|
Conferences in DBLP
Composable Formal Security Analysis: Juggling Soundness, Simplicity and Efficiency. [Citation Graph (, )][DBLP]
Newton's Method for omega-Continuous Semirings. [Citation Graph (, )][DBLP]
The Tractability Frontier for NFA Minimization. [Citation Graph (, )][DBLP]
Finite Automata, Digraph Connectivity, and Regular Expression Size. [Citation Graph (, )][DBLP]
Leftist Grammars Are Non-primitive Recursive. [Citation Graph (, )][DBLP]
On the Computational Completeness of Equations over Sets of Natural Numbers. [Citation Graph (, )][DBLP]
Placement Inference for a Client-Server Calculus. [Citation Graph (, )][DBLP]
Extended pi-Calculi. [Citation Graph (, )][DBLP]
Completeness and Logical Full Abstraction in Modal Logics for Typed Mobile Processes. [Citation Graph (, )][DBLP]
On the Sets of Real Numbers Recognized by Finite Automata in Multiple Bases. [Citation Graph (, )][DBLP]
On Expressiveness and Complexity in Real-Time Model Checking. [Citation Graph (, )][DBLP]
STORMED Hybrid Systems. [Citation Graph (, )][DBLP]
Controller Synthesis and Verification for Markov Decision Processes with Qualitative Branching Time Objectives. [Citation Graph (, )][DBLP]
On Datalog vs. LFP. [Citation Graph (, )][DBLP]
Directed st-Connectivity Is Not Expressible in Symmetric Datalog. [Citation Graph (, )][DBLP]
Non-dichotomies in Constraint Satisfaction Complexity. [Citation Graph (, )][DBLP]
Quantified Constraint Satisfaction and the Polynomially Generated Powers Property. [Citation Graph (, )][DBLP]
When Does Partial Commutative Closure Preserve Regularity? [Citation Graph (, )][DBLP]
Weighted Logics for Nested Words and Algebraic Formal Power Series. [Citation Graph (, )][DBLP]
Tree Languages Defined in First-Order Logic with One Quantifier Alternation. [Citation Graph (, )][DBLP]
Duality and Equational Theory of Regular Languages. [Citation Graph (, )][DBLP]
Reversible Flowchart Languages and the Structured Reversible Program Theorem. [Citation Graph (, )][DBLP]
Attribute Grammars and Categorical Semantics. [Citation Graph (, )][DBLP]
A Domain Theoretic Model of Qubit Channels. [Citation Graph (, )][DBLP]
Interacting Quantum Observables. [Citation Graph (, )][DBLP]
Perpetuality for Full and Safe Composition (in a Constructive Setting). [Citation Graph (, )][DBLP]
A System F with Call-by-Name Exceptions. [Citation Graph (, )][DBLP]
Linear Logical Algorithms. [Citation Graph (, )][DBLP]
A Simple Model of Separation Logic for Higher-Order Store. [Citation Graph (, )][DBLP]
Open Implication. [Citation Graph (, )][DBLP]
ATL* Satisfiability Is 2EXPTIME-Complete. [Citation Graph (, )][DBLP]
Visibly Pushdown Transducers. [Citation Graph (, )][DBLP]
The Non-deterministic Mostowski Hierarchy and Distance-Parity Automata. [Citation Graph (, )][DBLP]
Analyzing Context-Free Grammars Using an Incremental SAT Solver. [Citation Graph (, )][DBLP]
Weak Pseudorandom Functions in Minicrypt. [Citation Graph (, )][DBLP]
On Black-Box Ring Extraction and Integer Factorization. [Citation Graph (, )][DBLP]
Extractable Perfectly One-Way Functions. [Citation Graph (, )][DBLP]
Error-Tolerant Combiners for Oblivious Primitives. [Citation Graph (, )][DBLP]
Asynchronous Multi-Party Computation with Quadratic Communication. [Citation Graph (, )][DBLP]
Improved Garbled Circuit: Free XOR Gates and Applications. [Citation Graph (, )][DBLP]
Improving the Round Complexity of VSS in Point-to-Point Networks. [Citation Graph (, )][DBLP]
How to Protect Yourself without Perfect Shredding. [Citation Graph (, )][DBLP]
Universally Composable Undeniable Signature. [Citation Graph (, )][DBLP]
Interactive PCP. [Citation Graph (, )][DBLP]
Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model. [Citation Graph (, )][DBLP]
Delegating Capabilities in Predicate Encryption Systems. [Citation Graph (, )][DBLP]
Bounded Ciphertext Policy Attribute Based Encryption. [Citation Graph (, )][DBLP]
Making Classical Honest Verifier Zero Knowledge Protocols Secure against Quantum Attacks. [Citation Graph (, )][DBLP]
Composable Security in the Bounded-Quantum-Storage Model. [Citation Graph (, )][DBLP]
On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak. [Citation Graph (, )][DBLP]
History-Independent Cuckoo Hashing. [Citation Graph (, )][DBLP]
Building a Collision-Resistant Compression Function from Non-compressing Primitives. [Citation Graph (, )][DBLP]
Robust Multi-property Combiners for Hash Functions Revisited. [Citation Graph (, )][DBLP]
Homomorphic Encryption with CCA Security. [Citation Graph (, )][DBLP]
How to Encrypt with the LPN Problem. [Citation Graph (, )][DBLP]
Could SFLASH be Repaired?. [Citation Graph (, )][DBLP]
Password Mistyping in Two-Factor-Authenticated Key Exchange. [Citation Graph (, )][DBLP]
Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials. [Citation Graph (, )][DBLP]
|