Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
12 | Vanesa Daza, Javier Herranz, Germán Sáez |
On the Computational Security of a Distributed Key Distribution Scheme. |
IEEE Trans. Computers |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre |
From Identification to Signatures Via the Fiat-Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Christian Glaßer |
Space-Efficient Informational Redundancy. |
ISAAC |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Nicholas Armstrong-Crews, Manuela M. Veloso |
An approximate algorithm for solving oracular POMDPs. |
ICRA |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Hemalatha Diwakar, Alka Vaidya |
Information Analysis for Enabling Optimal Utilization of Service Delivery Channels in Indian Banks. |
ACIS-ICIS |
2008 |
DBLP DOI BibTeX RDF |
Banking system, Transaction analysis, service delivery technologies, DBMS, Business Intelligence |
12 | Efim B. Kinber |
On Learning Regular Expressions and Patterns Via Membership and Correction Queries. |
ICGI |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Fabrizio Dabbene, Pavel S. Shcherbakov, Boris T. Polyak |
A randomized cutting plane scheme with geometric convergence: Probabilistic analysis and SDP applications. |
CDC |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Marie-Claude Gaudel, Pascale Le Gall |
Testing Data Types Implementations from Algebraic Specifications. |
Formal Methods and Testing |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Honggang Wang, Bruce W. Schmeiser |
Discrete stochastic optimization using linear interpolation. |
WSC |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto |
Chosen Ciphertext Security with Optimal Ciphertext Overhead. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Michel Sede, Xu Li 0009, Da Li, Min-You Wu, Minglu Li 0001, Wei Shu |
Routing in Large-Scale Buses Ad Hoc Networks. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Edwin J. Beggs, José Félix Costa, Bruno Loff, John V. Tucker |
Oracles and Advice as Measurements. |
UC |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Monica Marinucci |
The Power of Data. |
BNCOD |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Yehuda Lindell, Benny Pinkas, Nigel P. Smart |
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Qiong Huang 0001, Guomin Yang, Duncan S. Wong, Willy Susilo |
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Christian Glaßer, Christian Reitwießner, Victor L. Selivanov |
The Shrinking Property for NP and coNP. |
CiE |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Ronen Shaltiel, Emanuele Viola |
Hardness amplification proofs require majority. |
STOC |
2008 |
DBLP DOI BibTeX RDF |
amplification, natural proofs, black-box, hardness, average-case complexity, constant-depth circuits, majority |
12 | Dan Gutfreund, Salil P. Vadhan |
Limitations of Hardness vs. Randomness under Uniform Reductions. |
APPROX-RANDOM |
2008 |
DBLP DOI BibTeX RDF |
derandomization, pseudorandom generators, black-box reductions |
12 | Margus Treumuth |
Normalization of Temporal Information in Estonian. |
TSD |
2008 |
DBLP DOI BibTeX RDF |
temporal reference in discourse, Temporal reasoning |
12 | Harish Chandra Karnatak, Sameer Saran, Karamjit Bhatia, Partha Sarathi Roy 0002 |
Multicriteria Spatial Decision Analysis in Web GIS Environment. |
GeoInformatica |
2007 |
DBLP DOI BibTeX RDF |
multicriteria spatial decision analysis, SDSS, biodiversity conservation, AHP, web GIS |
12 | Elzbieta Malinowski, Esteban Zimányi |
Logical Representation of a Conceptual Model for Spatial Data Warehouses. |
GeoInformatica |
2007 |
DBLP DOI BibTeX RDF |
spatial hierarchies, spatial measures, spatial databases, logical modeling, spatial data warehouses |
12 | Holger Spakowski, Rahul Tripathi |
On the Power of Unambiguity in Alternating Machines. |
Theory Comput. Syst. |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Joonsang Baek, Willy Susilo, Jianying Zhou 0001 |
New constructions of fuzzy identity-based encryption. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
efficient constructions, fuzzy identity-based encryption |
12 | Shai Halevi, Hugo Krawczyk |
Security under key-dependent inputs. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
circular encryption, key-dependent input, self encryption |
12 | Victor K. Wei |
Invisible designated confirmer signatures without random oracles. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Yan Song |
One-More Extension of Paillier Inversion Problem and Concurrent Secure Identification. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Michel Abdalla, Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt |
(Password) Authenticated Key Establishment: From 2-Party to Group. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
protocol compiler, common reference string model, key establishment, password-based authentication |
12 | George Barmpalias, Andrew E. M. Lewis, Mariya Ivanova Soskova |
Working with the LR Degrees. |
TAMC |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Iftach Haitner, Jonathan J. Hoch, Omer Reingold, Gil Segev 0001 |
Finding Collisions in Interactive Protocols - A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments. |
FOCS |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Mikkel Thorup |
Compact Oracles for Approximate Distances Around Obstacles in the Plane. |
ESA |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Vitaly Feldman, Shrenik Shah, Neal Wadhwa |
Separating Models of Learning with Faulty Teachers. |
ALT |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Benoît Libert, Jean-Jacques Quisquater |
Practical Time Capsule Signatures in the Standard Model from Bilinear Maps. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
time capsule signatures, standard model, bilinear maps |
12 | Marc Fischlin |
Anonymous Signatures Made Easy. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
perfectly one-way hash function, Anonymity, signature scheme, randomness extractor |
12 | Yong Xue, Lei Zheng, Ying Luo 0006, Jianping Guo, Wei Wan, Wei Wei, Ying Wang 0014 |
Modelbase System in Remote Sensing Information Analysis and Service Grid Node. |
International Conference on Computational Science (2) |
2007 |
DBLP DOI BibTeX RDF |
Modelbase system, Remote sensing information analysis and Service Grid Node, modelbase management system |
12 | Bo Wu 0001, Ram Nevatia |
Improving Part based Object Detection by Unsupervised, Online Boosting. |
CVPR |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Weidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto |
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
12 | P. Madhusudan |
Learning Algorithms and Formal Verification (Invited Tutorial). |
VMCAI |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Dana Glasner, Rocco A. Servedio |
Distribution-Free Testing Lower Bounds for Basic Boolean Functions. |
APPROX-RANDOM |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Adam L. Young, Moti Yung |
Space-Efficient Kleptography Without Random Oracles. |
Information Hiding |
2007 |
DBLP DOI BibTeX RDF |
twisted elliptic curves, elliptic curve, Key exchange, kleptography |
12 | Ueli M. Maurer, Stefano Tessaro |
Domain Extension of Public Random Functions: Beyond the Birthday Barrier. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Emanuele Viola |
On Approximate Majority and Probabilistic Time. |
CCC |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Wagner Saback Dantas, Alysson Neves Bessani, Joni da Silva Fraga, Miguel Correia 0001 |
Evaluating Byzantine Quorum Systems. |
SRDS |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Jonathan Katz, Moti Yung |
Characterization of Security Notions for Probabilistic Private-Key Encryption. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
Private-key encryptions, Definitions |
12 | Ittai Abraham, Gregory V. Chockler, Idit Keidar, Dahlia Malkhi |
Byzantine disk paxos: optimal resilience with byzantine shared memory. |
Distributed Comput. |
2006 |
DBLP DOI BibTeX RDF |
T-tolerant object implementations, Lower bounds, Consensus, Byzantine failures, Wait freedom, Shared-memory emulations |
12 | Douglas R. Stinson |
Some Observations on the Theory of Cryptographic Hash Functions. |
Des. Codes Cryptogr. |
2006 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
12 | Zhaoqing Wang, Harry H. Cheng |
Portable C/C++ Code for Portable XML Data. |
IEEE Softw. |
2006 |
DBLP DOI BibTeX RDF |
Ch, C/C++ Interpreter, Portable Code, Portable Data, XML |
12 | Shai Tirosh, Dimitri Van De Ville, Michael Unser |
Polyharmonic smoothing splines and the multidimensional Wiener filtering of fractal-like signals. |
IEEE Trans. Image Process. |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Christian Hundt 0001, Maciej Liskiewicz, Ulrich Wölfel |
Provably Secure Steganography and the Complexity of Sampling. |
ISAAC |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Olivier Teytaud, Sylvain Gelly, Jérémie Mary |
On the Ultimate Convergence Rates for Isotropic Algorithms and the Best Choices Among Various Forms of Isotropy. |
PPSN |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Sudipto Guha, Andrew McGregor 0001, Suresh Venkatasubramanian |
Streaming and sublinear approximation of entropy and information distances. |
SODA |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Nicole Alexander, Siva Ravada |
RDF Object Type and Reification in the Database. |
ICDE |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Tatsuaki Okamoto |
Efficient Blind and Partially Blind Signatures Without Random Oracles. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Wei Wu 0001 |
Proxy Signature Without Random Oracles. |
MSN |
2006 |
DBLP DOI BibTeX RDF |
Without Random Oracles, CDH Problem, Bilinear Pairings, Proxy Signature |
12 | Johannes Mayer, Ralph Guderlei |
An Empirical Study on the Selection of Good Metamorphic Relations. |
COMPSAC (1) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Alexandra Boldyreva, Marc Fischlin |
On the Security of OAEP. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Donghoon Chang, Sangjin Lee 0002, Mridul Nandi, Moti Yung |
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Pascal Paillier, Jorge Luis Villar |
Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Benoît Libert, Jean-Jacques Quisquater |
On Constructing Certificateless Cryptosystems from Identity Based Encryption. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
provable security, bilinear maps, Certificateless encryption |
12 | Qianhong Wu, Yi Mu 0001, Willy Susilo, Fangguo Zhang |
Efficient Signcryption Without Random Oracles. |
ATC |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria |
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Isamu Teranishi, Takuro Oyama, Wakaha Ogata |
General Conversion for Obtaining Strongly Existentially Unforgeable Signatures. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Jaimee Brown, Juan Manuel González Nieto, Colin Boyd |
Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
RSA assumptions, public key encryption, chosen-ciphertext security |
12 | Sanjit Chatterjee, Palash Sarkar 0001 |
Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Multi-receiver encryption, bilinear pairing, identity based encryption |
12 | Adam Biltcliffe, Michael Dales, Sam Jansen, Tom Ridge, Peter Sewell |
Rigorous Protocol Design in Practice: An Optical Packet-Switch MAC in HOL. |
ICNP |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Jianhong Zhang, Wei Zou |
A Robust Verifiably Encrypted Signature Scheme. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Claire Monteleoni |
Efficient Algorithms for General Active Learning. |
COLT |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Alexey V. Chernov, Jürgen Schmidhuber |
Prefix-Like Complexities and Computability in the Limit. |
CiE |
2006 |
DBLP DOI BibTeX RDF |
limit computability, generalized Turing machine, non-halting computation, Kolmogorov complexity |
12 | Dana Moshkovitz, Ran Raz |
Sub-constant error low degree test of almost-linear size. |
STOC |
2006 |
DBLP DOI BibTeX RDF |
plane vs. point test, probabilistically checkable proofs, locally testable codes, low degree testing |
12 | Leslie Ikemoto, Okan Arikan, David A. Forsyth |
Knowing when to put your foot down. |
SI3D |
2006 |
DBLP DOI BibTeX RDF |
foot plant detection, footskate, motion synthesis |
12 | David Coppit, Jinlin Yang, Sarfraz Khurshid, Wei Le, Kevin J. Sullivan |
Software Assurance by Bounded Exhaustive Testing. |
IEEE Trans. Software Eng. |
2005 |
DBLP DOI BibTeX RDF |
Formal methods, program verification, testing and debugging |
12 | Mihir Bellare, Gregory Neven |
Transitive signatures: new schemes and proofs. |
IEEE Trans. Inf. Theory |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Ning Jiang, Roy Villafane, Kien A. Hua, Abhijit Sawant, Kiran Prabhakara |
ADMiRe: An Algebraic Data Mining Approach to System Performance Analysis. |
IEEE Trans. Knowl. Data Eng. |
2005 |
DBLP DOI BibTeX RDF |
Data mining, performance of systems, algorithms for data and knowledge management |
12 | Jing Chen, Zeng-zhi Li, Yun-lan Wang |
Distributed Service Management Based on Genetic Programming. |
AWIC |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Mariko Sakashita, Kazuhisa Makino, Satoru Fujishige |
Minimizing a Monotone Concave Function with Laminar Covering Constraints. |
ISAAC |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Serge Mister, Robert J. Zuccherato |
An Attack on CFB Mode Encryption as Used by OpenPGP. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Cipher-Feedback Mode, encryption, chosen-ciphertext attacks, OpenPGP |
12 | Liam Roditty, Mikkel Thorup, Uri Zwick |
Deterministic Constructions of Approximate Distance Oracles and Spanners. |
ICALP |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Hirotaka Kato, Satoshi Matsumoto, Tetsuhiro Miyahara |
Learning of Elementary Formal Systems with Two Clauses Using Queries. |
ALT |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Hussein Fareed, Mostafa A. Bassiouni |
Adaptive object cache pre-fetching scheme based on object flow. |
IPCCC |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Ravi Murthy, Zhen Hua Liu, Muralidhar Krishnaprasad, Sivasankaran Chandrasekar, Anh-Tuan Tran 0005, Eric Sedlar, Daniela Florescu, Susan Kotsovolos, Nipun Agarwal, Vikas Arora, Viswanathan Krishnamurthy |
Towards an enterprise XML architecture. |
SIGMOD Conference |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Oliver Hummel, Colin Atkinson 0001 |
Automated Harvesting of Test Oracles for Reliability Testing. |
COMPSAC (2) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai |
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Kurt Maly, Mohammad Zubair, Li Xuemei |
A High Performance Implementation of an OAI-Based Federation Service. |
ICPADS (1) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Toshiyuki Isshiki, Keisuke Tanaka |
An (n-t)-out-of-n Threshold Ring Signature Scheme. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Michel Abdalla, David Pointcheval |
Simple Password-Based Encrypted Key Exchange Protocols. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
encrypted key exchange, Password, Diffie-Hellman assumptions |
12 | Sabrina Tarento |
Machine-Checked Security Proofs of Cryptographic Signature Schemes. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Hoeteck Wee |
On obfuscating point functions. |
STOC |
2005 |
DBLP DOI BibTeX RDF |
obfuscation |
12 | Lionel C. Briand, Massimiliano Di Penta, Yvan Labiche |
Assessing and Improving State-Based Class Testing: A Series of Experiments. |
IEEE Trans. Software Eng. |
2004 |
DBLP DOI BibTeX RDF |
testing experimentation, category partition, UML statecharts, State-based testing |
12 | Ingo Schurr, Tibor Szabó |
Finding the Sink Takes Some Time: An Almost Quadratic Lower Bound for Finding the Sink of Unique Sink Oriented Cubes. |
Discret. Comput. Geom. |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Ricardo Blanco-Vega, José Hernández-Orallo, M. José Ramírez-Quintana |
Analysing the Trade-Off Between Comprehensibility and Accuracy in Mimetic Models. |
Discovery Science |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Naveen Garg 0001, Rohit Khandekar |
Fractional Covering with Upper Bounds on the Variables: Solving LPs with Negative Entries. |
ESA |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Bruno Durand 0001, Andrei A. Muchnik, Maxim Ushakov, Nikolai K. Vereshchagin |
Ecological Turing Machines. |
ICALP |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee 0001 |
One-Round Protocols for Two-Party Authenticated Key Exchange. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Gaoyan Xie, Zhe Dang |
An Automata-Theoretic Approach for Model-Checking Systems with Unspecified Components. |
FATES |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Dan Rosenberg, Uday Gajendar |
24/7 or bust: designing for the challenges of global UCD. |
CHI Extended Abstracts |
2004 |
DBLP DOI BibTeX RDF |
usability, UI design, globalization, cross-cultural design |
12 | Cynthia Dwork, Moni Naor, Omer Reingold |
Immunizing Encryption Schemes from Decryption Errors. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Luis von Ahn, Nicholas J. Hopper |
Public-Key Steganography. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Ittai Abraham, Gregory V. Chockler, Idit Keidar, Dahlia Malkhi |
Byzantine disk paxos: optimal resilience with byzantine shared memory. |
PODC |
2004 |
DBLP DOI BibTeX RDF |
termination conditions, consensus, Byzantine failures, shared-memory emulations |
12 | Sajindra Jayasena, Chin-Peng Yee, Jie Song, Abele Stoelwinder, Chong Wee See, Wai-Hong Wong |
Data Resource Discovery in a Computational Grid. |
GCC Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Fabien Laguillaumie, Damien Vergnaud |
Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
Privacy of signers identity, Bilinear Diffie-Hellman problems, Exact security, Designated verifier signatures, Tight reduction |
12 | Xin Wang, Ji Wang 0001, Zhi-Chang Qi |
Automatic Generation of Run-Time Test Oracles for Distributed Real-Time Systems. |
FORTE |
2004 |
DBLP DOI BibTeX RDF |
|