The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACISP"( http://dblp.L3S.de/Venues/ACISP )

URL (DBLP): http://dblp.uni-trier.de/db/conf/acisp

Publication years (Num. hits)
1996 (30) 1997 (31) 1998 (38) 1999 (27) 2000 (40) 2001 (41) 2002 (38) 2003 (46) 2004 (42) 2005 (49) 2006 (37) 2007 (34) 2008 (35) 2009 (32) 2010 (25) 2011 (36) 2012 (36) 2013 (31) 2014 (33) 2015 (29) 2018 (52) 2019 (41) 2020 (37) 2021 (36) 2022 (26) 2023 (28)
Publication types (Num. hits)
inproceedings(904) proceedings(26)
Venues (Conferences, Journals, ...)
ACISP(930)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 391 occurrences of 265 keywords

Results
Found 930 publication records. Showing 930 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Adrian Spalka, Armin B. Cremers, Hartmut Lehmler Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1William D. Banks, Daniel Lieman, Igor E. Shparlinski An Extremely Small and Efficient Identification Scheme. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Richard Au, Mark Looi, Paul Ashley Towards a New Authorisation Paradigm for Extranets. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Niels Ferguson, Bruce Schneier, David A. Wagner 0001 Security Weaknesses in a Randomized Stream Cipher. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Gregory Saunders, Michael Hitchens, Vijay Varadharajan An Analysis of Access Control Models. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Shahrokh Saeednia, Hossein Ghodosi A Self-Certified Group-Oriented Cryptosystem Without a Combiner. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Chengxin Qu, Jennifer Seberry, Josef Pieprzyk On the Symmetric Property of Homogeneous Boolean Functions. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF S-box Theory, Cryptographically Strong Boolean Functions, Homogeneous Functions, Symmetric Functions
1Hossein Ghodosi, Josef Pieprzyk Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Cryptography, Digital Signatures, Proxy Signatures, ElGamal signatures
1Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Jovan Dj. Golic, Andrew J. Clark, Ed Dawson Inversion Attack and Branching. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Paul Ashley, Bradley Broom, Mark Vandenwauver An Implementation of a Secure Version of NFS Including RBAC. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Yun Bai 0001, Vijay Varadharajan Authorization in Object Oriented Databases. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF security, formal specification, object oriented databases, inheritance, authorization policy
1Seungwon Lee, Seong-Min Hong 0001, Hyunsoo Yoon, Yookun Cho Accelerating Key Establishment Protocols for Mobile Communication. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Subhamoy Maitra, Palash Sarkar 0001 Enumeration of Correlation Immune Boolean Functions. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Boolean Function, Stream Cipher, Symmetry, Nonlinearity, Enumeration, Balancedness, Correlation Immunity, Nondegeneracy
1Siguna Müller On the Security of an RSA Based Encryption Scheme. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Jacques Traoré Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash Systems. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1William Millan, Andrew J. Clark, Ed Dawson Boolean Function Design Using Hill Climbing Methods. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Wai W. Fung, James W. Gray III On m-Permutation Protection Scheme Against Modification Attack. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Kapali Viswanathan, Colin Boyd, Ed Dawson Publicly Verifiable Key Escrow with Limited Time Span. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Jianying Zhou 0001, Robert H. Deng, Feng Bao 0001 Evolution of Fair Non-repudiation with TTP. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF fair non-repudiation, trusted third party, secure electronic commerce
1Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang Changing Thresholds in the Absence of Secure Channels. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Threshold Changeable Secret Sharing, Shamir Secret Sharing, Geometrical Secret Sharing, Secret Sharing
1Jeffrey Horton, Jennifer Seberry Companion Viruses and the Macintosh: Threats and Countermeasures. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Khanh Quoc Nguyen, Yi Mu 0001, Vijay Varadharajan Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Alexander Tiountchik, Elena Trichina RSA Acceleration with Field Programmable Gate Arrays. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Arjen K. Lenstra Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Akihiro Yamamura A Functional Cryptosystem Using a Group Action. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF functional cryptosystem, backward deterministic system, modular group, amalgamated free product, public-key cryptosystem
1Marc Gysin, Jennifer Seberry Generalised Cycling Attacks on RSA and Strong RSA Primes. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Dingyi Pei, Yuqiang Li, Yejing Wang, Reihaneh Safavi-Naini Characterization of Optimal Authentication Codes with Arbitration. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Josef Pieprzyk, Reihaneh Safavi-Naini, Jennifer Seberry (eds.) Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Chih-Hung Li, Josef Pieprzyk Conference Key Agreement from Secret Sharing. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Key Establishment Protocols, Shamir Secret Sharing, Cryptographic Protocols, Key Agreement Protocols
1Colin Boyd, Ernest Foo, Chris Pavlovski Efficient Electronic Cash Using Batch Signatures. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Carsten Rudolph A Formal Model for Systematic Design of Key Establishment Protocols. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Rainer Falk, Markus Trommer Integrated Management of Network and Host Based Security Mechanisms. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Qi He, Katia P. Sycara, Zhongmin Su A Solution to Open Standard of PKI. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Xun Yi, Kwok-Yan Lam, Yongfei Han Differential Cryptanalysis of a Block Cipher. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Uri Blumenthal, Nguyen C. Hien, J. H. Rooney Low-Cost Secure Server Connection with Limited-Privilege Clients. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Hung-Min Sun, Shiuh-Pyng Shieh On Private-Key Cryptosystems Based on Product Codes. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Jaroslav Hruby Trends in Quantum Cryptography in Czech Republic. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Colin Boyd, Ed Dawson (eds.) Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Tuomas Aura Fast Access Control Decisions from Delegation Certificate Databases. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Goichiro Hanaoka, Yuliang Zheng 0001, Hideki Imai LITESET: A Light-Weight Secure Electronic Transaction Protocol. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Wai W. Fung, James W. Gray III Protection Against EEPROM Modification Attacks. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Leonie Simpson, Jovan Dj. Golic, Ed Dawson A Probabilistic Correlation Attack on the Shrinking Generator. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Cryptography, Stream ciphers, Correlation attacks, Shrinking generator
1Per Kaijser A Review of the SESAME Development. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini Secret Sharing in Multilevel and Compartmented Groups. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Hierarchical and Compartmented Access Structures, Ideal Schemes, Secret Sharing, Perfect Security
1Tage Stabell-Kulø, Arne Helme, Gianluca Dini Detecting Key-Dependencies. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Martin Manninger, Robert Schischka Adapting an Electronic Purse for Internet Payments. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Shahrokh Saeednia, Reihaneh Safavi-Naini Efficient Identity-Based Conference Key Distribution Protocols. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Security classes, Identity-based, Conference key
1Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang On Construction of Cumulative Secret Sharing Schemes. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Gregory G. Rose A Stream Cipher Based on Linear Feedback over GF(28). Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Siguna Müller, Winfried B. Müller The Security of Public Key Cryptosystems Based on Integer Factorization. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF factorization problem, Dickson cryptosystem, LUC cryptosystem, Williams cryptosystem, ElGamal cryptosystem, secure keys, cryptanalysis, Public-key cryptography, RSA cryptosystem, discrete logarithm problem
1Thomas Riechmann, Jürgen Kleinöder Meta Objects for Access Control: Role-Based Principals. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Jovan Dj. Golic, Renato Menicocci Correlation Attacks on Up/Down Cascades. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF clock-controlled shift registers, up/down and stop/go cascades, cryptanalysis, Stream ciphers, correlation attacks
1Yun Bai 0001, Vijay Varadharajan A High Level Language for Conventional Access Control Models. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Policy Transformations, Formal Language, Access Control Model, Authorization Policies
1Jonathon Tidswell, John Potter A Dynamically Typed Access Control Model. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Narn-Yih Lee, Tzonelih Hwang, Chih-Hung Wang On Zhang's Nonrepudiable Proxy Signature Schemes. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Elke Franz 0001, A. Graubner, Anja Jerichow, Andreas Pfitzmann Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode Attacks. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Colin Boyd, Anish Mathuria Key Establishment Protocols for Secure Mobile Communications: A Selective Survey. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Paul Ashley, Mark Vandenwauver, Bradley Broom A Uniform Approach to Securing Unix Applications Using SESAME. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Rauli Kaksonen, Petri Mähönen Object Modeling of Cryptographic Algorithms with UML. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Jeffrey Horton, Jennifer Seberry Covert Distributed Computing Using Java Through Web Spoofing. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt, Brian King, Wataru Kishimoto, Kaoru Kurosawa A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Mark Chen, Eric Hughes Protocol Failures Related to Order of Encryption and Signature. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Josef Pieprzyk, Cheng Xin Qu Rotation-Symmetric Functions and Fast Hashing. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Agus Fanar Syukri, Eiji Okamoto, Masahiro Mambo A User Identification System Using Signature Written with Mouse. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Reihaneh Safavi-Naini, Yejing Wang Bounds and Constructions for A3-code with Multi-senders. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Marie Henderson Applications of Linearised and Sub-linearised Polynomials to Information Security. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1William Millan How to Improve the Nonlinearity of Bijective S-Boxes. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Gary Carter, Ed Dawson, Lauren Nielsen Key Schedules of Iterative Block Ciphers. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk A Message Authentication Code Based on Latin Squares. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Jonathon Tidswell, John Potter An Approach to Dynamic Domain and Type Enforcement. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Jussipekka Leiwo, Yuliang Zheng 0001 A Method to Implement a Denial of Service Protection Base. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Audun Jøsang Prospectives for Modelling Trust in Information Security. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Shahrokh Saeednia Identity-Based and Self-Certified Key-Exchange Protocols. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Marc Fischlin Practical Memory Checkers for Stacks, Queues and Deques. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Feng Bao 0001, Robert H. Deng, Yongfei Han, Albert B. Jeng Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Yi Mu 0001, Vijay Varadharajan, Yan-Xia Lin New Micropayment Schemes Based on PayWords. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Jana Dittmann, Arnd Steinmetz Enabling Technology for the Trading of MPEG-encoded Video. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1M. Salmasidazeh, Leonie Simpson, Jovan Dj. Golic, Ed Dawson Fast Correlation Attacks and Multiple Linear Approximations. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1William Millan, Ed Dawson On the Security of Self-Synchronous Ciphers. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Satoshi Obana Characterisation of (k, n) Multi-receiver Authentication. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Masato Terada, Yuko Murayama User Access Domain Management Systems - ADAMS. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Jen Lim, Colin Boyd, Ed Dawson Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Aviel D. Rubin, Dan Boneh, Kevin Fu Revocation of Unread E-mail in an Untrusted Network. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Arjen K. Lenstra Using Cyclotomic Polynomials to Construct Efficient Discrete Logarithm Cryptosystems Over Finite Fields. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Masahiro Mambo, Eiji Okamoto, Kouichi Sakurai Protection of Data and Delegated Keys in Digital Distribution. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Colin Boyd On Key Agreement and Conference Key Agreement. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Yun Bai 0001, Vijay Varadharajan Analysis and Implementation of a Formal Authorisation Policy Design Approach. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Xun Yi, Kwok-Yan Lam A New Hash Function Based on Block Cipher. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Vijay Varadharajan, Josef Pieprzyk, Yi Mu 0001 (eds.) Information Security and Privacy, Second Australasian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Takehito Abe, Hiroshi Fujii, Kazuhiko Kushima Image Distribution Method with Embedded Identifier Scheme for Copyright Protection. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Chor Wah Man, Reihaneh Safavi-Naini Democratic Key Escrow Scheme. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Wenbo Mao Verifiable Escrowed Signature. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Vijay Varadharajan, Rajan Shankaran, Michael Hitchens Security Issues in Asynchronous Transfer Mode. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1John Holford, George M. Mohay ProtectOS: Operating System and Hardware Support for Small Objects. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Albert Sadowski Inefficiency of Variant Characteristics for Substitution-Permutation Networks with Position Permutations. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Fred Piper Trusted Third Parties for Secure Electronic Commerce - Are They Needed? Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Xian-Mo Zhang, Yuliang Zheng 0001 New Lower Bounds on Nonlinearity and a Class of Highly Nonlinear Functions. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Liqun Chen 0002, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild Secret Sharing with Reusable Polynomials. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Takayuki Tachikawa, Hiroaki Higaki, Makoto Takizawa 0001 Purpose-Oriented Access Control Model in Object-Based Systems. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 930 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license