The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for constructions with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1973 (17) 1974-1977 (15) 1978-1979 (15) 1980-1982 (17) 1983-1984 (20) 1985-1986 (23) 1987 (21) 1988 (31) 1989 (31) 1990 (44) 1991 (40) 1992 (44) 1993 (48) 1994 (40) 1995 (50) 1996 (63) 1997 (53) 1998 (76) 1999 (89) 2000 (80) 2001 (140) 2002 (155) 2003 (190) 2004 (202) 2005 (295) 2006 (333) 2007 (311) 2008 (342) 2009 (259) 2010 (144) 2011 (125) 2012 (143) 2013 (152) 2014 (154) 2015 (168) 2016 (187) 2017 (208) 2018 (190) 2019 (222) 2020 (193) 2021 (192) 2022 (190) 2023 (214) 2024 (45)
Publication types (Num. hits)
article(2747) book(7) incollection(25) inproceedings(2695) phdthesis(96) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2061 occurrences of 1273 keywords

Results
Found 5571 publication records. Showing 5571 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
12Xiaohu Tang, Wai Ho Mow A New Systematic Construction of Zero Correlation Zone Sequences Based on Interleaved Perfect Sequences. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Yeow Meng Chee, San Ling Improved Lower Bounds for Constant GC-Content DNA Codes. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Suhas N. Diggavi, A. Robert Calderbank, Sanket Dusad, Naofal Al-Dhahir Diversity Embedded Space-Time Codes. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Olga Saukh, Robert Sauter, Matthias Gauger, Pedro José Marrón, Kurt Rothermel On Boundary Recognition without Location Information in Wireless Sensor Networks. Search on Bibsonomy IPSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sensor networks, graph theory, topology, embedding, boundary detection
12David Peleg, Liam Roditty Localized Spanner Construction for Ad Hoc Networks with Variable Transmission Range. Search on Bibsonomy ADHOC-NOW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Yves Bertot A Short Presentation of Coq. Search on Bibsonomy TPHOLs The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Paolo Penna, Carmine Ventre Collusion-Resistant Mechanisms with Verification Yielding Optimal Solutions. Search on Bibsonomy ESA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Yang Lu 0001, Jiguo Li 0001, Junmo Xiao Generic Construction of Certificate-Based Encryption. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Ueli M. Maurer, Stefano Tessaro Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Jacob C. N. Schuldt, Kanta Matsuura, Kenneth G. Paterson Proxy Signatures Secure Against Proxy Key Exposure. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF provable security, proxy signatures
12Ran Canetti, Ronny Ramzi Dakdouk Obfuscating Point Functions with Multibit Output. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF composable obfuscation, multibit point function obfuscation, digital locker, point function obfuscation, obfuscation
12Omkant Pandey, Rafael Pass, Amit Sahai, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam Precise Concurrent Zero Knowledge. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Jonathan Katz, Amit Sahai, Brent Waters Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara Anonymous Fingerprinting for Predelivery of Contents. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Alejandro Hevia, Daniele Micciancio An Indistinguishability-Based Characterization of Anonymous Channels. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Frédéric Blanqui, Jean-Pierre Jouannaud, Pierre-Yves Strub From Formal Proofs to Mathematical Proofs: A Safe, Incremental Way for Building in First-order Decision Procedures. Search on Bibsonomy IFIP TCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Ariel Gabizon, Ronen Shaltiel Increasing the Output Length of Zero-Error Dispersers. Search on Bibsonomy APPROX-RANDOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Domingos Dellamonica Jr. Simpler Constant-Seed Condensers. Search on Bibsonomy LATIN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Igor E. Shparlinski Pseudorandom Graphs from Elliptic Curves. Search on Bibsonomy LATIN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Pseudorandom graph, elliptic curve, exponential sum
12Kiran S. Kedlaya, Sergey Yekhanin Locally Decodable Codes From Nice Subsets of Finite Fields and Prime Factors of Mersenne Numbers. Search on Bibsonomy CCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Locally decodable codes, Mersenne primes
12Paul Libbrecht, Cyrille Desmoulins, Christian Mercat, Colette Laborde, Michael Dietrich, Maxim Hendriks Cross-Curriculum Search for Intergeo. Search on Bibsonomy AISC/MKM/Calculemus The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Mohamed Layouni, Maki Yoshida, Shingo Okamura Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Philippe Artzner, Freddy Delbaen, Jean-Marc Eber, David Heath, Hyejin Ku Coherent multiperiod risk adjusted values and Bellman's principle. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Bellman’s principle, Capital requirement, Risk-adjusted values, Stability by pasting, Time consistency, Coherence
12Alexandre L. Correa, Cláudia M. L. Werner Refactoring object constraint language specifications. Search on Bibsonomy Softw. Syst. Model. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Xiaoju Dong, Yuxi Fu Barbed Congruence of Asymmetry and Mismatch. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF bisimulation, axiomatization, process calculus
12Yan Zong Ding, Danny Harnik, Alon Rosen, Ronen Shaltiel Constant-Round Oblivious Transfer in the Bounded Storage Model. Search on Bibsonomy J. Cryptol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Ran Canetti, Shai Halevi, Jonathan Katz A Forward-Secure Public-Key Encryption Scheme. Search on Bibsonomy J. Cryptol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Orr Dunkelman, Nathan Keller A New Criterion for Nonlinearity of Block Ciphers. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Solomon W. Golomb, Guang Gong The Status of Costas Arrays. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Oscar Moreno, José R. Ortiz-Ubarri Double Periodic Arrays with Optimal Correlation for Applications in Watermarking. Search on Bibsonomy SSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF double-periodic, watermark, correlation, sequences, array, matrix
12Shai Halevi, Hugo Krawczyk Security under key-dependent inputs. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF circular encryption, key-dependent input, self encryption
12David Delahaye, Catherine Dubois, Jean-Frédéric Étienne Extracting Purely Functional Contents from Logical Inductive Types. Search on Bibsonomy TPHOLs The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Song-Hai Zhang, Qihui Zhu, Ralph R. Martin Propagation of Geometric Tolerance Zones in 3D. Search on Bibsonomy IMA Conference on the Mathematics of Surfaces The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Fadoua Ghourabi, Tetsuo Ida, Hidekazu Takahashi, Mircea Marin, Asem Kasem Logical and algebraic view of Huzita's origami axioms with applications to computational origami. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF constraint solving, first-order predicate logic, origami, geometric theorem proving
12Remo Meier, Bartosz Przydatek, Jürg Wullschleger Robuster Combiners for Oblivious Transfer. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF robust combiners, weak oblivious transfer, oblivious transfer
12Camilla Hollanti, Hsiao-feng Lu Normalized Minimum Determinant Calculation for Multi-block and Asymmetric Space-Time Codes. Search on Bibsonomy AAECC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Asymmetric space-time block codes (ASTBCs), cyclic division algebras (CDAs), dense lattices, diversity-multiplexing tradeoff (DMT), maximal orders, multi-block, multiple-input multiple-output (MIMO) channels, nonvanishing determinant (NVD), discriminants
12Cécile Delerablée, Pascal Paillier, David Pointcheval Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Xavier Boyen Miniature CCA2 PK Encryption: Tight Security Without Redundancy. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12George Danezis, Claudia Díaz, Sebastian Faust, Emilia Käsper, Carmela Troncoso, Bart Preneel Efficient Negative Databases from Cryptographic Hash Functions. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Aleksandrs Slivkins Towards fast decentralized construction of locality-aware overlay networks. Search on Bibsonomy PODC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF grid dimension, growth-constrained metrics, locality-aware networks, multi-cast trees, triangulation, routing schemes, distance labeling
12Mohamed Layouni Accredited Symmetrically Private Information Retrieval. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Symmetrically private information retrieval, policy enforcement, anonymous credentials
12Oliver Thomas Joint Reference Modeling: Collaboration Support through Version Management. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Tor E. Bjørstad, Alexander W. Dent, Nigel P. Smart Efficient KEMs with Partial Message Recovery. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Lutz Schröder Bootstrapping Types and Cotypes in HasCASL. Search on Bibsonomy CALCO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Orna Kupferman, Yoad Lustig Lattice Automata. Search on Bibsonomy VMCAI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Omer Barkol, Yuval Ishai, Enav Weinreb On Locally Decodable Codes, Self-correctable Codes, and t -Private PIR. Search on Bibsonomy APPROX-RANDOM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Benny Applebaum, Yuval Ishai, Eyal Kushilevitz Cryptography with Constant Input Locality. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Iftach Haitner, Omer Reingold A New Interactive Hashing Theorem. Search on Bibsonomy CCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Noga Alon, Dana Moshkovitz, Shmuel Safra Algorithmic construction of sets for k-restrictions. Search on Bibsonomy ACM Trans. Algorithms The full citation details ... 2006 DBLP  DOI  BibTeX  RDF k-restriction, almost k-wise independence, generalized hashing, splitter, Set-Cover, Derandomization, group testing
12Frank K. Hwang, Wen-Dar Lin, Vadim Lioubimov On noninterruptive rearrangeable networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Paull's matrix, doubled path, noninterruptive rearrangeable (NIR), output (input)-divertability, rearrangeably nonblocking (RNB), strictly nonblocking (SNB), wide-sense nonblocking (WSNB), clos network
12Robert F. Bailey Uncoverings-by-bases for base-transitive permutation groups. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF AMS Classifications 05B40(primary), 20B20(primary), 94B35 (primary), 11T30(secondary), 05B30 (secondary)
12Amir Bennatan, David Burshtein, Giuseppe Caire, Shlomo Shamai Superposition coding for side-information channels. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Eva Bayer-Flückiger, Frédérique E. Oggier, Emanuele Viterbo Algebraic lattice constellations: bounds on performance. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Jifeng Geng, Urbashi Mitra Nonlinear hierarchical space-time block codes: construction and regular MTCM design. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Roxana Girju Out-of-context noun phrase semantic interpretation with cross-linguistic evidence. Search on Bibsonomy CIKM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF classification, SVM, semantic relations, computational semantics
12Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci Provably-secure time-bound hierarchical key assignment schemes. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, provable security, key assignment
12Bálint Laczay Coding for the Multiple-Access Adder Channel. Search on Bibsonomy GTIT-C The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12William D. Lewis ODIN: A Model for Adapting and Enriching Legacy Infrastructure. Search on Bibsonomy e-Science The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Tim Oates 0001, Tom Armstrong, Leonor Becerra-Bonache, Mike Atamas Inferring Grammars for Mildly Context Sensitive Languages in Polynomial-Time. Search on Bibsonomy ICGI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Ronald L. Rivest, Adi Shamir, Yael Tauman How to Leak a Secret: Theory and Applications of Ring Signatures. Search on Bibsonomy Essays in Memory of Shimon Even The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Sujata Doshi, Fabian Monrose, Aviel D. Rubin Efficient Memory Bound Puzzles Using Pattern Databases. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Emin Martinian, Martin J. Wainwright Low Density Codes Achieve theRate-Distortion Bound. Search on Bibsonomy DCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Donghoon Chang, Sangjin Lee 0002, Mridul Nandi, Moti Yung Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Sanjit Chatterjee, Palash Sarkar 0001 Generalization of the Selective-ID Security Model for HIBE Protocols. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Antoine Joux, Frédéric Muller Chosen-Ciphertext Attacks Against MOSQUITO. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Debrup Chakraborty, Palash Sarkar 0001 A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF tweakable encryption, strong pseudo-random permutation, mode of operation
12Shanshan Duan, Zhenfu Cao Efficient and Provably Secure Multi-receiver Identity-Based Signcryption. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Jong-Bok Kim, Jaehyung Yang Coordination Structures in a Typed Feature Structure Grammar: Formalization and Implementation. Search on Bibsonomy FinTAL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong ID-Based Ring Signature Scheme Secure in the Standard Model. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Mridul Nandi A Simple and Unified Method of Proving Indistinguishability. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Savas Konur A Decidable Temporal Logic for Events and States. Search on Bibsonomy TIME The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Luca Bortolussi, Andrea Sgarro Possibilistic Channels for DNA Word Design. Search on Bibsonomy SMPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Orr Dunkelman, Nathan Keller A New Criterion for Nonlinearity of Block Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12David Molnar, Tadayoshi Kohno, Naveen Sastry, David A. Wagner 0001 Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract). Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Leah Buechley A Construction Kit for Electronic Textiles. Search on Bibsonomy ISWC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang Certificateless Designated Verifier Signature Schemes. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Designated Verifier, Gap Bilinear Diffie-Hellman Problem, Certificateless Cryptography
12Remo Meier, Bartosz Przydatek On Robust Combiners for Private Information Retrieval and Other Primitives. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Ninghui Li, Wenliang Du, Dan Boneh Oblivious signature-based envelope. Search on Bibsonomy Distributed Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12L. Ji, Dianhua Wu, Lei Zhu Existence of Generalized Steiner Systems GS(2, 4, v, 2). Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF generalized Steiner system, group divisible design, perfect base, constant weight code
12Peter L. Montgomery Five, Six, and Seven-Term Karatsuba-Like Formulae. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Karatsuba, Karatsuba-Ofman, characteristic 2, elliptic curve arithmetic, Galois fields, polynomial multiplication, binary fields
12Krishna V. Palem Energy Aware Computing through Probabilistic Switching: A Study of Limits. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF low-power design, Energy-aware systems, probabilistic computation
12Azer Bestavros, John W. Byers, Khaled Harfoush Inference and Labeling of Metric-Induced Network Topologies. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF packet-pair probing, Bayesian probing, Internet tomography, performance evaluation, End-to-end measurement
12Ron M. Roth, Gadiel Seroussi Symbol-intersecting codes. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Andreas Klappenecker, Martin Rötteler On the monomiality of nice error bases. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Alexander A. Davydov, Giorgio Faina, Stefano Marcugini, Fernanda Pambianco Locally optimal (nonshortening) linear covering codes and minimal saturating sets in projective spaces. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Michele Flammini, Giorgio Gambosi, Alfredo Navarra Wireless ATM Layouts for Chain Networks. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF wireless networks, ATM networks, capacity planning, mobile users, chains
12Subhash Khot Guest column: inapproximability results via Long Code based PCPs. Search on Bibsonomy SIGACT News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky Sufficient Conditions for Collision-Resistant Hashing. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF private information-retrieval, homomorphic encryption, Collision-resistant hash functions
12Yevgeniy Dodis, Jonathan Katz Chosen-Ciphertext Security of Multiple Encryption. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Yevgeniy Dodis, Adam D. Smith Entropic Security and the Encryption of High Entropy Messages. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Frédéric Jourdan Quadric Modeling in a Grassmann-Cayley Algebra Setting. Search on Bibsonomy IV The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Michael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia Indexing Information for Data Forensics. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF data forensics, data marking, combinatorial group testing, data structures, data integrity, information hiding, tamper detection
12Flavio Paiva Junqueira, Keith Marzullo Coterie Availability in Sites. Search on Bibsonomy DISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Michele Flammini, Luca Moscardelli, Alfredo Navarra, Stéphane Pérennes Asymptotically Optimal Solutions for Small World Graphs. Search on Bibsonomy DISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Olgica Milenkovic, Navin Kashyap On the Design of Codes for DNA Computing. Search on Bibsonomy WCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Amit Sahai, Brent Waters Fuzzy Identity-Based Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Michael Backes 0001, Christian Cachin, Alina Oprea Lazy Revocation in Cryptographic File Systems. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12John Power Discrete Lawvere Theories. Search on Bibsonomy CALCO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Samson Abramsky Abstract Scalars, Loops, and Free Traced and Strongly Compact Closed Categories. Search on Bibsonomy CALCO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Ichiro Hasuo, Bart Jacobs 0001 Context-Free Languages via Coalgebraic Trace Semantics. Search on Bibsonomy CALCO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 5571 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license