanu, Pasquale Malacaria, Tevfik Bultan Synthesis of Adaptive Side-Channel Attacks. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Kyle Hogan, Aanchal Malhotra, Mayank Varia A Universally Composable Treatment of Network Time. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan 0001 Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang 0001, Christopher Kruegel, Giovanni Vigna, David Brumley How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Per A. Hallgren, Claudio Orlandi, Andrei Sabelfeld PrivatePool: Privacy-Preserving Ridesharing. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1David M. Smith, Geoffrey Smith 0001 Tight Bounds on Information Leakage from Repeated Independent Runs. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Emanuele D'Osualdo, Luke Ong, Alwen Tiu Deciding Secrecy of Security Protocols for an Unbounded Number of Sessions: The Case of Depth-Bounded Processes. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Véronique Cortier, Antoine Dallon, Stéphanie Delaune SAT-Equiv: An Efficient Tool for Equivalence Properties. Search on Bibsonomy CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pedro Adão, Riccardo Focardi, Joshua D. Guttman, Flaminia L. Luccio Localizing Firewall Security Policies. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Marco Patrignani, Dominique Devriese, Frank Piessens On Modular and Fully-Abstract Compilation. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nicolás E. Bordenabe, Geoffrey Smith 0001 Correlated Secrets in Quantitative Information Flow. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Stefano Calzavara, Alvise Rabitti, Enrico Steffinlongo, Michele Bugliesi Static Detection of Collusion Attacks in ARBAC-Based Workflow Systems. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Andrew W. Appel Modular Verification for Computer Security. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ralf Küsters, Johannes Müller 0001, Enrico Scapin, Tomasz Truderung sElect: A Lightweight Verifiable Remote Voting System. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jean Karim Zinzindohoue, Evmorfia-Iro Bartzia, Karthikeyan Bhargavan A Verified Extensible Library of Elliptic Curves. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Úlfar Erlingsson Data-Driven Software Security: Models and Methods. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Corina S. Pasareanu, Quoc-Sang Phan, Pasquale Malacaria Multi-run Side-Channel Analysis Using Symbolic Execution and Max-SMT. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1M. H. R. Khouzani, Pasquale Malacaria Relative Perfect Secrecy: Universally Optimal Strategies and Channel Design. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1David A. Basin, Søren Debois, Thomas T. Hildebrandt In the Nick of Time: Proactive Prevention of Obligation Violations. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xi Wu 0001, Matthew Fredrikson, Somesh Jha, Jeffrey F. Naughton A Methodology for Formalizing Model-Inversion Attacks. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yannis Juglaret, Catalin Hritcu, Arthur Azevedo de Amorim, Boris Eng, Benjamin C. Pierce Beyond Good and Evil: Formalizing the Security Guarantees of Compartmentalizing Compilation. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Cédric Fournet, Chantal Keller, Vincent Laporte A Certified Compiler for Verifiable Computing. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Filippo Del Tedesco, David Sands 0001, Alejandro Russo Fault-Resilient Non-interference. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mário S. Alvim, Konstantinos Chatzikokolakis 0001, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith 0001 Axioms for Information Leakage. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zaruhi Aslanyan, Flemming Nielson, David Parker 0001 Quantitative Verification and Synthesis of Attack-Defence Scenarios. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Marcos Cramer, Pieter Van Hertum, Ruben Lapauw, Ingmar Dasseville, Marc Denecker Resilient Delegation Revocation with Precedence for Predecessors Is NP-Complete. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ross J. Anderson Are the Real Limits to Scale a Matter of Science, or Engineering, or of Something Else? (Abstract only). Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bruno Blanchet, Ben Smyth Automated Reasoning for Equivalences in the Applied Pi Calculus with Barriers. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jeremiah Blocki, Anupam Datta CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Simon Greiner, Daniel Grahl Non-interference with What-Declassification in Component-Based Systems. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Frédéric Besson, Nataliia Bielova, Thomas P. Jensen Hybrid Monitoring of Attacker Knowledge. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Guillaume Scerri, Ryan Stanley-Oakes Analysis of Key Wrapping APIs: Generic Policies, Computational Security. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Petar Tsankov, Mohammad Torabi Dashti, David A. Basin Access Control Synthesis for Physical Spaces. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shreya Agrawal, Borzoo Bonakdarpour Runtime Verification of k-Safety Hyperproperties in HyperLTL. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mounir Assaf, David A. Naumann Calculational Design of Information Flow Monitors. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1David A. Basin, Sasa Radomirovic, Lara Schmid Modeling Human Errors in Security Protocols. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Katriel Cohn-Gordon, Cas Cremers, Luke Garratt On Post-compromise Security. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Owen Arden, Andrew C. Myers A Calculus for Flow-Limited Authorization. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sergiu Costea, Bogdan Warinschi Secure Software Licensing: Models, Constructions, and Proofs. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Stefano Calzavara, Riccardo Focardi, Niklas Grimm, Matteo Maffei Micro-policies for Web Session Security. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Toby C. Murray, Robert Sison, Edward Pierzchalski, Christine Rizkallah Compositional Verification and Refinement of Concurrent Value-Dependent Noninterference. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1 IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016 Search on Bibsonomy CSF The full citation details ... 2016 DBLP  BibTeX  RDF
1Vineet Rajani, Deepak Garg 0001, Tamara Rezk On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Owen Arden, Jed Liu, Andrew C. Myers Flow-Limited Authorization. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ralf Küsters, Tomasz Truderung, Bernhard Beckert, Daniel Bruns, Michael Kirsten, Martin Mohr A Hybrid Approach for Proving Noninterference of Java Programs. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aslan Askarov, Scott Moore, Christos Dimoulas, Stephen Chong Cryptographic Enforcement of Language-Based Information Erasure. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Niklas Broberg, Bart van Delft, David Sands 0001 The Anatomy and Facets of Dynamic Policies. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Vineet Rajani, Abhishek Bichhawat, Deepak Garg 0001, Christian Hammer 0001 Information Flow Control for Event Handling and the DOM in Web Browsers. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Anna Lisa Ferrara, Georg Fuchsbauer, Bin Liu, Bogdan Warinschi Policy Privacy in Cryptographic Access Control. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michael Carl Tschantz, Amit Datta, Anupam Datta, Jeannette M. Wing A Methodology for Information Flow Experiments. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stefano Calzavara, Alvise Rabitti, Michele Bugliesi Compositional Typed Analysis of ARBAC Policies. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Martin Pettai, Peeter Laud Automatic Proofs of Privacy of Secure Multi-party Computation Protocols against Active Adversaries. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mordechai Guri, Matan Monitz, Yisroel Mirski, Yuval Elovici BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kui Xu 0002, Danfeng (Daphne) Yao, Barbara G. Ryder, Ke Tian Probabilistic Program Modeling for High-Precision Anomaly Classification. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Daniel Hedin, Luciano Bello, Andrei Sabelfeld Value-Sensitive Hybrid Information Flow Control for a JavaScript-Like Language. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alessandro Armando, Roberto Carbone, Gabriele Costa 0001, Alessio Merlo Android Permissions Unleashed. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1David Nuñez 0001, Isaac Agudo, Javier López 0001 A Parametric Family of Attack Models for Proxy Re-encryption. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christian Matt 0002, Ueli Maurer A Definitional Framework for Functional Encryption. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1William C. Garrison III, Adam J. Lee Decomposing, Comparing, and Synthesizing Access Control Expressiveness Simulations. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Carlos Cotrini Jiménez, Thilo Weghorn, David A. Basin, Manuel Clavel Analyzing First-Order Role Based Access Control. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Daniel Schoepe, Andrei Sabelfeld Understanding and Enforcing Opacity. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gurchetan S. Grewal, Mark Dermot Ryan, Liqun Chen 0002, Michael R. Clarkson Du-Vote: Remote Electronic Voting with Untrusted Computers. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aslan Askarov, Stephen Chong, Heiko Mantel Hybrid Monitors for Concurrent Noninterference. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Anupam Datta, Deepak Garg 0001, Dilsun Kirli Kaynar, Divya Sharma, Arunesh Sinha Program Actions as Actual Causes: A Building Block for Accountability. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Limin Jia 0001, Shayak Sen, Deepak Garg 0001, Anupam Datta A Logic of Programs with Interface-Confined Code. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Goran Doychev, Boris Köpf Rational Protection against Timing Attacks. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Cédric Fournet, Michael W. Hicks, Luca Viganò 0001 (eds.) IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015 Search on Bibsonomy CSF The full citation details ... 2015 DBLP  BibTeX  RDF
1David A. Basin, Sasa Radomirovic, Michael Schläpfer A Complete Characterization of Secure Human-Server Communication. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michela Chessa, Jens Grossklags, Patrick Loiseau A Game-Theoretic Study on Non-monetary Incentives in Data Analytics Projects with Privacy Implications. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 505 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license