The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for round with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1958-1968 (15) 1969-1971 (15) 1972-1979 (17) 1980-1984 (20) 1985-1986 (19) 1987-1988 (19) 1989-1990 (38) 1991 (31) 1992 (31) 1993 (25) 1994 (36) 1995 (46) 1996 (42) 1997 (52) 1998 (65) 1999 (103) 2000 (152) 2001 (157) 2002 (218) 2003 (230) 2004 (289) 2005 (379) 2006 (406) 2007 (412) 2008 (406) 2009 (344) 2010 (177) 2011 (156) 2012 (137) 2013 (158) 2014 (169) 2015 (203) 2016 (220) 2017 (220) 2018 (209) 2019 (224) 2020 (306) 2021 (268) 2022 (278) 2023 (300) 2024 (73)
Publication types (Num. hits)
article(2640) book(1) incollection(16) inproceedings(3978) phdthesis(30)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3841 occurrences of 1930 keywords

Results
Found 6676 publication records. Showing 6665 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
26Ryan Lance, Ian Frommer Round-trip time inference via passive monitoring. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF TCP/IP
26Hiroshi Yamamoto, Masato Tsuru, Yuji Oie Parallel Transferable Uniform Multi-round Algorithm for Achieving Minimum Application Turnaround Times for Divisible Workload. Search on Bibsonomy HPCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Master/Worker model, Divisible Workload, UMR, Parallel Data Transmission, Constraint Minimization Problem
26Xin Yuan, Zhenhai Duan FRR: a proportional and worst-case fair round robin scheduler. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Saurabh Sanghvi, Salil P. Vadhan The round complexity of two-party random selection. Search on Bibsonomy STOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptography, distributed computing, coin-flipping
26Chu-Hsing Lin, Hsiu-Hsia Lin Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Yanfeng Zheng, Chun Shao An Efficient Round-Robin Algorithm for Combined Input-Crosspoint-Queued Switches. Search on Bibsonomy ICAS/ICNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Soranun Jiwasurat, George Kesidis A Class of Shaped Deficit Round-Robin (SDRR) Schedulers. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF packet scheduling, high-speed networks, traffic shaping, Internet routers
26Youngdai Ko, Seokhie Hong, Wonil Lee, Sangjin Lee 0002, Ju-Sung Kang Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Related key differential attack, XTEA, GOST, Differential characteristic, Distinguishing attack
26Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IDEA and MESH ciphers, known-plaintext attack, Cryptanalysis
26Anthony C. C. Lo, Geert J. Heijenk, Ignas G. Niemegeers On the Performance of TCP Vegas over UMTS/WCDMA Channels with Large Round-Trip Time Variations. (PDF / PS) Search on Bibsonomy PWC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Alan L. Selman, Samik Sengupta Polylogarithmic-Round Interactive Proofs for coNP Collapse the Exponential Hierarchy. Search on Bibsonomy CCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee 0002 Impossible Differential Attack on 30-Round SHACAL-2. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Alan Burns 0001, Michael González Harbour, Andy J. Wellings A Round Robin Scheduling Policy for Ada. Search on Bibsonomy Ada-Europe The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Boaz Barak Constant-Round Coin-Tossing with a Man in the Middle or Realizing the Shared Random String Model. Search on Bibsonomy FOCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Daqing Yang, Gouri Nair, Balaji Sivaramakrishnan, Harishkumar Jayakumar, Arunabha Sen Round Robin with Look Ahead: A New Scheduling Algorithm for Bluetoot. Search on Bibsonomy ICPP Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Håvard Raddum, Lars R. Knudsen A Differential Attack on Reduced-Round SC2000. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Eli Biham, Orr Dunkelman, Nathan Keller Linear Cryptanalysis of Reduced Round Serpent. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Masayuki Kanda Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Carlo Blundo, Clemente Galdi, Pino Persiano Randomness Recycling in Constant-Round Private Computations (extended Abstract). Search on Bibsonomy DISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
26Masayuki Kanda, Youichi Takashima, Tsutomu Matsumoto, Kazumaro Aoki, Kazuo Ohta A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Kouichi Sakurai, Yuliang Zheng 0001 Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract). Search on Bibsonomy ISAAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
26Henri Gilbert, Pascal Chauvaud A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
25Somitra Kumar Sanadhya, Palash Sarkar 0001 New Collision Attacks against Up to 24-Step SHA-2. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SHA-2 hash family, reduced round attacks, Cryptanalysis
25Zhonghua Li, Hongzhou Tan, Yunong Zhang Particle Swarm Optimization Applied to Vertical Traffic Scheduling in Buildings. Search on Bibsonomy KES (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF vertical traffic scheduling, elevator group control system, dynamic zoning, Particle swarm optimization, round-trip time
25Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee 0001 Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF mobile network security, Cryptography, dictionary attacks, password-authenticated key exchange, round complexity
25Jiannong Cao 0001, Michel Raynal, Xianbing Wang, Weigang Wu The Power and Limit of Adding Synchronization Messages for Synchronous Agreement. Search on Bibsonomy ICPP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Early-stopping, Round-based computation, Two-step, Uniform consensus, Distributed system, Lower bound, Message-passing, Synchronous system
25Dirk Abendroth, Hans van den Berg, Michel Mandjes A Multiple Time-Scale Model for TCP Bandwidth Sharing Under User Heterogeneity. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF user heterogeneity, packet level, flow level, performance, TCP, throughput, round-trip times
25Oscar Cornejo, Christian Michelot A Proximal Solution for a Class of Extended Minimax Location Problem. Search on Bibsonomy ICCSA (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF minimax location, round-trip location problem, proximal method, Fenchel duality, partial inverse method, Continuous location
25Rafael Pass, Alon Rosen New and improved constructions of non-malleable cryptographic protocols. Search on Bibsonomy STOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF non black-box simulation, cryptography, zero-knowledge, non-malleability, round-complexity, man-in-the-middle
25Rafael Pass Bounded-concurrent secure multi-party computation with a dishonest majority. Search on Bibsonomy STOC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF constant-round protocols, simulation-sound zero-knowledge, secure multi-party computation, concurrent composition
25Huan-Yun Wei, Ching-Chuang Chiang, Ying-Dar Lin Co-DRR: An Integrated Uplink and Downlink Scheduler for Bandwidth Management over Wireless LANs. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Scheduling, 802.11, bandwidth management, fair queuing, deficit round robin
25Deming Liu, Yann-Hang Lee An Efficient Switch Design for Scheduling Real-Time Multicast Traffic. Search on Bibsonomy RTCSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Earliest Deadline First Round Robin, Quality of Service, Multicasting, Real-Time Communications, Packet Switching Network
25Minseok Song 0001, Naehyuck Chang, Heonshik Shin A new queue discipline for various delay and jitter requirements in real-time packet-switched networks. Search on Bibsonomy RTCSA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF fairness requirements, real-time packet-switched networks, data packet scheduling, service priority, jitter bound, Rate-controlled Frame-based Weighted Round Robin, frame-based WRR server, constant buffer space, scheduling, asynchronous transfer mode, delays, queueing theory, packet switching, bandwidth, ATM networks, rate controller, jitter, telecommunication traffic, end-to-end delays, delay bound
25Kripakaran Suryanarayanan, Kenneth J. Christensen Performance Evaluation of New Methods of Automatic Redirection for Load Balancing of Apache Servers Distributed in the Internet. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF automatic redirection, Apache servers, overloaded web server, 404 error, open source Apache HTTP server, Red-Apache, HTTP 301 redirection, server tag, client browser, round-trip redirection, JavaScript function, Java, performance evaluation, Internet, Internet, WWW, World Wide Web, load balancing, telecommunication network routing, telecommunication traffic, file servers, substitution method
25Ping Zhou, Charles Thompson Available Bit Rate (ABR) Source Control and Delay Estimation. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF nonlinear estimation, ABR source control, transmission rate regulation, ABR traffic source, linear quadratic rate regulation, round-trip propagation delay estimation, nonlinear least mean square, NLMS algorithm, ATM standard, asynchronous transfer mode, ATM network, simulation results, telecommunication traffic, least squares approximations, telecommunication control, delay estimation, delay estimation, available bit rate
25S.-Y. Lee, C.-H. Cho Load Balancing for Minimizing Execution Time of a Target Job on a Network of Heterogeneous Workstations. Search on Bibsonomy JSSPP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Round-robin job scheduling, Stochastic model, Network of workstation, Dynamic load balancing, Execution time, Standard deviation, Static load balancing
25Satoshi Hada, Toshiaki Tanaka A Relationship between One-Wayness and Correlation Intractability. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF correlation intractability, zero-knowledge, One-way functions, random oracle, interactive proofs, round complexity
25Sudheer Dharanikota, Kurt Maly QUANTA: Quality of Service Architecture for Native TCP/IP over ATM Networks. Search on Bibsonomy HPDC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF QUANTA, native TCP/IP, end system protocol suite, application level QoS, base line performance, no-load condition, user submitted data block sizes, host load condition experiments, CPU intensive jobs, communication intensive jobs, network load condition experiments, missing components, network QoS translator protocol tuning components, local feedback component, class based scheduling, performance evaluation, asynchronous transfer mode, computer networks, transport protocols, ATM networks, quality control, QoS guarantees, round trip time, quality of service architecture, QoS architecture
25Dali L. Tao, Carlos R. P. Hartmann A Novel Concurrent Error Detection Scheme for FFT Networks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF concurrent error detection scheme, FFT networks, algorithm-based fault tolerancetechniques, digital signalprocessing chips, fault tolerant computing, fast Fourier transforms, error detection, fault coverage, system performance, roundoff errors, round-off errors
25Richard H. Bartels, Gene H. Golub The simplex method of linear programming using LU decomposition. Search on Bibsonomy Commun. ACM The full citation details ... 1969 DBLP  DOI  BibTeX  RDF computational stability, linear programming, simplex method, LU decomposition, round-off errors
24Fei Wu 0005, Liang Wang, Jiguang Wan A Low Cost and Inner-round Pipelined Design of ECB-AES-256 Crypto Engine for Solid State Disk. Search on Bibsonomy NAS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF inner-round, ECB-AES-256 crypto engine, SSD
24Steve Thompson, Lester Lipsky, Sarah Tasneem, Feng Zhang 0015 Analysis of Round-Robin Implementations of Processor Sharing, Including Overhead. Search on Bibsonomy NCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF timeslice with overhead, simulation, processor sharing, Round Robin
24Jendrik Johannes, Roland Samlaus, Mirko Seifert Round-Trip Support for Invasive Software Composition Systems. Search on Bibsonomy SC@TOOLS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Invasive Software Composition, Traceability, Round-trip Engineering
24Elmabruk Laias, Irfan-Ullah Awan, Pauline M. L. Chan Fair and Latency Aware Uplink Scheduler In IEEE 802.16 Using Customized Deficit Round Robin. Search on Bibsonomy AINA Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF rtPS, nrtPS, QoS, IEEE 802.16, Deficit Round Robin
24Andrey Sadovykh, Lionel Vigier, Eduardo Gomez, Andreas Hoffmann 0001, Juergen Grossmann, Oleg Estekhin On Study Results: Round Trip Engineering of Space Systems. Search on Bibsonomy ECMDA-FA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF M2M, PSM2PIM, U2TP, model mining, model metrication, MDA, model-based testing, TTCN-3, ADM, round trip engineering
24Ellen Van Paesschen, Wolfgang De Meuter, Maja D'Hondt SelfSync: a dynamic round-trip engineering environment. Search on Bibsonomy OOPSLA Companion The full citation details ... 2005 DBLP  DOI  BibTeX  RDF prototype-based programming, rapid prototyping, role modeling, dynamic languages, round-trip engineering, model-driven engineering (MDE)
24Ellen Van Paesschen, Wolfgang De Meuter, Maja D'Hondt SelfSync: a dynamic round-trip engineering environment. Search on Bibsonomy OOPSLA Companion The full citation details ... 2005 DBLP  DOI  BibTeX  RDF prototype-based programming, rapid prototyping, role modeling, dynamic languages, round-trip engineering, model-driven engineering (MDE)
24D. V. S. Ravikant, Muthuramakrishnan Venkitasubramaniam, V. Srikanth, K. Srinathan, C. Pandu Rangan Brief announcement: on the round complexity of distributed consensus over synchronous networks. Search on Bibsonomy PODC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF consensus, round complexity
24Verus Pronk, Jan H. M. Korst Comments on "carry-over round robin: a simple cell scheduling mechanism for ATM network". Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF carry-over round robin, ATM, delay, fairness
24Chris Faisstnauer, Dieter Schmalstieg, Werner Purgathofer Priority Round-Robin Scheduling for Very Large Virtual Environments. Search on Bibsonomy VR The full citation details ... 2000 DBLP  DOI  BibTeX  RDF scheduling, virtual environments, competition, priorities, graceful degradation, bottleneck, starvation, round robin, output sensitive
24Wilhelm Schäfer, Albert Zündorf Round-Trip Engineering with Design Patterns, UML, Java and C++. Search on Bibsonomy ICSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF UML, design patterns, round-trip engineering
24Debanjan Saha, Sarit Mukherjee, Satish K. Tripathi Carry-over round robin: a simple cell scheduling mechanism for ATM networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF scheduling, quality of service, ATM, round robin
24Daniel Bauer 0001, Burkhard Stiller, Bernhard Plattner An Error-Control Scheme for a Multicast Protocol Based on Round-Trip Time Calculations. Search on Bibsonomy LCN The full citation details ... 1996 DBLP  DOI  BibTeX  RDF error-control scheme, multicast transport protocol, round-trip time calculations, isochronous data, reliable control messages, multicast signalling, reliable multicast data transmission protocols, high stability, local area networks, transport protocols, ATM networks, wide area networks, WAN, LAN, metropolitan area networks, distributed multimedia applications, simulation data, MAN
24Phil Karn, Craig Partridge Improving Round-Trip Time Estimates in Reliable Transport Protocols. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF transport protocols, round-trip times
24Robert J. Thompson Improving round-off in Runge-Kutta computations with Gill's method. Search on Bibsonomy Commun. ACM The full citation details ... 1970 DBLP  DOI  BibTeX  RDF error analysis, ordinary differential equations, Runge-Kutta methods, round-off error
21Pierre Fraigniaud, George Giakkoupis On the bit communication complexity of randomized rumor spreading. Search on Bibsonomy SPAA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF bit communication complexity, random phone call, rumor spreading
21Bernadette Charron-Bost, André Schiper The Heard-Of model: computing in distributed systems with benign faults. Search on Bibsonomy Distributed Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Benign fault, HO (Heard-Of) model, Transmission fault, Consensus, Computational model
21Xiaorui Sun, Xuejia Lai Improved Integral Attacks on MISTY1. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Yair Amir, Paul Bunn, Rafail Ostrovsky Authenticated Adversarial Routing. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF End-to-End Communication, Communication Complexity, Error-Correction, Network Routing, Fault Localization, Multi-Party Computation
21Rafael Pass, Hoeteck Wee Black-Box Constructions of Two-Party Protocols from One-Way Functions. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF black-box constructions, zero-knowledge arguments, trapdoor commitments, parallel coin-tossing, non-malleable commitments, secure two-party computation
21Karima Maâlaoui, Leïla Azouz Saïdane Priority based intra piconet scheduling scheme for QoS guaranties in Bluetooth networks. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Yi Deng 0002, Giovanni Di Crescenzo, Dongdai Lin, Dengguo Feng Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model. Search on Bibsonomy CSR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Ewan Fleischmann, Michael Gorski, Stefan Lucks Attacking 9 and 10 Rounds of AES-256. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF related-key boomerang attack, block ciphers, AES, differential cryptanalysis
21Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Generalized Unbalanced Feistel Network, Differential Probability, Linear Hull Probability, Block Ciphers
21Iftach Haitner, Omer Reingold, Salil P. Vadhan, Hoeteck Wee Inaccessible entropy. Search on Bibsonomy STOC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF interactive hashing, computational complexity, cryptography, zero knowledge, one-way functions, commitment schemes
21Peng Zhang, Bing Sun 0001, Chao Li 0002 Saturation Attack on the Block Cipher HIGHT. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF HIGHT, Saturation attack, Block cipher, Distinguisher
21Krishnendu Chatterjee, Rupak Majumdar, Thomas A. Henzinger Controller Synthesis with Budget Constraints. Search on Bibsonomy HSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Yoram Moses, Michel Raynal No Double Discount: Condition-Based Simultaneity Yields Limited Gain. Search on Bibsonomy DISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Chryssis Georgiou, Nicolas C. Nicolaou, Alexander A. Shvartsman On the Robustness of (Semi) Fast Quorum-Based Implementations of Atomic Shared Memory. Search on Bibsonomy DISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, Hiroyasu Kubo Impossible Differential Cryptanalysis of CLEFIA. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF diffusion switching mechanism, generalized Feistel structure, block cipher, impossible differential cryptanalysis, CLEFIA
21Tsuyoshi Ito, Hirotada Kobayashi, Daniel Preda, Xiaoming Sun 0001, Andrew Chi-Chih Yao Generalized Tsirelson Inequalities, Commuting-Operator Provers, and Multi-prover Interactive Proof Systems. Search on Bibsonomy CCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multi-prover interactive proof systems, quantum nonlocality, Tsirelson inequality, entanglement
21Johann van der Merwe, Dawoud S. Dawoud, Stephen McDonald A Fully Distributed Proactively Secure Threshold-Multisignature Scheme. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF threshold-multisignature, distributed-key management infrastructure, publicly verifiable distributed-key generation, publicly verifiable distributed-key update, publicly verifiable distributed-key redistribution, distributed systems, secret sharing, Security and protection, group-oriented cryptography
21Stanislaw Jarecki, Jihye Kim, Gene Tsudik Robust group key agreement using short broadcasts. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF fault tolerance, group key agreement
21Matthew Cary, Aparna Das, Benjamin Edelman, Ioannis Giotis 0001, Kurtis Heimerl, Anna R. Karlin, Claire Mathieu, Michael Schwarz 0002 Greedy bidding strategies for keyword auctions. Search on Bibsonomy EC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF bidding strategies, keyword auctions
21Jongsung Kim, Seokhie Hong, Bart Preneel Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block Ciphers, AES, Related-Key Rectangle Attack
21Yevgeniy Dodis, Prashant Puniya Feistel Networks Made Public, and Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Verifiable Random Functions/Permutations, PRFs, PRPs, MACs, Domain Extension, Feistel Network
21Wentao Zhang, Wenling Wu, Dengguo Feng New Results on Impossible Differential Cryptanalysis of Reduced AES. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, AES, impossible differentials
21Jiqiang Lu Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF HIGHT, Block cipher, Related-key attack, Impossible differential cryptanalysis, Rectangle attack
21Chryssis Georgiou, Nicolas C. Nicolaou, Alexander A. Shvartsman Brief Announcement: Fault-Tolerant SemiFast Implementations of Atomic Read/Write Registers. Search on Bibsonomy DISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Alejandro Hevia Universally Composable Simultaneous Broadcast. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Bernadette Charron-Bost, André Schiper Improving Fast Paxos: being optimistic with no overhead. Search on Bibsonomy PRDC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Iannis Tourlakis New Lower Bounds for Vertex Cover in the Lovasz-Schrijver Hierarchy. Search on Bibsonomy CCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Chryssis Georgiou, Nicolas C. Nicolaou, Alexander A. Shvartsman Fault-tolerant semifast implementations of atomic read/write registers. Search on Bibsonomy SPAA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF communication rounds, read/write registers, fault-tolerance, distributed algorithms, atomicity
21Navneet Malpani, Yu Chen 0017, Nitin H. Vaidya, Jennifer L. Welch Distributed Token Circulation in Mobile Ad Hoc Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF distributed system, Mobile ad hoc networks, token circulation
21Duo Lei, Chao Li, Keqin Feng New Observation on Camellia. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Giovanni Di Crescenzo, Ivan Visconti Concurrent Zero Knowledge in the Public-Key Model. Search on Bibsonomy ICALP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Carole Delporte-Gallet, Hugues Fauconnier, Stephanie Lorraine Horn, Sam Toueg Fast fault-tolerant agreement algorithms. Search on Bibsonomy PODC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF dirty crashes, early-stopping, terminating reliable broadcast, lower bounds, consensus
21Joël Alwen, Giuseppe Persiano, Ivan Visconti Impossibility and Feasibility Results for Zero Knowledge with Public Keys. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Rahul Jain 0001, Jaikumar Radhakrishnan, Pranab Sen Prior Entanglement, Message Compression and Privacy in Quantum Communication. Search on Bibsonomy CCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Gus Gutoski Upper Bounds for Quantum Interactive Proofs with Competing Provers. Search on Bibsonomy CCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Boaz Barak, Yehuda Lindell, Salil P. Vadhan Lower Bounds for Non-Black-Box Zero Knowledge. Search on Bibsonomy FOCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle A Note on Weak Keys of PES, IDEA, and Some Extended Variants. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Ramesh Karri, Grigori Kuznetsov, Michael Gössel Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Pranab Sen Lower bounds for predecessor searching in the cell probe model. Search on Bibsonomy CCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Michel Hurfin, Achour Mostéfaoui, Michel Raynal A Versatile Family of Consensus Protocols Based on Chandra-Toueg's Unreliable Failure Detectors. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2002 DBLP  DOI  BibTeX  RDF fault-tolerance, quorum, asynchronous distributed system, crash failure, unreliable failure detector, consensus problem, consensus protocols
21Yasuo Hatano, Hiroki Sekine, Toshinobu Kaneko Higher Order Differential Attack of Camellia (II). Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21John Watrous imits on the Power of Quantum Statistical Zero-Knowledge. Search on Bibsonomy FOCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21Joan Daemen, Vincent Rijmen AES and the Wide Trail Design Strategy. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21Partha Dutta, Rachid Guerraoui The inherent price of indulgence. Search on Bibsonomy PODC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 6665 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license