The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SECRYPT"( http://dblp.L3S.de/Venues/SECRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/secrypt

Publication years (Num. hits)
2006 (73) 2007 (67) 2008 (83) 2009 (62) 2010 (71) 2011 (68) 2012 (67) 2013 (71) 2014 (64) 2015 (53) 2016 (52) 2017 (67) 2021 (96) 2022 (85) 2023 (100)
Publication types (Num. hits)
inproceedings(1064) proceedings(15)
Venues (Conferences, Journals, ...)
SECRYPT(1079)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 1079 publication records. Showing 1079 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Eduardo Fernández-Medina, Manu Malek, Javier Hernando (eds.) SECRYPT 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Luis Enrique Sánchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini Practical Application of a Security Management Maturity Model for SMEs based on Predefined Schemas. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Peng Xu, Zhiyi Fang, Hang Su, Chuyi Wei Experimental Research and Capability Valuation on Security of SOA-SCA based SDO. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Álvaro Enrique Arenas, Benjamin Aziz, Gheorghe Cosmin Silaghi Reputation Management in Grid-based Virtual Organisations. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Salem Benferhat, Karim Tabia Novel and Anomalous Behavior Detection using Bayesian Network Classifiers. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Christian Damsgaard Jensen, Thomas Rune Korsgaard Dynamics of Trust Evolution - Auto-configuration of Dispositional Trust Dynamics. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Mohamed Abo El-Fotouh, Klaus Diepold A Fast Encryption Scheme for Networks Applications. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Juri Luca De Coi, Daniel Olmedilla A Review of Trust Management, Security and Privacy Policy Languages. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Sead Muftic, Gernot Schmoelzer Cryptonet: Secure E-Mail System. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Raúl Herbosa, Gabriel Díaz 0001, Manuel Castro 0001 Securing the Email Services - New System for Secure Managing the Organization's Mail Service. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Mahadevan Gomathisankaran, Ka-Ming Keung, Akhilesh Tyagi REBEL - Reconfigurable Block Encryption Logic. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Paulo Salvador 0001, António Nogueira, Ulisses França, Rui Valadas Detection of Illicit Traffic using Neural Networks. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1V. Kumar Murty, Guangwu Xu Security and Authentication for Networked Storage. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Kwang Ho Kim, Christophe Nègre Point Multiplication on Supersingular Elliptic Curves Defined over Fields of Characteristic 2 and 3. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Guanhan Chew, Khoongming Khoo A General Framework for Guess-and-Determine and Time-Memory-Data Trade-Off Attacks on Stream Ciphers. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Mohamed Abo El-Fotouh, Klaus Diepold The Substitution Cipher Chaining Mode. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Omer Zekvan Yilmaz, Albert Levi, Erkay Savas Multiphase Deployment Models for Fast Self Healing in Wireless Sensor Networks. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Daniele Quercia, Licia Capra, Valentina Zanardi Selecting Trustworthy Content using Tags. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Hongxia Jin Traitor Tracing for Anonymous Attack in Content Protection. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou An Improvement of Strong Proxy Signature and Its Applications. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Gabriele Lenzini, Nabil Sahli, Henk Eertink Trust Model for High Quality Recommendation. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1André Zúquete Enhanced Secure Interface for a Portable e-Voting Terminal. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Rodrigo Sanches Miani, Bruno Bogaz Zarpelão, Leonardo de Souza Mendes, Mario Lemes Proença Jr. Metrics Application in Metropolitan Broadband Access Network Security Analysis. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Cengiz Örencik, Thomas Brochmann Pedersen, Erkay Savas, Mehmet Keskinöz Improved Fuzzy Vault Scheme for Fingerprint Verification. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Z. Cliffe Schreuders, Christian Payne Functionality-based Application Confinement - Parameterised Hierarchical Application Restrictions. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Yin Li, Christophe Nègre An Efficient Multiplication Algorithm using Binomial Residue Representation. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Ammar Boulaiche, Kamel Adi Honeyd Detection Via Abnormal Behaviors Generated by the ARPD Daemon. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Ventzislav Nikov, Marc Vauclair Yet Another Secure Distance-Bounding Protocol. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca A Heuristic Polynomial Algorithm for Local Inconsistency Diagnosis in Firewall Rule Sets. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Peter Hyun-Jeen Lee, Shivaramakrishnan Narayan, Parampalli Udaya Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless Encryption. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang A Fair e-Tendering Protocol. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Satyajit Grover, Divya Naidu Kolar Sunder, Samuel O. Moffatt, Michael E. Kounavis An Event-Driven, Inclusionary and Secure Approach to Kernel Integrity. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Guido Marco Bertoni, Luca Breveglieri, Roberto Farina, Francesco Regazzoni 0001 A 640 Mbit/S 32-Bit Pipelined Implementation of the AES Algorithm. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Bart Preneel Cryptographic Algorithms - Successes, Failures and Challenges. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Muhammad Yasir, Mureed Hussain, Kahina Kabri, Dominique Seret SAKE - Secure Authenticated Key Establishment in Sensor Networks. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai FPGA-Targeted Hardware Implementations of K2. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Shivaramakrishnan Narayan, Parampalli Udaya, Peter Hyun-Jeen Lee Identity-based Signcryption without Random Oracles. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Kazuto Kuzuu, Yasushi Hirano, Kenji Mase, Toyohide Watanabe Application to a Shared Terminal of a Roaming User Profile Set Up through LDAP-Smart Card Authentication Cooperation. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Takeo Mizuno, Hiroshi Doi Efficient IBE-PKE Proxy Re-Encryption. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
1Branislav Jovic, Charles P. Unsworth Improving Security in Chaotic Spread Spectrum Communication Systems with a Novel 'Bit Power Parameter Spectrum' Measure. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Sharon Nachtigal e-Business Security Design using Process Security Requirements Septet. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Hongxia Jin A Closer Look at Broadcast Encryption and Traitor Tracing for Content Protection. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Azzam Mourad, Marc-André Laverdière, Mourad Debbabi A High-Level Aspect-Oriented based Language for Software Security Hardening. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Santanu Dutta Recent Trends in the Design of Video Signal Processing IPS and Multimedia SoCs. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Bartek Gedrojc, Jan C. A. van der Lubbe, Martin van Hensbergen Private Computing with Beehive Organized Agents. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Rafael Páez, Joan Tomàs, Jordi Forné, Miguel Soriano MAIS: Mobile Agent Integrity System - A Security System to IDS based on Autonomous Agents. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Mohammad S. Obaidat Future and Challenges of the Security of e-Systems and Computer Networks. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Luis Enrique Sánchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini Developing a Model and a Tool to Manage the Information Security in Small and Medium Enterprises. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Dennis Y. W. Liu, Shuang Chang, Duncan S. Wong A More Efficient Convertible Nominative Signature. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Hanane Houmani, Mohamed Mejri Practical and Universal Interpretation Functions for Secrecy. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai K2: A Stream Cipher Algorithm using Dynamic Feedback Control. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Amitabh Saxena Additive Proofs of Knowledge - A New Notion for Non-Interactive Proofs. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Carlos Serrão, Miguel Sales Dias, Jaime Delgado Secure License Management - Management of Digital Object Licenses in a DRM Environment. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Noa Bar-Yosef, Avishai Wool Remote Algorithmic Complexity Attacks against Randomized Hash Tables. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Wataru Hasegawa, Masakazu Soshi, Atsuko Miyaji Mobile Agent Security with Efficient Oblivious Transfer. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Jordi Puiggali, Victor Morales-Rocha Independent Voter Verifiability for Remote Electronic Voting. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Neculai Daniel Stoleru, Victor Valeriu Patriciu The Polynomial Multicomposition Problem in (Z/nZ). Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Alberto Ferrante, Sathish Chandra, Vincenzo Piuri A Query Unit for The IPSec Databases. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1M. Razvi Doomun, K. M. Sunjiv Soyjaudah Modified Temporal Key Integrity Protocol for Efficient Wireless Network Security. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Kazumasa Omote, Takeshi Shimoyama, Satoru Torii A Combinatorics Proliferation Model to Determine the Timing for Blocking Scanning Malware. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Goran Sladic, Branko Milosavljevic, Zora Konjovic Extensible Access Control Model for XML Document Collections. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Ivan Ivanov Utility Computing: Reality and Beyond. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Daniel Socek, Dubravko Culibrk, Vladimir Bozovic Practical Secure Biometrics using Set Intersection as a Similarity Measure. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Marc Joye, Michael Tunstall Securing OpenSSL against Micro-Architectural Attacks. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Javier Hernando, Eduardo Fernández-Medina, Manu Malek (eds.) SECRYPT 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Mei-Yu Wu, Duen-Ren Liu Role and Task Based Authorization Management for Process-View. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Tony C. Shan SOA Wisdom. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Mariusz Stawowski Formal Analysis Methods of Network Security Design. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Alan McCabe, Jarrod Trevathan Implementation and Analysis of a Handwritten Signature Verification Technique. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Christian Payne An Improved Model for Secure Cryptographic Integrity Verification of Local Code. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Kecheng Liu Pragmatic Computing. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Guido van 't Noordende, Ádám Balogh, Rutger F. H. Hofman, Frances M. T. Brazier, Andrew S. Tanenbaum A Secure Jailing System for Confining Untrusted Applications. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Saeed Samet, Ali Miri, Luis Orozco-Barbosa Privacy Preserving k-Means Clustering in Multi-Party Environment. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Slobodan Petrovic Clock Control Sequence Reconstruction in the Generalized Shrinking Generator. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Ibrahim Mostafa Ibrahim, Sherif Hazem Nour El-Din, Abdel Fatah A. Hegazy An Effective and Secure Watermarking Protocol for Digital Rights Protection over the Second-Hand Market. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Christos Ilioudis, Dimitrios A. Baltatzis, George Pangalos, Christos K. Georgiadis Securing Healthgrid Environments. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Lih-Yang Wang, Chao-Chih Chen On the Improvement of Remote Authentication Scheme with Smart Cards. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Masaki Inamura, Toshiaki Tanaka Implementation and Evaluation of New Illegal Copy Protection - Protection Against Making a Illegal Copy of a Copy. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Igor V. Kotenko, Alexander Ulanov Investigation of Cooperative Defense against DDoS. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Annett Laube, Laurent Gomez Dynamic Context-Aware Access Control - Use of Resource Hierarchies to Define Fine-grained, Adaptable Authorization Policies. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Clare McGrath, Ghazanfar Ali Safdar, Máire McLoone Identity Based Public Key Exchange (IDPKE) for Wireless Ad Hoc Networks. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Pascal Giorgi, Christophe Nègre, Thomas Plantard Subquadratic Binary Field Multiplier in Double Polynomial System. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Kai Tao, Jing Li 0076, Srinivas Sampalli Wise Guard - MAC Address Spoofing Detection System for Wireless LANs. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Paola Baldassarri, Anna Montesanto, Paolo Puliti Detecting Anomalous Traffic using Statistical Processing and Self-Organizing Maps. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Paulo F. Andrade, Fernando Mira da Silva, Carlos Ribeiro An Efficient Intrusion Detection System for Networks with Centralized Routing. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Pascual Ejarque, Javier Hernando On the Effect of Score Equalization in SVM Multimodal Biometric Systems. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Urko Zurutuza, Roberto Uribeetxeberria, Ekain Azketa, G. Gil, Jesus Lizarraga, Miguel Fernández Combined Data Mining Approach for Intrusion Detection. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Slim Trabelsi, Yves Roudier Secure Service Publishing with Untrusted Registries - Securing Service Discovery. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Simone Lupetti, Gianluca Dini Practical Verification of Untrusted Terminals using Remote Attestation. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro, Laurent Toutain Reliable Process for Security Policy Deployment. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Emmanouel Kellinis, Konstantinos Papapanagiotou Using Steganography to Improve Hash Functions' Collision Resistance. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Lei Xia, Hao Huang, Shuying Yu Towards a Multi-model Views Security Framework. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Laurent Gomez, Ivonne Thomas Towards User Authentication Flexibility. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Adrian Leung, Geong Sen Poh An Anonymous waterMarking Scheme for Content Distribution Protection using Trusted Computing. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Paulo F. Oliveira, Rui A. Costa, João Barros Mobile Secret Key Distribution with Network Coding. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Adnan Abdul-Aziz Gutub, Lahouari Ghouti, Alaaeldin A. Amin, Talal M. Alkharobi, Mohammad K. Ibrahim Utilizing Extension Character 'Kashida' with Pointed Letters for Arabic Text Digital Watermarking. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Volker Gruhn, Malte Hülder, Vincent Wolff-Marting Utilizing Social Networking Platforms to Support Public Key Infrastructures. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Shivaramakrishnan Narayan, Parampalli Udaya A Provably Secure Multi-Receiver Identity-based Signcryption using Bilinear Maps. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Toshiyuki Fujisawa, Kazuto Ogawa, Takeshi Kimura, Masaki Inamura, Toshiaki Tanaka Anonymous Prepaid Content Viewing System with Mobile Terminal. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
1Paolo Cennamo, Antonio Fresa, Anton Luca Robustelli, Francesco Toro, Maurizio Longo, Fabio Postiglione A 3g IMS-based Testbed for Secure Real-Time Audio Sessions. Search on Bibsonomy SECRYPT The full citation details ... 2007 DBLP  BibTeX  RDF
Displaying result #901 - #1000 of 1079 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license