The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SECRYPT"( http://dblp.L3S.de/Venues/SECRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/secrypt

Publication years (Num. hits)
2006 (73) 2007 (67) 2008 (83) 2009 (62) 2010 (71) 2011 (68) 2012 (67) 2013 (71) 2014 (64) 2015 (53) 2016 (52) 2017 (67) 2021 (96) 2022 (85) 2023 (100)
Publication types (Num. hits)
inproceedings(1064) proceedings(15)
Venues (Conferences, Journals, ...)
SECRYPT(1079)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 1079 publication records. Showing 1079 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Germán Retamosa, Jorge E. López de Vergara Assessment of Mobile Security Platforms. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Anton Romanov, Eiji Okamoto An Approach for Designing of Enterprise IT Landscapes to Perform Quantitave Information Security Risk Assessment. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Tord Ingolf Reistad Multiparty Comparison - An Improved Multiparty Protocol for Comparison of Secret-shared Values. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Hicham Tout Phishpin: An Integrated, Identity-based Anti-phishing Approach. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Michael G. Iatrou, Artemios G. Voyiatzis, Dimitrios N. Serpanos Network Stack Optimization for Improved IPsec Performance on Linux. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Saraiah Gujjunoori, Taqi Ali Syed, Madhu Babu J., Avinash Darapureddi, Radhesh Mohandas, Alwyn R. Pais Throttling DDoS Attacks. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Magdy Saeb The Chameleon Cipher-192 (CC-192) - A Polymorphic Cipher. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Nathalie Dagorn Identifying Security Elements for Cooperative Information Systems. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Jaeun Choi, Myungjong Lee, Gisung Kim, Sehun Kim Monitoring Node Selection Algorithm for Intrusion Detection in Congested Sensor Network. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Octavian Cret, Radu Tudoran, Alin Suciu, Tamas Györfi Implementing True Random Number Generators in FPGAs by Chip Filling. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Young-Jun Heo, Jintae Oh, Jongsoo Jang Behavior-based Clustering for Discrimination between Flash Crowds and DDoS Attacks. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Nicolas T. Courtois The Dark Side of Security by Obscurity - and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Hamza Rahmani, Nabil Sahli, Farouk Kamoun A Traffic Coherence Analysis Model for DDoS Attack Detection. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1S. Arash Sheikholeslam A Chaos based Encryption Method using Dynamical Systems with Strange Attractors. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Hanh Quyen Nguyen, Friedrich Köster, Michael Klaas, Walter Brenner, Sebastian Obermeier 0001, Markus Brändle Tool Support for Achieving Qualitative Security Assessments of Critical Infrastructures - The ESSAF Framework for Structured Qualitative Analysis. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Hongxia Jin Efficient Traitor Tracing for Content Protection. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Salem Benferhat, Abdelhamid Boudjelida, Habiba Drias Adding Expert Knowledge to TAN-based Intrusion Detection Systems. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda On the Need to Divide the Signature Creation Environment. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Sudip Misra, Mohammad S. Obaidat, Atig Bagchi, Ravindara Bhatt, Soumalya Ghosh Attack Graph Generation with Infused Fuzzy Clustering. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Sergio Pozo, Angel Jesus Varela-Vaca, Rafael M. Gasca, Rafael Ceballos Efficient Algorithms and Abstract Data Types for Local Inconsistency Isolation in Firewall ACLs. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang Certified Pseudonyms Colligated with Master Secret Key. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Shinsaku Kiyomoto, Kazuhide Fukushima, Keith M. Martin An Offline Peer-to-peer Broadcasting Scheme with Anonymity. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Javier Corral-García, Carlos-Jorge del Arco González, José Luis González Sánchez 0003, José Luis Redondo García Free Security Suite 2 - Easy, Intuitive and Complete Free Security Suite with Web Browser Integration. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1David A. Marca e-Business Design - A Shift to Adaptability. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Eduardo Fernández-Medina, Manu Malek, Javier Hernando (eds.) SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Hideo Sato Finger Vein Verification Technology for Mobile Apparatus. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam Venkatesan Iterated Transformations and Quantitative Metrics for Software Protection. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Michael Hutter RFID Authentication Protocols based on Elliptic Curves - A Top-Down Evaluation Survey. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Carmen Torrano-Gimenez, Alejandro Pérez-Villegas, Gonzalo Álvarez An Anomaly-based Web Application Firewall. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Rodrigo Sanches Miani, Felipe Marques Pires, Leonardo de Souza Mendes An Alternative Approach for Formula Modelling in Security Metrics. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Mounita Saha, Dipanwita Roy Chowdhury An Efficient Group Key Agreement Protocol for Heterogeneous Environment. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Wataru Senga, Hiroshi Doi On the Security of Adding Confirmers into Designated Confirmer Signatures. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Peng Yang, Yuanchen Ma, Satoshi Yoshizawa Fast Re-estabilishment of IKEv2 Security Associations for Recovery of IPsec Gateways in Mobile Network. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Constantin Catalin Dragan Interactive Secret Share Management. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Andreas Wiesauer, Johannes Sametinger A Security Design Pattern Taxonomy based on Attack Patterns - Findings of a Systematic Literature Review. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani Preventing Wormhole Attack in Wireless Ad Hoc Networks using Cost-based Schemes. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Blagovest Shishkov Adaptive Antennas in Wireless Communication Networks. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Shiwei Chen, Chenhui Jin A Second Preimage Attack on the Merkle-Damgard Scheme with a Permutation for Hash Functions. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Jan Hajny, Tomas Pelka, Petra Lambertova Universal Authentication Framework - Requirements and Phase Design. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Renan Fischer e Silva, Eduardo da Silva, Luiz Carlos Pessoa Albini Resisting Impersonation Attacks in Chaining-based Public-Key Management on Manets - The Virtual Public-key Management. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Frank Leymann Cloud Computing - Fundamental Architecture & Future Applications. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan On the Security of Two Ring Signcryption Schemes. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Jaydeb Bhaumik, Dipanwita Roy Chowdhury Nmix: An Ideal Candidate for Key Mixing. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Pierangela Samarati Protecting Information Privacy in the Electronic Society. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Daniel Slamanig, Peter Schartner, Christian Stingl Practical Traceable Anonymous Identification. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Gottfried Vossen Web 2.0: A Buzzword, a Serious Development, just Fun, or What? Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Kristof Verslype, Bart De Decker Service and Timeframe Dependent Unlinkable One-time Pseudonyms. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Ola M. Hegazy, Ayman M. Bahaa Eldin, Yasser H. Dakroury Quantum Secure Direct Communication using Entanglement and Super Dense Coding. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Leonardo Ribeiro, Guerra Ruy Safe Reverse Auctions Protocol - Adding Treatment Against Collusive Shill Bidding and Sniping Attacks. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Mayank Varshney, Dipanwita Roy Chowdhury A New Image Encryption Algorithm using Cellular Automata. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Daniel V. Bailey, John G. Brainard, Sebastian Rohde, Christof Paar One-touch Financial Transaction Authentication. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Changlu Lin, Lein Harn, Dingfeng Ye Information-theoretically Secure Strong Verifiable Secret Sharing. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1A. M. Hamad, Walid I. Khedr Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Friedrich Köster, Michael Klaas, Hanh Quyen Nguyen, Walter Brenner, Markus Brändle, Sebastian Obermeier 0001 Collaborative Security Assessments in Embedded Systems Development - The ESSAF Framework for Structured Qualitative Analysis. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Jingde Cheng, Yuichi Goto, Daisuke Horie ISEE: An Information Security Engineering Environment. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Dherik Barison, Rodrigo Sanches Miani, Leonardo de Souza Mendes Evaluation of Quality and Security of a VoIP Network based on Asterisk and OpenVPN. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Volker Müller 0001 A Short Note on Secret Sharing using Elliptic Curves. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1B. B. Amberker, N. R. Sunitha Forward-Secure Proxy Signature and Revocation Scheme for a Proxy Signer with Multiple Original Signers. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Kazuki Yoneyama Anonymous Message Authentication - Universally Composable Definition and Construction. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Tim Good, Mohammed Benaissa Price to Provide RFID Security and Privacy?. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Muhammad Awais Shibli, Sead Muftic Intrusion Detection and Prevention System using Secure Mobile Agents. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Andreas Neppach, Christian Pfaffel-Janser, Ilse Wimberger, Thomas Lorünser, Michael Meyenburg, Alexander Szekely, Johannes Wolkerstorfer Key Management of Quantum Generated Keys in IPsec. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Mohamed N. Hassan, Mohammed Benaissa Low Area Scalable Montgomery Inversion Over GF(2m). Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Shinsuke Ohtsuka, Satoshi Kawamoto, Shigeru Takano, Kensuke Baba, Hiroto Yasuura A Note on Biometrics-based Authentication with Portable Device. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Yaakov Kogan Improving Reliability in Commercial IP Networks. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Celalettin Kilinc, Ali Gökhan Yavuz Applying SRP on SIP Authentication. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Hanane Houmani, Mohamed Mejri Ensuring the Correctness of Cryptographic Protocols with Respect to Secrecy. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Salem Benferhat, Karima Sedki Alert Correlation based on a Logical Handling of Administrator Preferences and Knowledge. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Shankar Joshi, Alwyn R. Pais A New Probabilistic Rekeying Method for Secure Dynamic Groups. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Yehia ElRakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia Interactivity for Reactive Access Control. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Azzam Mourad, Dima Alhadidi, Mourad Debbabi Towards Language-Independent Approach for Security Concerns Weaving. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Muhammed Nauman Qureshi, Muhammad Nadeem Sial, Nassar Ikram An Efficient Reconfigurable SOS Montgomery Multiplier in GF (P) usign FPGA DSP Slices. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Pilar Manzanares-Lopez, Juan Carlos Sánchez-Aarnoutse, Joan García-Haro An Efficient Methodology to Limit Path Length Guaranteeing Anonymity in Overlay Networks. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Jorge Blasco Alís, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho CSteg: Talking in C Code - Steganography of C Source Code in Text. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Raphael Overbeck A Multiple Birthday Attack on NTRU. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Salem Benferhat, Karim Tabia New Schemes for Anomaly Score Aggregation and Thresholding. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Ioanna Dionysiou, David E. Bakken, Carl H. Hauser, Deborah A. Frincke Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Ueli M. Maurer Rethinking Digital Signatures. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Kikelomo Maria Apampa, Tian Zhang, Gary B. Wills, David Argles Ensuring Privacy of Biometric Factors in Multi-Factor Authentication Systems. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Tarik Guelzim, Mohammad S. Obaidat Novel Neurocomputing-based Scheme to Authenticate WLAN Users Employing Distance Proximity Threshold. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Nasour Bagheri, Babak Sadeghiyan, Majid Naderi Multi-Collisions Attack in Ring Hash Structure. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1V. Kumar Murty, Nikolajs Volkovs A Polynomial based Hashing Algorithm. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Mukund Sundararajan, Mohammad S. Obaidat New Techniques to Enhance the Capabilities of the Socks Network Security Protocol. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Hsiao-Hwa Chen Next Generation CDMA Technologies for Futuristic Wireless Communications. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Kaiqi Xiong, David J. Thuente Efficient Localization Schemes in Sensor Networks with Malicious Nodes. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini Security Requirements in Software Product Lines. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Jorge E. López de Vergara, Enrique Vázquez, Javier Guerra Security Policy Instantiation to React to Network Attacks - An Ontology-based Approach using OWL and SWRL. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Juan Vera del Campo, Juan Hernández-Serrano, Josep Pegueroles SCFS: Towards Design and Implementation of a Secure Distributed Filesystem. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Geong Sen Poh, Keith M. Martin On the (In)Security of Two Buyer-Seller Watermarking Protocols. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Eduardo da Silva, Aldri Luiz dos Santos, Luiz Carlos Pessoa Albini, Michele Nogueira Lima Quantifying Misbehaviour Attacks Against the Self-Organized Public Key Management on Manets. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Qinghua Wang 0001, Tingting Zhang Sec-SNMP: Policy-based Security Management for Sensor Networks. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Nuno Borges Carvalho The Importance of Metrology in Wireless Communication Systems - From AM/FM to SDR Systems. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Lourdes López-García, Francisco Rodríguez-Henríquez, Miguel León Chávez An e-Voting Protocol based on Pairing Blind Signatures. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1David A. Marca e-Business Innovation - Surviving the Coming Decades. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Marius Nagy, Selim G. Akl, Sean Kershaw Key Distribution based on Quantum Fourier Transform. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Malte Diehl Geographic Data and Steganography - Using Google Earth and KML Files for High-Capacity Steganography. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Zheng Yan 0002 Autonomic Trust Management for a Pervasive System. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Atta-ur-Rahman 0001, Mureed Hussain, Kahina Kabri, Dominique Seret Kerberos Implementation in Manets. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Ingemar J. Cox Watermarking, Steganography and Content Forensics. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Loránd Szöllösi, Gábor Fehér, Tamás Marosits Proper Key Generation for the IzoSign Algorithm. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
Displaying result #801 - #900 of 1079 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license