|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3717 occurrences of 1502 keywords
|
|
|
Results
Found 7025 publication records. Showing 7013 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Peter Brass |
Universal hash functions for an infinite universe and hash trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 109(10), pp. 461-462, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Dhananjoy Dey, Prasanna Raghaw Mishra, Indranath Sen Gupta |
HF-hash : Hash Functions Using Restricted HFE Challenge-1 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0909.1392, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
20 | A. T. Akinwale, F. T. Ibharalu |
The Usefulness of Multilevel Hash Tables with Multiple Hash Functions in Large Databases ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0905.4201, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
20 | Giacomo de Meulenaer, Christophe Petit 0001, Jean-Jacques Quisquater |
Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 229, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
20 | Sebastiaan Indesteege, Bart Preneel |
Coding Theory and Hash Function Design - A Case Study: The Lane Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 63-68, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Sheena Mathew, K. Poulose Jacob |
JERIM-320: A new 320-Bit Hash Function Compared to Hash Functions with Parallel Branches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Sci. Appl. ![In: Int. J. Comput. Sci. Appl. 5(4), pp. 11-25, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
20 | Mridul Nandi |
Improving upon HCTR and matching attacks for Hash-Counter-Hash approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 90, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
20 | Jonathan J. Hoch, Adi Shamir |
On the Strength of the Concatenated Hash Combiner when All the Hash Functions are Weak. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 75, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
20 | Debrup Chakraborty, Palash Sarkar 0001 |
HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 28, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
20 | Olaf Landsiedel, Tobias Heer, Klaus Wehrle |
MHT: Eine mobilitätsbewusste verteilte Hash-Tabelle (MHT: A Mobility-aware Distributed Hash Table). ![Search on Bibsonomy](Pics/bibsonomy.png) |
it Inf. Technol. ![In: it Inf. Technol. 49(5), pp. 298-303, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Bart Preneel |
Mash Hash Functions (Modular Arithmetic Secure Hash). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security ![In: Encyclopedia of Cryptography and Security, 2005, Springer, 978-0-387-23473-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Duo Lei |
F-HASH: Securing Hash Functions Using Feistel Chaining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 430, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
20 | Harris E. Michail, Athanasios P. Kakarountas, Athanasios Milidonis, Costas E. Goutis |
Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECS ![In: Proceedings of the 2004 11th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2004, Tel Aviv, Israel, December 13-15, 2004, pp. 567-570, 2004, IEEE, 0-7803-8715-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Türker Özsari |
A Hash of Hash Functions ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR cs.CR/0310033, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
20 | Guy M. Lohman |
Review - Hash Joins and Hash Teams in Microsoft SQL Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGMOD Digit. Rev. ![In: ACM SIGMOD Digit. Rev. 2, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
20 | Alfons Kemper |
Review - Hash Joins and Hash Teams in Microsoft SQL Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGMOD Digit. Rev. ![In: ACM SIGMOD Digit. Rev. 1, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
20 | Luc Devroye |
The Height and Size of Random Hash Trees and Random Pebbled Hash Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM J. Comput. ![In: SIAM J. Comput. 28(4), pp. 1215-1224, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
20 | Goetz Graefe, Ross Bunker, Shaun Cooper |
Hash Joins and Hash Teams in Microsoft SQL Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB ![In: VLDB'98, Proceedings of 24rd International Conference on Very Large Data Bases, August 24-27, 1998, New York City, New York, USA, pp. 86-97, 1998, Morgan Kaufmann, 1-55860-566-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP BibTeX RDF |
|
20 | Evan P. Harris, Kotagiri Ramamohanarao |
Using Optimized Multi-Attribute Hash Indexes for Hash Joins. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australasian Database Conference ![In: Proceedings of the 5th Australasian Database Conference, ADC '94, Christchurch, New Zealand, January 17-18, 1994, pp. 92-111, 1994, Global Publications Service, Singapore; Distributed by World Scientific, 981-3049-00-6. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP BibTeX RDF |
|
20 | James K. Mullin |
Hash Functions for Hash-based Join Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 35(Additional-Papers), pp. A499-A503, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP BibTeX RDF |
|
20 | Masaru Kitsuregawa, Yasushi Ogawa |
Bucket Spreading Parallel Hash: A New, Robust, Parallel Hash Join Method for Data Skew in the Super Database Computer (SDC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB ![In: 16th International Conference on Very Large Data Bases, August 13-16, 1990, Brisbane, Queensland, Australia, Proceedings., pp. 210-221, 1990, Morgan Kaufmann, 1-55860-149-X. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
20 | Wei-Pang Yang, M. W. Du |
A Dynamic Perfect Hash Function Defined by an Extended Hash Indicator Table. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB ![In: Tenth International Conference on Very Large Data Bases, August 27-31, 1984, Singapore, Proceedings., pp. 245-254, 1984, Morgan Kaufmann, 0-934613-16-8. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP BibTeX RDF |
|
16 | Rui Zhou 0001, Chengfei Liu, Jianxin Li 0001 |
Fast ELCA computation for keyword queries on XML data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: EDBT 2010, 13th International Conference on Extending Database Technology, Lausanne, Switzerland, March 22-26, 2010, Proceedings, pp. 549-560, 2010, ACM, 978-1-60558-945-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
16 | Jooyoung Lee 0001, Daesung Kwon |
Tree-based key predistribution for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 15(8), pp. 1140-1151, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Wireless sensor network, Tree structure, Key predistribution |
16 | Atilla Elçi, Behnam Rahnama |
AWGN based seed for random noise generator in ParseKey+. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 244-248, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
imperfect use of timestamp, parsekey+, side channel attack, awgn |
16 | Martin Dietzfelbinger, Stefan Edelkamp |
Perfect Hashing for State Spaces in BDD Representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KI ![In: KI 2009: Advances in Artificial Intelligence, 32nd Annual German Conference on AI, Paderborn, Germany, September 15-18, 2009. Proceedings, pp. 33-40, 2009, Springer, 978-3-642-04616-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Florian Mendel, Tomislav Nad, Martin Schläffer |
Collision Attack on Boole. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 369-381, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Beata Sarna-Starosta, Tom Schrijvers |
Attributed Data for CHR Indexing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICLP ![In: Logic Programming, 25th International Conference, ICLP 2009, Pasadena, CA, USA, July 14-17, 2009. Proceedings, pp. 357-371, 2009, Springer, 978-3-642-02845-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
term representation, attributed variables, indexing, program transformation, Constraint Handling Rules |
16 | Jean-Philippe Aumasson, Çagdas Çalik, Willi Meier, Onur Özen, Raphael C.-W. Phan, Kerem Varici |
Improved Cryptanalysis of Skein. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 542-559, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Ahto Buldas, Aivo Jürgenson, Margus Niitsoo |
Efficiency Bounds for Adversary Constructions in Black-Box Reductions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 264-275, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Jiang Wu 0001, Douglas R. Stinson |
A Highly Scalable RFID Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 360-376, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Onur Özen, Martijn Stam |
Another Glance at Double-Length Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings, pp. 176-201, 2009, Springer, 978-3-642-10867-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Giovanni Di Crescenzo, Shaoquan Jiang, Reihaneh Safavi-Naini |
Corruption-Localizing Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 489-504, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Gaëtan Leurent, Phong Q. Nguyen |
How Risky Is the Random-Oracle Model? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 445-464, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Noga Alon, Shai Gutner |
Balanced Hashing, Color Coding and Approximate Counting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWPEC ![In: Parameterized and Exact Computation, 4th International Workshop, IWPEC 2009, Copenhagen, Denmark, September 10-11, 2009, Revised Selected Papers, pp. 1-16, 2009, Springer, 978-3-642-11268-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Approximate counting of subgraphs, derandomization, expanders, perfect hashing, color-coding, k-wise independence |
16 | Morten Skaarup Jensen, Rasmus Pagh |
Optimality in External Memory Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Algorithmica ![In: Algorithmica 52(3), pp. 403-411, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Index, Hashing, Dictionary, External memory |
16 | Zoi Kaoudi, Iris Miliaraki, Manolis Koubarakis |
RDFS Reasoning and Query Answering on Top of DHTs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISWC ![In: The Semantic Web - ISWC 2008, 7th International Semantic Web Conference, ISWC 2008, Karlsruhe, Germany, October 26-30, 2008. Proceedings, pp. 499-516, 2008, Springer, 978-3-540-88563-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Hiroaki Hazeyama, Yoshihide Matsumoto, Youki Kadobayashi |
Design of an FDB based Intra-domain Packet Traceback System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1313-1318, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Intra Domain, Forwarding Data Base, Security, IP Traceback |
16 | Viet Yen Nguyen, Theo C. Ruys |
Incremental Hashing for Spin. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPIN ![In: Model Checking Software, 15th International SPIN Workshop, Los Angeles, CA, USA, August 10-12, 2008, Proceedings, pp. 232-249, 2008, Springer, 978-3-540-85113-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Maurice Herlihy, Nir Shavit, Moran Tzafrir |
Hopscotch Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 22nd International Symposium, DISC 2008, Arcachon, France, September 22-24, 2008. Proceedings, pp. 350-364, 2008, Springer, 978-3-540-87778-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Phillip Rogaway, John P. Steinberger |
Security/Efficiency Tradeoffs for Permutation-Based Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings, pp. 220-236, 2008, Springer, 978-3-540-78966-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Yu Hua 0001, Bin Xiao 0001, Dan Feng 0001, Bo Yu 0019 |
Bounded LSH for Similarity Search in Peer-to-Peer File Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP ![In: 2008 International Conference on Parallel Processing, ICPP 2008, September 8-12, 2008, Portland, Oregon, USA, pp. 644-651, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Krzysztof Pietrzak |
Compression from Collisions, or Why CRHF Combiners Have a Long Output. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 413-432, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Simon Rieche, Bui The Vinh, Klaus Wehrle |
Range queries and load balancing in a hierarchically structured P2P system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings, pp. 28-35, 2008, IEEE Computer Society, 978-1-4244-2412-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Ge Nong, Sen Zhang |
Efficient Algorithms for the Inverse Sort Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 56(11), pp. 1564-1574, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
inverse sort transform, limit-order contexts, data compression, algorithm design, Burrows-Wheeler transform |
16 | Daniel Sánchez 0003, Luke Yen, Mark D. Hill, Karthikeyan Sankaralingam |
Implementing Signatures for Transactional Memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: 40th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-40 2007), 1-5 December 2007, Chicago, Illinois, USA, pp. 123-133, 2007, IEEE Computer Society, 0-7695-3047-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Miguel Jimeno, Kenneth J. Christensen, Allen Roginsky |
A Power Management Proxy with a New Best-of-N Bloom Filter Design to Reduce False Positives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 26th IEEE International Performance Computing and Communications Conference, IPCCC 2007, April 11-13, 2007, New Orleans, Louisiana, USA, pp. 125-133, 2007, IEEE Computer Society, 1-4244-1138-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Mathias Eitz, Lixu Gu |
Hierarchical Spatial Hashing for Real-time Collision Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Shape Modeling International ![In: 2007 International Conference on Shape Modeling and Applications (SMI 2007), 13-15 June 2007, Lyon, France, pp. 61-70, 2007, IEEE Computer Society, 0-7695-2815-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang |
Histogram-based image hashing scheme robust against geometric deformations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007, pp. 121-128, 2007, ACM, 978-1-59593-857-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
geometric deformation, robustness, histogram, gaussian filter, image hashing |
16 | Kengo Terasawa, Yuzuru Tanaka |
Spherical LSH for Approximate Nearest Neighbor Search on Unit Hypersphere. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WADS ![In: Algorithms and Data Structures, 10th International Workshop, WADS 2007, Halifax, Canada, August 15-17, 2007, Proceedings, pp. 27-38, 2007, Springer, 978-3-540-73948-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Shuai Hao, Hock-Beng Lim |
Data Synchronization in Distributed and Constrained Mobile Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 673-683, 2007, Springer, 978-3-540-73548-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede |
Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, pp. 102-114, 2007, Springer, 978-3-540-77534-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SHA-256 (384,512), Iteration Bound Analysis, Throughput Optimum Architecture |
16 | Palash Sarkar 0001 |
Improving Upon the TET Mode of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, pp. 180-192, 2007, Springer, 978-3-540-76787-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
tweakable encryption, strong pseudo-random permutation, disk encryption, modes of operations |
16 | Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang |
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings, pp. 357-371, 2007, Springer, 3-540-69327-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Reouven Elbaz, David Champagne, Ruby B. Lee, Lionel Torres, Gilles Sassatelli, Pierre Guillemin |
TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, pp. 289-302, 2007, Springer, 978-3-540-74734-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Memory Integrity, Physical Attacks, Tamper Evidence, Parallelizability, Confidentiality, Replay Attacks, Merkle Trees |
16 | Iftach Haitner, Omer Reingold |
A New Interactive Hashing Theorem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCC ![In: 22nd Annual IEEE Conference on Computational Complexity (CCC 2007), 13-16 June 2007, San Diego, California, USA, pp. 319-332, 2007, IEEE Computer Society, 0-7695-2780-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Fong Pong, Nian-Feng Tzeng |
Storage-Efficient Architecture for Routing Tables via Prefix Transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 15-18 October 2007, Clontarf Castle, Dublin, Ireland, Proceedings, pp. 55-62, 2007, IEEE Computer Society, 0-7695-3000-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Chen Wang 0010, Li Xiao 0001, Yunhao Liu 0001, Pei Zheng |
DiCAS: An Efficient Distributed Caching Mechanism for P2P Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 17(10), pp. 1097-1109, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
query response, distributed caching and adaptive search, Peer-to-peer, flooding, search efficiency |
16 | Yongdong Wu |
Tamper-Localization Watermarking with Systematic Error Correcting Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2006, October 8-11, Atlanta, Georgia, USA, pp. 1965-1968, 2006, IEEE, 1-4244-0480-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Ayoub Massoudi, Frédéric Lefèbvre, Claire-Hélène Demarty, Lionel Oisel, Bertrand Chupeau |
A Video Fingerprint Based on Visual Digest and Local Fingerprints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2006, October 8-11, Atlanta, Georgia, USA, pp. 2297-2300, 2006, IEEE, 1-4244-0480-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Micah Lewis, Michael Jones |
A dead variable analysis for explicit model checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PEPM ![In: Proceedings of the 2006 ACM SIGPLAN Workshop on Partial Evaluation and Semantics-based Program Manipulation, 2006, Charleston, South Carolina, USA, January 9-10, 2006, pp. 48-57, 2006, ACM, 1-59593-196-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Fabrício Benevenuto, Cristiano P. Costa, Marisa A. Vasconcelos, Virgílio A. F. Almeida, Jussara M. Almeida, Miranda Mowbray |
Impact of peer incentives on the dissemination of polluted content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 1875-1879, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
content pollution, peer incentive, peer-to-peer networks |
16 | Adam Kirsch, Michael Mitzenmacher |
Less Hashing, Same Performance: Building a Better Bloom Filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESA ![In: Algorithms - ESA 2006, 14th Annual European Symposium, Zurich, Switzerland, September 11-13, 2006, Proceedings, pp. 456-467, 2006, Springer, 3-540-38875-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Praveen Kumar Vadnala, Anish Mathuria |
An Efficient Key Assignment Scheme for Access Control in a Hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 205-219, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Pierre-Malo Deniélou, James J. Leifer |
Abstraction preservation and subtyping in distributed languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICFP ![In: Proceedings of the 11th ACM SIGPLAN International Conference on Functional Programming, ICFP 2006, Portland, Oregon, USA, September 16-21, 2006, pp. 286-297, 2006, ACM, 1-59593-309-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
serialisation and distributed computation, subtyping, type theory, programming language semantics, module systems |
16 | Mikhail J. Atallah, Marina Blanton, Keith B. Frikken |
Key management for non-tree access hierarchies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 11-18, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
access hierarchy, dimension of a graph, fast key derivation |
16 | Aditi Pandit, Himanshu Gupta 0001 |
Communication-Efficient Implementation of Range-Joins in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Database Systems for Advanced Applications, 11th International Conference, DASFAA 2006, Singapore, April 12-15, 2006, Proceedings, pp. 859-869, 2006, Springer, 3-540-33337-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Bin Wang, Zhiwei Li 0006, Mingjing Li, Wei-Ying Ma |
Large-Scale Duplicate Detection for Web Image Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, ICME 2006, July 9-12 2006, Toronto, Ontario, Canada, pp. 353-356, 2006, IEEE Computer Society, 1-4244-0367-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee 0001 |
Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings, pp. 322-336, 2006, Springer, 3-540-47699-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Florian Mendel, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe |
Update on Tiger. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 63-79, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Qiming Li, Dah-Ming Chiu, John C. S. Lui |
On the Practical and Security Issues of Batch Content Distribution Via Network Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Proceedings of the 14th IEEE International Conference on Network Protocols, ICNP 2006, November 12-15, 2006, Santa Barbara, California, USA, pp. 158-167, 2006, IEEE Computer Society, 1-4244-0593-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings, pp. 242-256, 2006, Springer, 3-540-38080-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Sylvain Pasini, Serge Vaudenay |
An Optimal Non-interactive Message Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, pp. 280-294, 2006, Springer, 3-540-31033-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings, pp. 404-423, 2006, Springer, 3-540-44601-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Byeong-Seob You, Dong-Wook Lee, Sang Hun Eo, Jae-dong Lee, Hae-Young Bae |
Hybrid Index for Spatio-temporal OLAP Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADVIS ![In: Advances in Information Systems, 4th International Conference, ADVIS 2006, Izmir, Turkey, October 18-20, 2006, Proceedings, pp. 110-118, 2006, Springer, 3-540-46291-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Aggregation R-tree, OLAP, Spatio-Temporal, Spatial Data Warehouse |
16 | Mihir Bellare |
New Proofs for NMAC and HMAC: Security without collision-resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings, pp. 602-619, 2006, Springer, 3-540-37432-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Simon Rieche, Klaus Wehrle, Leo Petrak, Clemens Wrzodek |
Cerco: Supporting Range Queries with a Hierarchically Structured Peer-to-Peer System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2006, The 31st Annual IEEE Conference on Local Computer Networks, Tampa, Florida, USA, 14-16 November 2006, pp. 509-510, 2006, IEEE Computer Society, 1-4244-0418-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Daniel R. L. Brown |
Generic Groups, Collision Resistance, and ECDSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 35(1), pp. 119-152, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
digital signatures, provable security, public key cryptography |
16 | Cédric De Roover, Christophe De Vleeschouwer, Frédéric Lefèbvre, Benoît Macq |
Robust image hashing based on radial variance of pixels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (3) ![In: Proceedings of the 2005 International Conference on Image Processing, ICIP 2005, Genoa, Italy, September 11-14, 2005, pp. 77-80, 2005, IEEE, 0-7803-9134-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Yevgeniy Dodis, Adam D. Smith |
Entropic Security and the Encryption of High Entropy Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings, pp. 556-577, 2005, Springer, 3-540-24573-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Martin Dietzfelbinger, Christoph Weidling |
Balanced Allocation and Dictionaries with Tightly Packed Constant Size Bins. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings, pp. 166-178, 2005, Springer, 3-540-27580-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Yasunobu Nohara, Sozo Inoue, Kensuke Baba, Hiroto Yasuura |
Quantitative evaluation of unlinkable ID matching schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005, pp. 55-60, 2005, ACM, 1-59593-228-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
degree of unlinkability, k-steps ID matching, privacy, RFID security |
16 | Haojun Wang, Roger Zimmermann, Wei-Shinn Ku |
ASPEN: an adaptive spatial peer-to-peer network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GIS ![In: 13th ACM International Workshop on Geographic Information Systems, ACM-GIS 2005, November 4-5, 2005, Bremen, Germany, Proceedings, pp. 230-239, 2005, ACM, 1-59593-146-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
distributed spatial databases, peer-to-peer systems |
16 | Lars R. Knudsen, John Erik Mathiassen |
Preimage and Collision Attacks on MD2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers, pp. 255-267, 2005, Springer, 3-540-26541-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Sasa Rudan, Aleksandra Kovacevic, Charles A. Milligan, Veljko M. Milutinovic |
Data Assurance in a Conventional File Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Yusuke Doi, Shirou Wakayama, Masahiro Ishiyama, Satoshi Ozaki, Atsushi Inoue |
Kallima: A Tag-Reader Protocol for Privacy Enhanced RFID System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 375-382, 2005, Springer, 3-540-30803-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Miao Ma |
Mitigating Denial of Service Attacks with Password Puzzles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (2) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 2, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 621-626, 2005, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | José Rufino, Albano Alves, José Exposto, António Pina |
A Cluster Oriented Model for Dynamically Balanced DHTs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), CD-ROM / Abstracts Proceedings, 26-30 April 2004, Santa Fe, New Mexico, USA, 2004, IEEE Computer Society, 0-7695-2132-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | A. Murat Fiskiran, Ruby B. Lee |
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCD ![In: 22nd IEEE International Conference on Computer Design: VLSI in Computers & Processors (ICCD 2004), 11-13 October 2004, San Jose, CA, USA, Proceedings, pp. 452-457, 2004, IEEE Computer Society, 0-7695-2231-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Il-Sun You, Kyungsan Cho |
A Security Proxy Based Protocol for Authenticating the Mobile IPv6 Binding Updates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 167-174, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Mipv6 Binding Update Protocol, CAM-DH, CGA |
16 | Jun Li, Minho Sung, Jun (Jim) Xu, Li (Erran) Li |
Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2004 IEEE Symposium on Security and Privacy (S&P 2004), 9-12 May 2004, Berkeley, CA, USA, pp. 115-129, 2004, IEEE Computer Society, 0-7695-2136-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Changxun Wu, Randal C. Burns |
Achieving Performance Consistency in Heterogeneous Clusters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: 13th International Symposium on High-Performance Distributed Computing (HPDC-13 2004), 4-6 June 2004, Honolulu, Hawaii, USA, pp. 140-149, 2004, IEEE Computer Society, 0-7695-2175-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Henri Gilbert, Helena Handschuh |
Security Analysis of SHA-256 and Sisters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers, pp. 175-193, 2003, Springer, 3-540-21370-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Satish Narayanasamy, Timothy Sherwood, Suleyman Sair, Brad Calder, George Varghese |
Catching Accurate Profiles in Hardwar. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCA ![In: Proceedings of the Ninth International Symposium on High-Performance Computer Architecture (HPCA'03), Anaheim, California, USA, February 8-12, 2003, pp. 269-280, 2003, IEEE Computer Society, 0-7695-1871-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Sumit Ganguly, Minos N. Garofalakis, Rajeev Rastogi |
Processing Set Expressions over Continuous Update Streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, San Diego, California, USA, June 9-12, 2003, pp. 265-276, 2003, ACM, 1-58113-634-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Kun Suk Kim, Sartaj Sahni |
IP Lookup By Binary Search On Prefix Length. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey, pp. 77-82, 2003, IEEE Computer Society, 0-7695-1961-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
router tables, binary search on length, dynamic programming, Packet routing, longest-prefix matching, controlled prefix expansion |
16 | Chai Wah Wu |
On the design of content-based multimedia authentication systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 4(3), pp. 385-393, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Veerle Desmet, Bart Goeman, Koenraad De Bosschere |
Independent Hashing as Confidence Mechanism for Value Predictors in Microprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Euro-Par ![In: Euro-Par 2002, Parallel Processing, 8th International Euro-Par Conference Paderborn, Germany, August 27-30, 2002, Proceedings, pp. 458-467, 2002, Springer, 3-540-44049-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Yevgeniy Dodis, Leonid Reyzin |
On the Power of Claw-Free Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 55-73, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Charles C. Y. Lam, Guang Gong, Scott A. Vanstone |
Message Authentication Codes with Error Correcting Capabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 354-366, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Error Correcting Codes, Message Authentication Codes |
|
|