The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICITS"( http://dblp.L3S.de/Venues/ICITS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icits

Publication years (Num. hits)
2005 (20) 2007 (17) 2008 (23) 2009 (19) 2010-2011 (21) 2012-2013 (26) 2014-2015 (19) 2016 (15) 2017-2018 (124) 2019 (91) 2020 (70)
Publication types (Num. hits)
inproceedings(432) proceedings(13)
Venues (Conferences, Journals, ...)
ICITS(445)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 18 occurrences of 15 keywords

Results
Found 445 publication records. Showing 445 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Michael Walter 0001 Lattice Point Enumeration on Block Reduced Bases. Search on Bibsonomy ICITS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi 0001 The Chaining Lemma and Its Application. Search on Bibsonomy ICITS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Benjamin Fuller 0001, Ariel Hamlin Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy. Search on Bibsonomy ICITS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann Query-Complexity Amplification for Random Oracles. Search on Bibsonomy ICITS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bernardo Machado David, Ryo Nishimaki, Samuel Ranellucci, Alain Tapp Generalizing Efficient Multiparty Computation. Search on Bibsonomy ICITS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pengwei Wang 0006, Reihaneh Safavi-Naini Limited View Adversary Codes: Bounds, Constructions and Applications. Search on Bibsonomy ICITS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maciej Skorski Metric Pseudoentropy: Characterizations, Transformations and Applications. Search on Bibsonomy ICITS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ravi Kishore, Ashutosh Kumar 0002, Chiranjeevi Vanarasa, Kannan Srinathan Round-Optimal Perfectly Secret Message Transmission with Linear Communication Complexity. Search on Bibsonomy ICITS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ricardo Dahab, Steven D. Galbraith, Eduardo Morais Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes. Search on Bibsonomy ICITS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Damian Markham, Anne Marin Practical Sharing of Quantum Secrets over Untrusted Channels. Search on Bibsonomy ICITS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Anja Lehmann, Stefan Wolf 0001 (eds.) Information Theoretic Security - 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings Search on Bibsonomy ICITS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maciej Skorski Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy. Search on Bibsonomy ICITS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rafail Ostrovsky, Anat Paskin-Cherniavsky Locally Decodable Codes for Edit Distance. Search on Bibsonomy ICITS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rafael Dowsley, Jörn Müller-Quade, Tobias Nilges Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens. Search on Bibsonomy ICITS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Steven D. Galbraith, Barak Shani The Multivariate Hidden Number Problem. Search on Bibsonomy ICITS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ning Ding 0001 On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for Circuits. Search on Bibsonomy ICITS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohammad Hajiabadi, Bruce M. Kapron Gambling, Computational Information and Encryption Security. Search on Bibsonomy ICITS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Frédéric Dupuis, Jesper Buus Nielsen On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation. Search on Bibsonomy ICITS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Carles Padró (eds.) Information Theoretic Security - 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings Search on Bibsonomy ICITS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hadi Ahmadi, Reihaneh Safavi-Naini Detection of Algebraic Manipulation in the Presence of Leakage. Search on Bibsonomy ICITS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Paolo D'Arco, Roberto De Prisco, Alfredo De Santis Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes. Search on Bibsonomy ICITS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Juan A. Garay, Clint Givens, Rafail Ostrovsky, Pavel Raykov Broadcast (and Round) Efficient Verifiable Secret Sharing. Search on Bibsonomy ICITS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Paolo D'Arco, Roberto De Prisco Secure Two-Party Computation: A Visual Way. Search on Bibsonomy ICITS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Maciej Skorski Modulus Computational Entropy. Search on Bibsonomy ICITS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Maksym A. Girnyk, Frederic Gabry, Mikko Vehkaperä, Lars K. Rasmussen, Mikael Skoglund On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis. Search on Bibsonomy ICITS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Teng Guo, Feng Liu 0001, Chuan Kun Wu, YaWei Ren, Wen Wang 0008 On (k, n) Visual Cryptography Scheme with t Essential Parties. Search on Bibsonomy ICITS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mitsugu Iwamoto, Junji Shikata Information Theoretic Security for Encryption Based on Conditional Rényi Entropies. Search on Bibsonomy ICITS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Jakob Funder, Jesper Buus Nielsen, Louis Salvail Superposition Attacks on Cryptographic Protocols. Search on Bibsonomy ICITS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Hiroyuki Ohta, Kenji Kakuta How to Construct Strongly Secure Network Coding Scheme. Search on Bibsonomy ICITS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Iordanis Kerenidis, Mathieu Laurière, David Xiao New Lower Bounds for Privacy in Communication Protocols. Search on Bibsonomy ICITS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Matthew McKague, Lana Sheridan Insider-Proof Encryption with Applications for Quantum Key Distribution. Search on Bibsonomy ICITS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michal Jastrzebski, Stefan Dziembowski Leakage Resilience of the Blom's Key Distribution Scheme. Search on Bibsonomy ICITS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yanqing Yao, Zhoujun Li 0001 Overcoming Weak Expectations via the Rényi Entropy and the Expanded Computational Entropy. Search on Bibsonomy ICITS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yevgeniy Dodis Shannon Impossibility, Revisited. Search on Bibsonomy ICITS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Bernardo Machado David, Anderson C. A. Nascimento, Jörn Müller-Quade Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions. Search on Bibsonomy ICITS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Maki Yoshida, Toru Fujiwara, Marc P. C. Fossorier Optimum General Threshold Secret Sharing. Search on Bibsonomy ICITS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Ben Riva, Guy N. Rothblum Two Protocols for Delegation of Computation. Search on Bibsonomy ICITS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation. Search on Bibsonomy ICITS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yohei Watanabe 0001, Takenobu Seito, Junji Shikata Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes. Search on Bibsonomy ICITS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Marcel Keller, Gert Læssøe Mikkelsen, Andy Rupp Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols. Search on Bibsonomy ICITS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Anne Broadbent, Stacey Jeffery, Samuel Ranellucci, Alain Tapp Trading Robustness for Correctness and Privacy in Certain Multiparty Computations, beyond an Honest Majority. Search on Bibsonomy ICITS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mohsen Alimomeni, Reihaneh Safavi-Naini Guessing Secrecy. Search on Bibsonomy ICITS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ronald Cramer, Ivan Damgård, Valerio Pastro On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations. Search on Bibsonomy ICITS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Adam D. Smith (eds.) Information Theoretic Security - 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings Search on Bibsonomy ICITS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub Passive Corruption in Statistical Multi-Party Computation - (Extended Abstract). Search on Bibsonomy ICITS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ashish Choudhury, Kaoru Kurosawa, Arpita Patra The Round Complexity of Perfectly Secure General VSS. Search on Bibsonomy ICITS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Amin Shokrollahi LT-Codes and Phase Transitions for Mutual Information - (Invited Talk). Search on Bibsonomy ICITS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Serge Fehr (eds.) Information Theoretic Security - 5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings Search on Bibsonomy ICITS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Roberto De Prisco, Alfredo De Santis Using Colors to Improve Visual Cryptography for Black and White Images. Search on Bibsonomy ICITS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Manan Nayak, Shashank Agrawal, Kannan Srinathan Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks. Search on Bibsonomy ICITS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade Efficient Reductions for Non-signaling Cryptographic Primitives. Search on Bibsonomy ICITS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub Graceful Degradation in Multi-Party Computation (Extended Abstract). Search on Bibsonomy ICITS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Benny Applebaum Randomly Encoding Functions: A New Cryptographic Paradigm - (Invited Talk). Search on Bibsonomy ICITS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yongge Wang, Yvo Desmedt Homogeneous Faults, Colored Edge Graphs, and Cover Free Families. Search on Bibsonomy ICITS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alexander Barg, Grigory Kabatiansky Digital Fingerprinting under and (Somewhat) beyond the Marking Assumption - (Invited Talk). Search on Bibsonomy ICITS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Colleen Swanson, Douglas R. Stinson Unconditionally Secure Signature Schemes Revisited. Search on Bibsonomy ICITS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Imre Csiszár On Information Theoretic Security: Mathematical Models and Techniques - (Invited Talk). Search on Bibsonomy ICITS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yuval Ishai Correlation Extractors and Their Applications - (Invited Talk). Search on Bibsonomy ICITS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Renato Renner Quantum-Resilient Randomness Extraction - (Invited Talk). Search on Bibsonomy ICITS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ivan Damgård Quantum Communication Attacks on Classical Cryptographic Protocols - (Invited Talk). Search on Bibsonomy ICITS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ronald de Wolf Bell Inequalities: What Do We Know about Them and Why Should Cryptographers Care? - (Invited Talk). Search on Bibsonomy ICITS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hadi Ahmadi, Reihaneh Safavi-Naini Common Randomness and Secret Key Capacities of Two-Way Channels. Search on Bibsonomy ICITS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Arpita Patra, C. Pandu Rangan Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal Resilience. Search on Bibsonomy ICITS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Leonid Reyzin Some Notions of Entropy for Cryptography - (Invited Talk). Search on Bibsonomy ICITS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Akinori Kawachi, Christopher Portmann, Keisuke Tanaka Characterization of the Relations between Information-Theoretic Non-malleability, Secrecy, and Authenticity. Search on Bibsonomy ICITS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa (eds.) Information Theoretic Security, 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers Search on Bibsonomy ICITS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Stefan Dziembowski A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes. Search on Bibsonomy ICITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Qiushi Yang, Yvo Desmedt Cryptanalysis of Secure Message Transmission Protocols with Feedback. Search on Bibsonomy ICITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Han Chen, Pasquale Malacaria The Optimum Leakage Principle for Analyzing Multi-threaded Programs. Search on Bibsonomy ICITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Arpita Patra, Ashish Choudhary, C. Pandu Rangan Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience. Search on Bibsonomy ICITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kazukuni Kobara Code-Based Public-Key Cryptosystems and Their Applications. Search on Bibsonomy ICITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Joël Alwen, Yevgeniy Dodis, Daniel Wichs Survey: Leakage Resilience and the Bounded Retrieval Model. Search on Bibsonomy ICITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Gregory M. Zaverucha, Douglas R. Stinson Group Testing and Batch Verification. Search on Bibsonomy ICITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt (eds.) Information Theoretic Security - Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers Search on Bibsonomy ICITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Adam D. Smith What Can Cryptography Do for Coding Theory? Search on Bibsonomy ICITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Koji Nuida A General Conversion Method of Fingerprint Codes to (More) Robust Fingerprint Codes against Bit Erasure. Search on Bibsonomy ICITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kazuhiro Senda, Masaki Kawamura Statistical-Mechanical Approach for Multiple Watermarks Using Spectrum Spreading. Search on Bibsonomy ICITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Masato Koashi Security of Key Distribution and Complementarity in Quantum Mechanics. Search on Bibsonomy ICITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Prakash Narayan Multiterminal Secrecy Generation and Tree Packing. Search on Bibsonomy ICITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Peter Gazi, Ueli Maurer Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification. Search on Bibsonomy ICITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Oriol Farràs, Ignacio Gracia, Sebastià Martín Molleví, Carles Padró Linear Threshold Multisecret Sharing Schemes. Search on Bibsonomy ICITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jun Muramatsu, Kazuyuki Yoshimura, Peter Davis Information Theoretic Security Based on Bounded Observability. Search on Bibsonomy ICITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Koji Nuida, Goichiro Hanaoka On the Security of Pseudorandomized Information-Theoretically Secure Schemes. Search on Bibsonomy ICITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Koji Nuida, Goichiro Hanaoka An Improvement of Pseudorandomization against Unbounded Attack Algorithms - The Case of Fingerprint Codes. Search on Bibsonomy ICITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Oriol Farràs, Jessica Ruth Metcalf-Burton, Carles Padró, Leonor Vázquez On the Optimization of Bipartite Secret Sharing Schemes. Search on Bibsonomy ICITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Michael J. Collins 0003 Upper Bounds for Set Systems with the Identifiable Parent Property. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Thomas Baignères, Serge Vaudenay The Complexity of Distinguishing Distributions (Invited Talk). Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ashish Choudhary, Arpita Patra, B. V. Ashwinkumar, K. Srinathan, C. Pandu Rangan Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Norbert Lütkenhaus Theory of Quantum Key Distribution: The Road Ahead (Invited Talk). Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson Efficient Key Predistribution for Grid-Based Wireless Sensor Networks. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF costas arrays, wireless sensor networks, key predistribution
1François-Xavier Standaert, Tal Malkin, Moti Yung Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk). Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jacques Patarin A Proof of Security in O(2n) for the Xor of Two Random Permutations. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security beyond the birthday bound, Luby-Rackoff backwards, Pseudorandom functions, pseudorandom permutations
1Juan A. Garay Partially Connected Networks: Information Theoretically Secure Protocols and Open Problems (Invited Talk). Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Travis R. Beals, Barry C. Sanders Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF QKD, secret sharing, information theoretic security, quantum key distribution
1Reihaneh Safavi-Naini (eds.) Information Theoretic Security, Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Venkatesan Guruswami List Error-Correction with Optimal Information Rate (Invited Talk). Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Toshinori Araki Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message Decryption. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Hugue Blier, Alain Tapp A Single Initialization Server for Multi-party Cryptography. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF two-party computation, initialization server, cryptography, zero-knowledge, multi-party computation
1Andreas Jakoby, Maciej Liskiewicz, Aleksander Madry Susceptible Two-Party Quantum Computations. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1João Barros, Matthieu R. Bloch Strong Secrecy for Wireless Channels (Invited Talk). Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 445 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license