The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CSFW"( http://dblp.L3S.de/Venues/CSFW )

URL (DBLP): http://dblp.uni-trier.de/db/conf/csfw

Publication years (Num. hits)
1988 (17) 1989 (16) 1990 (18) 1991 (31) 1992 (19) 1993 (16) 1994 (20) 1995 (17) 1996 (21) 1997 (20) 1998 (20) 1999 (20) 2000 (24) 2001 (23) 2002 (24) 2003 (18) 2004 (21) 2005 (23) 2006 (26)
Publication types (Num. hits)
inproceedings(375) proceedings(19)
Venues (Conferences, Journals, ...)
CSFW(394)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 262 occurrences of 150 keywords

Results
Found 394 publication records. Showing 394 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Martín Abadi On SDSI's Linked Local Name Spaces. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Steve A. Schneider Verifying authentication protocols with CSP. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Needham-Schroeder protocol, verification, Authentication, formal methods, security protocols, CSP
1J. Sinclair The Computer Security Foundations Workshop: Ten Years on and Ten Years Ahead. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Catherine Meadows 0001 Languages for Formal Specification of Security Protocols. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Dominique Bolignano Towards the Formal Verification of Electronic Commerce Protocols. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Gavin Lowe Casper: A Compiler for the Analysis of Security Protocols. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Richard T. Simon, Mary Ellen Zurko Separation of Duty in Role-based Environments. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Yun Bai 0001, Vijay Varadharajan A Logic For State Transformations in Authorization Policies. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Dennis M. Volpano, Geoffrey Smith 0001 Eliminating Covert Flows with Minimum Typings. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1James W. Gray III, Kin Fai Epsilon Ip, King-Shan Lui Provable Security for Cryptographic Protocols: Exact Analysis and Engineering Applications. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Lawrence C. Paulson Proving Properties of Security Protocols by Induction. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1 10th Computer Security Foundations Workshop (CSFW '97), June 10-12, 1997, Rockport, Massachusetts, USA Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  BibTeX  RDF
1Dahlia Malkhi, Michael K. Reiter Unreliable Intrusion Detection in Distributed Computations. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Tuomas Aura Strategies against Replay Attacks. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Jianying Zhou 0001, Dieter Gollmann An Efficient Non-repudiation Protocol . Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF network security, security protocols, non-repudiation
1Ciarán Bryce Security Engineering of Lattice-Based Policies. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF lattice policy modeling, Security engineering, information flow security
1Gavin Lowe A Hierarchy of Authentication Specification. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Lawrence C. Paulson Mechanized proofs for a recursive authentication protocol. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF mechanized proofs, recursive authentication protocol, inductive approach, message nesting, basic security theorem, adjacent pairs, honest agents, protocol complexity, agents, protocols, specification, symmetry, mutual authentication, Isabelle/HOL, session keys
1Paul F. Syverson A Different Look at Secure Distributed Computation. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Coordinated attack, Security, Distributed Computing, Game Theory, Byzantine failure
1Riccardo Focardi Comparing Two Information Flow Security Properties. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF nondeducibility, security checker, software tool, automatic verification, noninterference, multilevel security
1Patrik D'haeseleer An Immunological Approach to Change Detection: Theoretical Results. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Immunology, distributed, entropy, change detection, negative selection, information loss, holes
1Adrian Spalka The non-primitiveness of the simple-security property and its non-applicability to relational databases. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF simple-security property, secure environment, relational databases, relational databases, confidentiality, security of data
1Jonathan K. Millen, Hai-Ping Ko Narrowing terminates for encryption. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF term replacement rules, reduction properties, symbolic encryption operations, narrowing steps, infinite sequence, popular abstract encryption operators, terminating algorithm, cryptography, encryption, access protocols, protocol analysis
1Jane E. Sinclair Action Systems for Security Specification. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF security development, formal methods, noninterference, Action systems
1Gavin Lowe Some new attacks upon security protocols. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF authentication, security protocols, public key cryptography, access protocols, cryptographic key
1John P. McDermott, David M. Goldschlag Towards a model of storage jamming. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF storage jamming model, cryptographic techniques, detection mechanism, Unity logic, high-level operators, rate of jamming, persistent values, access control, access controls, cryptography, security of data, susceptibility
1Stephen H. Brackin A HOL extension of GNY for automatically analyzing cryptographic protocols. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF HOL extension, automatically analyzing cryptographic protocols, higher order logic theory, authentication properties, protocol properties, hash operations, key-exchange algorithms, formal specification, cryptography, message authentication, access protocols, message authentication codes, multiple encryption, belief maintenance, belief logic
1Yvo Desmedt Simmons' protocol is not free of subliminal channels. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Simmons' protocol, Digital Signature Standard, security of data, access protocols, subliminal channels, subliminal channel
1Aris Zakinthinos, E. Stewart Lee How and why feedback composition fails [secure systems]. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF feedback composition, generalized noninterference, secure components, n-forward correctability, system designer, security of data, composability, necessary and sufficient conditions, restrictiveness
1Dalia Malki, Michael K. Reiter A High-Throughput Secure Reliable Multicast Protocol. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF fault tolerance, group communication, agreement, secure multicast
1Stefek Zaba E-Commerce Payment Protocols: Requirements and Analysis. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Frédéric Cuppens, Claire Saurel Specifying a security policy: a case study. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF high risk environment, interoperability problems, logic-based approach, formal specification, consistency, completeness, security of data, formal logic, deontic logic, security policy specification
1 Ninth IEEE Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  BibTeX  RDF
1Paul F. Syverson What is an Attack on a Cryptographic Protocal? Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Peter Ryan 0001 A Genealogy of Non-Interference. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Colin Boyd A Class of Flexible and Efficient Key Management Protocols. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF authentication, key management, secure protocols
1Ramesh V. Peri, William A. Wulf, Darrell M. Kienzle A Logic of Composition for Information Flow Predicates. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Catherine Meadows 0001 Language generation and verification in the NRL protocol analyzer. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF language verification, NRL protocol analyzer, infinite classes of states, cryptography, formal verification, cryptographic protocols, formal languages, formal languages, access protocols, security properties, exhaustive search, language generation
1A. W. Roscoe 0001 Intensional specifications of security protocols. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF intensional specifications, formal specification, cryptography, security protocols, cryptographic protocols, confidentiality, access protocols
1Luigi Giuri, Pietro Iglio A Formal Model for Role-Based Access Control with Constraints. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF security constraints, role-based access control
1Li Gong Optimal authentication protocols resistant to password guessing attacks. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF optimal authentification protocols, user passwords, protocols, message authentication, password guessing attacks
1Colin Boyd Towards a classification of key agreement protocols. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF one-way junctions, classification, protocols, security of data, key agreement protocols
1 The Eighth IEEE Computer Security Foundations Workshop (CSFW '95), March 13-15, 1995, Kenmare, County Kerry, Ireland Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  BibTeX  RDF
1Alfred P. Maneki Algebraic properties of system composition in the LORAL, Ulysses and McLean trace models. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF trace models, associative laws, commutative laws, containment relationships, information systems, information systems, security of data, security properties, event systems, system composition, algebraic properties
1John V. A. Janeri, Daylan B. Darby, Daniel D. Schnackenberg Building higher resolution synthetic clocks for signaling in covert timing channels. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF higher resolution synthetic clocks, timing channel countermeasure, Boeing multilevel secure local area network, secure network server, internal timing channels, time reference clock granularity, fine-grained signaling clock, timing channel throughput, timing channel capacities, local area networks, security of data, worst-case analysis, covert timing channels
1Riccardo Focardi, Roberto Gorrieri, V. Panini The security checker: a semantics-based tool for the verification of security properties. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF security checker, semantics-based tool, security properties verification, security process algebra, concurrency workbench, formal specification, formal verification, specifications, process algebra, confidentiality, security of data, automatic verification
1Simon N. Foley, Jeremy Jacob Specifying security for CSCW systems. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF confidentiality security, formal specification, formal specification, specification, groupware, safety, security of data, functionality, CSCW systems
1Liqun Chen 0002, Dieter Gollmann, Chris J. Mitchell Key distribution without individual trusted authentification servers. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF key distribution systems, authentication servers, key distribution protocols, cross checksum scheme, cryptography, trust, protocols, data integrity, message authentication, symmetric encryption
1A. W. Roscoe 0001, Lars Wulf Composing and decomposing systems under security properties. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF separability of processes, noninterference properties, disjoint components, security of data, separability, security properties
1William R. Bevier, Richard M. Cohen, William D. Young Connection policies and controlled interference. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF communication policy, controlled interference, system agents, connection policy, state-based formulation, distributed processing, computer security, security of data
1Paul F. Syverson, James W. Gray III The epistemic representation of information flow security in probabilistic systems. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF epistemic representation, security criterion, security, verification, formal specification, information theory, security of data, formal logic, multilevel security, probabilistic systems, information flow security
1James W. Gray III, John McLean Using temporal logic to specify and verify cryptographic protocols. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF specify, system penetrator, correctness requirements, verification, formal specification, formal methods, cryptography, protocols, formal verification, temporal logic, temporal logic, cryptographic protocols, verify
1A. W. Roscoe 0001 Modelling and verifying key-exchange protocols using CSP and FDR. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF model-checking, formal specification, protocols, formal verification, process algebra, CSP, communicating sequential processes, FDR, key-exchange protocols
1Iwen E. Kang, Thomas F. Keefe Concurrency control for federated multilevel secure database systems. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF MLS database systems, federated MLS database, local database systems, global serializability, security, interoperation, distributed databases, concurrency control, concurrency control, transaction processing, transaction processing, open systems, security of data, federated, multilevel secure database systems
1Trent Jaeger, Atul Prakash 0001 Implementation of a discretionary access control model for script-based systems. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF discretionary access control model, script-based systems, World-wide Web browsing tool, security of data, authorisation, Mosaic, prototype system, unauthorized access
1Aris Zakinthinos, E. Stewart Lee The composability of non-interference [system security]. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF McCullough's conjecture, noninterference composability, feedback, security of data, system security
1Wenbo Mao An augmentation of BAN-like logics. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF BAN-like logics augmentation, protocol idealization, rule-based technique, protocol syntax, protocols, formal logic, message authentication, authentication protocols, symbolic manipulation
1Volker Kessler, Gabriele Wedel AUTLOG - An Advanced Logic of Authentication. Search on Bibsonomy CSFW The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Ravi S. Sandhu, Roshan K. Thomas Conceptual Foundations for a Model of Task-based Authorizations. Search on Bibsonomy CSFW The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Carol Muehrcke Formal Methods for the Informal World. Search on Bibsonomy CSFW The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Ravi S. Sandhu, Paul Ammann One-Representative Safety Analysis in the Non-Monotonic Transform Model. Search on Bibsonomy CSFW The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Daniel F. Sterne, Glenn S. Benson, Homayoon Tajalli Redrawing the Security Perimeter of a Trusted System. Search on Bibsonomy CSFW The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Daniel F. Sterne Panel: Reconsidering the Role fo the Reference Monitor. Search on Bibsonomy CSFW The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Aviel D. Rubin, Peter Honeyman Nonmonotonic Cryptographic Protocols. Search on Bibsonomy CSFW The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Ramesh V. Peri, William A. Wulf Formal Specification of Information Flow Security Policies and Their Enforcement in Security Critical Systems. Search on Bibsonomy CSFW The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1George W. Dinolt, Lee A. Benzinger, Mark Yatabe Combining Components and Policies. Search on Bibsonomy CSFW The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1William D. Young, William R. Bevier A State-Based Approach to Non-Interference. Search on Bibsonomy CSFW The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Adrian Spalka Formal Semantics of Rights and Confidentiality in Definite Deductive Databases Search on Bibsonomy CSFW The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Ulf Carlsen Cryptographic Protocols Flaws. Search on Bibsonomy CSFW The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Catherine Meadows 0001 A Model of Computation for the NRL Protocol Analyzer. Search on Bibsonomy CSFW The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Jonathan K. Millen Unwinding Forward Correctability. Search on Bibsonomy CSFW The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Wenbo Mao, Colin Boyd Development of Authentication Protocols: Some Misconceptions and a New Approach. Search on Bibsonomy CSFW The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Simon N. Foley Reasoning about Confidentiality Requirements. Search on Bibsonomy CSFW The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Oliver Costich, John McLean, John P. McDermott Confidentiality in a Replicated Architecture Trusted Database System: A Formal Model. Search on Bibsonomy CSFW The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1 Seventh IEEE Computer Security Foundations Workshop - CSFW'94, Franconia, New Hampshire, USA, June 14-16, 1994, Proceedings Search on Bibsonomy CSFW The full citation details ... 1994 DBLP  BibTeX  RDF
1Riccardo Focardi, Roberto Gorrieri A Taxonomy of Security Properties for CCS. Search on Bibsonomy CSFW The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Paul F. Syverson A Taxonomy of Replay Attacks. Search on Bibsonomy CSFW The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1James G. Williams 0002, Leonard J. LaPadula Automated Support for External Consistency. Search on Bibsonomy CSFW The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Wenbo Mao, Colin Boyd Towards Formal Analysis of Security Protocols. Search on Bibsonomy CSFW The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Li Gong A Variation on the Themes of Message Freshness and Replay or, the Difficulty in Devising Formal Methods to Analyze Cryptographic Protocols. Search on Bibsonomy CSFW The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Mary Ellen Zurko Panel: What are the Foundations of Computer Security? Search on Bibsonomy CSFW The full citation details ... 1993 DBLP  BibTeX  RDF
1Amit G. Mathur, Thomas F. Keefe The Concurrency Control and Recovery Problem for Multilevel Update Transactions in MLS System. Search on Bibsonomy CSFW The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Gustavus J. Simmons Invited talk: An Introductions to the Mathematics of Trust in Security Protocols. Search on Bibsonomy CSFW The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1 6th IEEE Computer Security Foundations Workshop - CSFW'93, Franconia, New Hampshire, USA, June 15-17, 1993, Proceedings Search on Bibsonomy CSFW The full citation details ... 1993 DBLP  BibTeX  RDF
1David Rosenthal Modeling Restrictive Processes that Involve Blocking Requests. Search on Bibsonomy CSFW The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Pierre Bieber, Nora Boulahia-Cuppens, T. Lehmann, E. van Wickeren Abstract Machines for Communication Security. Search on Bibsonomy CSFW The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Jaisook Landauer, Timothy Redmond A Lattice of Information. Search on Bibsonomy CSFW The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1James W. Gray III On Analyzing the Bus-Contention Channel Under Fuzzy Time. Search on Bibsonomy CSFW The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Jean-Pierre Banâtre, Ciarán Bryce Information Flow Control in a Parallel Language Framework. Search on Bibsonomy CSFW The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Ravi S. Sandhu, Srinivas Ganta On Testing for Absence of Rights in Access Control Models. Search on Bibsonomy CSFW The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Paul F. Syverson Panel: Cryptographic Protocol Models and Requirements. Search on Bibsonomy CSFW The full citation details ... 1993 DBLP  BibTeX  RDF
1Frédéric Cuppens A Logical Formalization of Secrecy. Search on Bibsonomy CSFW The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Marc Dacier A Petri Net Representation of the Take-Grant Model. Search on Bibsonomy CSFW The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Sylvan Pinsky An Algebraic Approach to Non-Interference. Search on Bibsonomy CSFW The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1 5th IEEE Computer Security Foundations Workshop - CSFW'92, Franconia, New Hampshire, USA, June 16-18, 1992, Proceedings Search on Bibsonomy CSFW The full citation details ... 1992 DBLP  BibTeX  RDF
1Jan Verschuren, René Govaerts, Joos Vandewalle Realization of the Bell-LaPadula Security Policy in an OSI-Distributed System using Asymmetric and Symmetric Cryptographic Algorithms. Search on Bibsonomy CSFW The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Thomas D. Garvey Inference Working Group Kickoff: The Inference Problem for Computer Security. Search on Bibsonomy CSFW The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Catherine Meadows 0001 Panel: Fundamental Questions about Formal Methods. Search on Bibsonomy CSFW The full citation details ... 1992 DBLP  BibTeX  RDF
1Paul Helman, Gunar E. Liepins, Wynette Richards Foundations of Intrusion Detection. Search on Bibsonomy CSFW The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Sandra Rawlings Murphy, Stephen D. Crocker, Timothy Redmond Unwinding and the LOCK Proof Referees Study. Search on Bibsonomy CSFW The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 394 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license