Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
12 | Vanesa Daza, Javier Herranz, Germán Sáez |
On the Computational Security of a Distributed Key Distribution Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 57(8), pp. 1087-1097, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre |
From Identification to Signatures Via the Fiat-Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 54(8), pp. 3631-3646, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Christian Glaßer |
Space-Efficient Informational Redundancy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISAAC ![In: Algorithms and Computation, 19th International Symposium, ISAAC 2008, Gold Coast, Australia, December 15-17, 2008. Proceedings, pp. 448-459, 2008, Springer, 978-3-540-92181-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Nicholas Armstrong-Crews, Manuela M. Veloso |
An approximate algorithm for solving oracular POMDPs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICRA ![In: 2008 IEEE International Conference on Robotics and Automation, ICRA 2008, May 19-23, 2008, Pasadena, California, USA, pp. 3346-3352, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Hemalatha Diwakar, Alka Vaidya |
Information Analysis for Enabling Optimal Utilization of Service Delivery Channels in Indian Banks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, 14-16 May 2008, Portland, Oregon, USA, pp. 146-151, 2008, IEEE Computer Society, 978-0-7695-3131-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Banking system, Transaction analysis, service delivery technologies, DBMS, Business Intelligence |
12 | Efim B. Kinber |
On Learning Regular Expressions and Patterns Via Membership and Correction Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICGI ![In: Grammatical Inference: Algorithms and Applications, 9th International Colloquium, ICGI 2008, Saint-Malo, France, September 22-24, 2008, Proceedings, pp. 125-138, 2008, Springer, 978-3-540-88008-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Fabrizio Dabbene, Pavel S. Shcherbakov, Boris T. Polyak |
A randomized cutting plane scheme with geometric convergence: Probabilistic analysis and SDP applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDC ![In: Proceedings of the 47th IEEE Conference on Decision and Control, CDC 2008, December 9-11, 2008, Cancún, Mexico, pp. 3044-3049, 2008, IEEE, 978-1-4244-3123-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Marie-Claude Gaudel, Pascale Le Gall |
Testing Data Types Implementations from Algebraic Specifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Methods and Testing ![In: Formal Methods and Testing, An Outcome of the FORTEST Network, Revised Selected Papers, pp. 209-239, 2008, Springer, 978-3-540-78916-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Honggang Wang, Bruce W. Schmeiser |
Discrete stochastic optimization using linear interpolation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the 2008 Winter Simulation Conference, Global Gateway to Discovery, WSC 2008, InterContinental Hotel, Miami, Florida, USA, December 7-10, 2008, pp. 502-508, 2008, WSC, 978-1-4244-2708-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto |
Chosen Ciphertext Security with Optimal Ciphertext Overhead. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings, pp. 355-371, 2008, Springer, 978-3-540-89254-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Michel Sede, Xu Li 0009, Da Li, Min-You Wu, Minglu Li 0001, Wei Shu |
Routing in Large-Scale Buses Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings, pp. 2711-2716, 2008, IEEE, 978-1-4244-1997-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Edwin J. Beggs, José Félix Costa, Bruno Loff, John V. Tucker |
Oracles and Advice as Measurements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UC ![In: Unconventional Computing, 7th International Conference, UC 2008, Vienna, Austria, August 25-28, 2008. Proceedings, pp. 33-50, 2008, Springer, 978-3-540-85193-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Monica Marinucci |
The Power of Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: Sharing Data, Information and Knowledge, 25th British National Conference on Databases, BNCOD 25, Cardiff, UK, July 7-10, 2008. Proceedings, pp. 1, 2008, Springer, 978-3-540-70503-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Yehuda Lindell, Benny Pinkas, Nigel P. Smart |
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings, pp. 2-20, 2008, Springer, 978-3-540-85854-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Qiong Huang 0001, Guomin Yang, Duncan S. Wong, Willy Susilo |
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings, pp. 106-120, 2008, Springer, 978-3-540-79262-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Christian Glaßer, Christian Reitwießner, Victor L. Selivanov |
The Shrinking Property for NP and coNP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CiE ![In: Logic and Theory of Algorithms, 4th Conference on Computability in Europe, CiE 2008, Athens, Greece, June 15-20, 2008, Proceedings, pp. 210-220, 2008, Springer, 978-3-540-69405-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Ronen Shaltiel, Emanuele Viola |
Hardness amplification proofs require majority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008, pp. 589-598, 2008, ACM, 978-1-60558-047-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
amplification, natural proofs, black-box, hardness, average-case complexity, constant-depth circuits, majority |
12 | Dan Gutfreund, Salil P. Vadhan |
Limitations of Hardness vs. Randomness under Uniform Reductions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APPROX-RANDOM ![In: Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques, 11th International Workshop, APPROX 2008, and 12th International Workshop, RANDOM 2008, Boston, MA, USA, August 25-27, 2008. Proceedings, pp. 469-482, 2008, Springer, 978-3-540-85362-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
derandomization, pseudorandom generators, black-box reductions |
12 | Margus Treumuth |
Normalization of Temporal Information in Estonian. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TSD ![In: Text, Speech and Dialogue, 11th International Conference, TSD 2008, Brno, Czech Republic, September 8-12, 2008. Proceedings, pp. 211-218, 2008, Springer, 978-3-540-87390-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
temporal reference in discourse, Temporal reasoning |
12 | Harish Chandra Karnatak, Sameer Saran, Karamjit Bhatia, Partha Sarathi Roy 0002 |
Multicriteria Spatial Decision Analysis in Web GIS Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GeoInformatica ![In: GeoInformatica 11(4), pp. 407-429, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multicriteria spatial decision analysis, SDSS, biodiversity conservation, AHP, web GIS |
12 | Elzbieta Malinowski, Esteban Zimányi |
Logical Representation of a Conceptual Model for Spatial Data Warehouses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GeoInformatica ![In: GeoInformatica 11(4), pp. 431-457, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
spatial hierarchies, spatial measures, spatial databases, logical modeling, spatial data warehouses |
12 | Holger Spakowski, Rahul Tripathi |
On the Power of Unambiguity in Alternating Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theory Comput. Syst. ![In: Theory Comput. Syst. 41(2), pp. 291-326, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Joonsang Baek, Willy Susilo, Jianying Zhou 0001 |
New constructions of fuzzy identity-based encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 368-370, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
efficient constructions, fuzzy identity-based encryption |
12 | Shai Halevi, Hugo Krawczyk |
Security under key-dependent inputs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 466-475, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
circular encryption, key-dependent input, self encryption |
12 | Victor K. Wei |
Invisible designated confirmer signatures without random oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 356-358, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Yan Song |
One-More Extension of Paillier Inversion Problem and Concurrent Secure Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 65-77, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Michel Abdalla, Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt |
(Password) Authenticated Key Establishment: From 2-Party to Group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings, pp. 499-514, 2007, Springer, 3-540-70935-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
protocol compiler, common reference string model, key establishment, password-based authentication |
12 | George Barmpalias, Andrew E. M. Lewis, Mariya Ivanova Soskova |
Working with the LR Degrees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TAMC ![In: Theory and Applications of Models of Computation, 4th International Conference, TAMC 2007, Shanghai, China, May 22-25, 2007, Proceedings, pp. 89-99, 2007, Springer, 978-3-540-72503-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Iftach Haitner, Jonathan J. Hoch, Omer Reingold, Gil Segev 0001 |
Finding Collisions in Interactive Protocols - A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), October 20-23, 2007, Providence, RI, USA, Proceedings, pp. 669-679, 2007, IEEE Computer Society, 978-0-7695-3010-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Mikkel Thorup |
Compact Oracles for Approximate Distances Around Obstacles in the Plane. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESA ![In: Algorithms - ESA 2007, 15th Annual European Symposium, Eilat, Israel, October 8-10, 2007, Proceedings, pp. 383-394, 2007, Springer, 978-3-540-75519-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Vitaly Feldman, Shrenik Shah, Neal Wadhwa |
Separating Models of Learning with Faulty Teachers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ALT ![In: Algorithmic Learning Theory, 18th International Conference, ALT 2007, Sendai, Japan, October 1-4, 2007, Proceedings, pp. 94-106, 2007, Springer, 978-3-540-75224-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Benoît Libert, Jean-Jacques Quisquater |
Practical Time Capsule Signatures in the Standard Model from Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings, pp. 23-38, 2007, Springer, 978-3-540-73488-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
time capsule signatures, standard model, bilinear maps |
12 | Marc Fischlin |
Anonymous Signatures Made Easy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 31-42, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
perfectly one-way hash function, Anonymity, signature scheme, randomness extractor |
12 | Yong Xue, Lei Zheng, Ying Luo 0006, Jianping Guo, Wei Wan, Wei Wei, Ying Wang 0014 |
Modelbase System in Remote Sensing Information Analysis and Service Grid Node. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (2) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part II, pp. 538-541, 2007, Springer, 978-3-540-72585-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Modelbase system, Remote sensing information analysis and Service Grid Node, modelbase management system |
12 | Bo Wu 0001, Ram Nevatia |
Improving Part based Object Detection by Unsupervised, Online Boosting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR ![In: 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 18-23 June 2007, Minneapolis, Minnesota, USA, 2007, IEEE Computer Society, 1-4244-1179-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Weidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto |
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 252-266, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | P. Madhusudan |
Learning Algorithms and Formal Verification (Invited Tutorial). ![Search on Bibsonomy](Pics/bibsonomy.png) |
VMCAI ![In: Verification, Model Checking, and Abstract Interpretation, 8th International Conference, VMCAI 2007, Nice, France, January 14-16, 2007, Proceedings, pp. 214, 2007, Springer, 978-3-540-69735-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Dana Glasner, Rocco A. Servedio |
Distribution-Free Testing Lower Bounds for Basic Boolean Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APPROX-RANDOM ![In: Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, 10th International Workshop, APPROX 2007, and 11th International Workshop, RANDOM 2007, Princeton, NJ, USA, August 20-22, 2007, Proceedings, pp. 494-508, 2007, Springer, 978-3-540-74207-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Adam L. Young, Moti Yung |
Space-Efficient Kleptography Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers, pp. 112-129, 2007, Springer, 978-3-540-77369-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
twisted elliptic curves, elliptic curve, Key exchange, kleptography |
12 | Ueli M. Maurer, Stefano Tessaro |
Domain Extension of Public Random Functions: Beyond the Birthday Barrier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 187-204, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Emanuele Viola |
On Approximate Majority and Probabilistic Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCC ![In: 22nd Annual IEEE Conference on Computational Complexity (CCC 2007), 13-16 June 2007, San Diego, California, USA, pp. 155-168, 2007, IEEE Computer Society, 0-7695-2780-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Wagner Saback Dantas, Alysson Neves Bessani, Joni da Silva Fraga, Miguel Correia 0001 |
Evaluating Byzantine Quorum Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), Beijing, China, October 10-12, 2007, pp. 253-264, 2007, IEEE Computer Society, 0-7695-2995-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Jonathan Katz, Moti Yung |
Characterization of Security Notions for Probabilistic Private-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 19(1), pp. 67-95, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Private-key encryptions, Definitions |
12 | Ittai Abraham, Gregory V. Chockler, Idit Keidar, Dahlia Malkhi |
Byzantine disk paxos: optimal resilience with byzantine shared memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Comput. ![In: Distributed Comput. 18(5), pp. 387-408, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
T-tolerant object implementations, Lower bounds, Consensus, Byzantine failures, Wait freedom, Shared-memory emulations |
12 | Douglas R. Stinson |
Some Observations on the Theory of Cryptographic Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 38(2), pp. 259-277, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
12 | Zhaoqing Wang, Harry H. Cheng |
Portable C/C++ Code for Portable XML Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 23(1), pp. 76-81, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Ch, C/C++ Interpreter, Portable Code, Portable Data, XML |
12 | Shai Tirosh, Dimitri Van De Ville, Michael Unser |
Polyharmonic smoothing splines and the multidimensional Wiener filtering of fractal-like signals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 15(9), pp. 2616-2630, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Christian Hundt 0001, Maciej Liskiewicz, Ulrich Wölfel |
Provably Secure Steganography and the Complexity of Sampling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISAAC ![In: Algorithms and Computation, 17th International Symposium, ISAAC 2006, Kolkata, India, December 18-20, 2006, Proceedings, pp. 754-763, 2006, Springer, 3-540-49694-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Olivier Teytaud, Sylvain Gelly, Jérémie Mary |
On the Ultimate Convergence Rates for Isotropic Algorithms and the Best Choices Among Various Forms of Isotropy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPSN ![In: Parallel Problem Solving from Nature - PPSN IX, 9th International Conference, Reykjavik, Iceland, September 9-13, 2006, Procedings, pp. 32-41, 2006, Springer, 3-540-38990-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Sudipto Guha, Andrew McGregor 0001, Suresh Venkatasubramanian |
Streaming and sublinear approximation of entropy and information distances. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SODA ![In: Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2006, Miami, Florida, USA, January 22-26, 2006, pp. 733-742, 2006, ACM Press, 0-89871-605-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Nicole Alexander, Siva Ravada |
RDF Object Type and Reification in the Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006, 3-8 April 2006, Atlanta, GA, USA, pp. 93, 2006, IEEE Computer Society, 0-7695-2570-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Tatsuaki Okamoto |
Efficient Blind and Partially Blind Signatures Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings, pp. 80-99, 2006, Springer, 3-540-32731-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Wei Wu 0001 |
Proxy Signature Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-hoc and Sensor Networks, Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings, pp. 473-484, 2006, Springer, 3-540-49932-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Without Random Oracles, CDH Problem, Bilinear Pairings, Proxy Signature |
12 | Johannes Mayer, Ralph Guderlei |
An Empirical Study on the Selection of Good Metamorphic Relations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: 30th Annual International Computer Software and Applications Conference, COMPSAC 2006, Chicago, Illinois, USA, September 17-21, 2006. Volume 1, pp. 475-484, 2006, IEEE Computer Society, 0-7695-2655-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Alexandra Boldyreva, Marc Fischlin |
On the Security of OAEP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 210-225, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Donghoon Chang, Sangjin Lee 0002, Mridul Nandi, Moti Yung |
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 283-298, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Pascal Paillier, Jorge Luis Villar |
Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 252-266, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Benoît Libert, Jean-Jacques Quisquater |
On Constructing Certificateless Cryptosystems from Identity Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 474-490, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
provable security, bilinear maps, Certificateless encryption |
12 | Qianhong Wu, Yi Mu 0001, Willy Susilo, Fangguo Zhang |
Efficient Signcryption Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 449-458, 2006, Springer, 3-540-38619-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria |
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 371-382, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Isamu Teranishi, Takuro Oyama, Wakaha Ogata |
General Conversion for Obtaining Strongly Existentially Unforgeable Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 191-205, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Jaimee Brown, Juan Manuel González Nieto, Colin Boyd |
Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 176-190, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
RSA assumptions, public key encryption, chosen-ciphertext security |
12 | Sanjit Chatterjee, Palash Sarkar 0001 |
Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 394-408, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Multi-receiver encryption, bilinear pairing, identity based encryption |
12 | Adam Biltcliffe, Michael Dales, Sam Jansen, Tom Ridge, Peter Sewell |
Rigorous Protocol Design in Practice: An Optical Packet-Switch MAC in HOL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Proceedings of the 14th IEEE International Conference on Network Protocols, ICNP 2006, November 12-15, 2006, Santa Barbara, California, USA, pp. 117-126, 2006, IEEE Computer Society, 1-4244-0593-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Jianhong Zhang, Wei Zou |
A Robust Verifiably Encrypted Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 731-740, 2006, Springer, 3-540-36850-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Claire Monteleoni |
Efficient Algorithms for General Active Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COLT ![In: Learning Theory, 19th Annual Conference on Learning Theory, COLT 2006, Pittsburgh, PA, USA, June 22-25, 2006, Proceedings, pp. 650-652, 2006, Springer, 3-540-35294-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Alexey V. Chernov, Jürgen Schmidhuber |
Prefix-Like Complexities and Computability in the Limit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CiE ![In: Logical Approaches to Computational Barriers, Second Conference on Computability in Europe, CiE 2006, Swansea, UK, June 30-July 5, 2006, Proceedings, pp. 85-93, 2006, Springer, 3-540-35466-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
limit computability, generalized Turing machine, non-halting computation, Kolmogorov complexity |
12 | Dana Moshkovitz, Ran Raz |
Sub-constant error low degree test of almost-linear size. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 38th Annual ACM Symposium on Theory of Computing, Seattle, WA, USA, May 21-23, 2006, pp. 21-30, 2006, ACM, 1-59593-134-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
plane vs. point test, probabilistically checkable proofs, locally testable codes, low degree testing |
12 | Leslie Ikemoto, Okan Arikan, David A. Forsyth |
Knowing when to put your foot down. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SI3D ![In: Proceedings of the 2006 Symposium on Interactive 3D Graphics, SI3D 2006, March 14-17, 2006, Redwood City, California, USA, pp. 49-53, 2006, ACM, 1-59593-295-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
foot plant detection, footskate, motion synthesis |
12 | David Coppit, Jinlin Yang, Sarfraz Khurshid, Wei Le, Kevin J. Sullivan |
Software Assurance by Bounded Exhaustive Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 31(4), pp. 328-339, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Formal methods, program verification, testing and debugging |
12 | Mihir Bellare, Gregory Neven |
Transitive signatures: new schemes and proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 51(6), pp. 2133-2151, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Ning Jiang, Roy Villafane, Kien A. Hua, Abhijit Sawant, Kiran Prabhakara |
ADMiRe: An Algebraic Data Mining Approach to System Performance Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 17(7), pp. 888-901, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Data mining, performance of systems, algorithms for data and knowledge management |
12 | Jing Chen, Zeng-zhi Li, Yun-lan Wang |
Distributed Service Management Based on Genetic Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AWIC ![In: Advances in Web Intelligence Third International Atlantic Web IntelligenceConference, AWIC 2005, Lodz, Poland, June 6-9, 2005, Proceedings, pp. 83-88, 2005, Springer, 3-540-26219-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Mariko Sakashita, Kazuhisa Makino, Satoru Fujishige |
Minimizing a Monotone Concave Function with Laminar Covering Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISAAC ![In: Algorithms and Computation, 16th International Symposium, ISAAC 2005, Sanya, Hainan, China, December 19-21, 2005, Proceedings, pp. 71-81, 2005, Springer, 3-540-30935-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Serge Mister, Robert J. Zuccherato |
An Attack on CFB Mode Encryption as Used by OpenPGP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers, pp. 82-94, 2005, Springer, 3-540-33108-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Cipher-Feedback Mode, encryption, chosen-ciphertext attacks, OpenPGP |
12 | Liam Roditty, Mikkel Thorup, Uri Zwick |
Deterministic Constructions of Approximate Distance Oracles and Spanners. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings, pp. 261-272, 2005, Springer, 3-540-27580-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Hirotaka Kato, Satoshi Matsumoto, Tetsuhiro Miyahara |
Learning of Elementary Formal Systems with Two Clauses Using Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ALT ![In: Algorithmic Learning Theory, 16th International Conference, ALT 2005, Singapore, October 8-11, 2005, Proceedings, pp. 211-225, 2005, Springer, 3-540-29242-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Hussein Fareed, Mostafa A. Bassiouni |
Adaptive object cache pre-fetching scheme based on object flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 24th IEEE International Performance Computing and Communications Conference, IPCCC 2005, April 7-9, 2005, Phoenix, Arizona, USA, pp. 311-319, 2005, IEEE, 0-7803-8991-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Ravi Murthy, Zhen Hua Liu, Muralidhar Krishnaprasad, Sivasankaran Chandrasekar, Anh-Tuan Tran 0005, Eric Sedlar, Daniela Florescu, Susan Kotsovolos, Nipun Agarwal, Vikas Arora, Viswanathan Krishnamurthy |
Towards an enterprise XML architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Baltimore, Maryland, USA, June 14-16, 2005, pp. 953-957, 2005, ACM, 1-59593-060-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Oliver Hummel, Colin Atkinson 0001 |
Automated Harvesting of Test Oracles for Reliability Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: 29th Annual International Computer Software and Applications Conference, COMPSAC 2005, Edinburgh, Scotland, UK, July 25-28, 2005. Volume 2, pp. 196-202, 2005, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai |
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings, pp. 495-514, 2005, Springer, 3-540-30684-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Kurt Maly, Mohammad Zubair, Li Xuemei |
A High Performance Implementation of an OAI-Based Federation Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS (1) ![In: 11th International Conference on Parallel and Distributed Systems, ICPADS 2005, Fuduoka, Japan, July 20-22, 2005, pp. 769-774, 2005, IEEE Computer Society, 0-7695-2281-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Toshiyuki Isshiki, Keisuke Tanaka |
An (n-t)-out-of-n Threshold Ring Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings, pp. 406-416, 2005, Springer, 3-540-26547-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Michel Abdalla, David Pointcheval |
Simple Password-Based Encrypted Key Exchange Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 191-208, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
encrypted key exchange, Password, Diffie-Hellman assumptions |
12 | Sabrina Tarento |
Machine-Checked Security Proofs of Cryptographic Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, pp. 140-158, 2005, Springer, 3-540-28963-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Hoeteck Wee |
On obfuscating point functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, May 22-24, 2005, pp. 523-532, 2005, ACM, 1-58113-960-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
obfuscation |
12 | Lionel C. Briand, Massimiliano Di Penta, Yvan Labiche |
Assessing and Improving State-Based Class Testing: A Series of Experiments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 30(11), pp. 770-793, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
testing experimentation, category partition, UML statecharts, State-based testing |
12 | Ingo Schurr, Tibor Szabó |
Finding the Sink Takes Some Time: An Almost Quadratic Lower Bound for Finding the Sink of Unique Sink Oriented Cubes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Discret. Comput. Geom. ![In: Discret. Comput. Geom. 31(4), pp. 627-642, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Ricardo Blanco-Vega, José Hernández-Orallo, M. José Ramírez-Quintana |
Analysing the Trade-Off Between Comprehensibility and Accuracy in Mimetic Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Discovery Science ![In: Discovery Science, 7th International Conference, DS 2004, Padova, Italy, October 2-5, 2004, Proceedings, pp. 338-346, 2004, Springer, 3-540-23357-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Naveen Garg 0001, Rohit Khandekar |
Fractional Covering with Upper Bounds on the Variables: Solving LPs with Negative Entries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESA ![In: Algorithms - ESA 2004, 12th Annual European Symposium, Bergen, Norway, September 14-17, 2004, Proceedings, pp. 371-382, 2004, Springer, 3-540-23025-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Bruno Durand 0001, Andrei A. Muchnik, Maxim Ushakov, Nikolai K. Vereshchagin |
Ecological Turing Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming: 31st International Colloquium, ICALP 2004, Turku, Finland, July 12-16, 2004. Proceedings, pp. 457-468, 2004, Springer, 3-540-22849-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee 0001 |
One-Round Protocols for Two-Party Authenticated Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 220-232, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Gaoyan Xie, Zhe Dang |
An Automata-Theoretic Approach for Model-Checking Systems with Unspecified Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FATES ![In: Formal Approaches to Software Testing, 4th International Workshop, FATES 2004, Linz, Austria, September 21, 2004, Revised Selected Papers, pp. 155-169, 2004, Springer, 3-540-25109-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Dan Rosenberg, Uday Gajendar |
24/7 or bust: designing for the challenges of global UCD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended abstracts of the 2004 Conference on Human Factors in Computing Systems, CHI 2004, Vienna, Austria, April 24 - 29, 2004, pp. 1063-1064, 2004, ACM, 1-58113-703-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
usability, UI design, globalization, cross-cultural design |
12 | Cynthia Dwork, Moni Naor, Omer Reingold |
Immunizing Encryption Schemes from Decryption Errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 342-360, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Luis von Ahn, Nicholas J. Hopper |
Public-Key Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 323-341, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Ittai Abraham, Gregory V. Chockler, Idit Keidar, Dahlia Malkhi |
Byzantine disk paxos: optimal resilience with byzantine shared memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, PODC 2004, St. John's, Newfoundland, Canada, July 25-28, 2004, pp. 226-235, 2004, ACM, 1-58113-802-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
termination conditions, consensus, Byzantine failures, shared-memory emulations |
12 | Sajindra Jayasena, Chin-Peng Yee, Jie Song, Abele Stoelwinder, Chong Wee See, Wai-Hong Wong |
Data Resource Discovery in a Computational Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC Workshops ![In: Grid and Cooperative Computing - GCC 2004 Workshops: GCC 2004 International Workshops, IGKG, SGT, GISS, AAC-GEVO, and VVS, Wuhan, China, October 21-24, 2004. Proceedings, pp. 303-310, 2004, Springer, 3-540-23578-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Fabien Laguillaumie, Damien Vergnaud |
Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers, pp. 105-119, 2004, Springer, 3-540-24301-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Privacy of signers identity, Bilinear Diffie-Hellman problems, Exact security, Designated verifier signatures, Tight reduction |
12 | Xin Wang, Ji Wang 0001, Zhi-Chang Qi |
Automatic Generation of Run-Time Test Oracles for Distributed Real-Time Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FORTE ![In: Formal Techniques for Networked and Distributed Systems - FORTE 2004, 24th IFIP WG 6.1 International Conference, Madrid Spain, September 27-30, 2004, Proceedings, pp. 199-212, 2004, Springer, 3-540-23252-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|