The SCEAS System
Navigation Menu

Conferences in DBLP

International Colloquium on Automata, Languages and Programming (ICALP) (icalp)
2006 (conf/icalp/2006-2)

  1. Cynthia Dwork
    Differential Privacy. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:1-12 [Conf]
  2. Vincent Danos, Elham Kashefi, Prakash Panangaden
    The One Way to Quantum Computation. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:13-21 [Conf]
  3. Ivan Visconti
    Efficient Zero Knowledge on the Internet. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:22-33 [Conf]
  4. Rosario Gennaro, Silvio Micali
    Independent Zero-Knowledge Sets. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:34-45 [Conf]
  5. Jun Furukawa, Kaoru Kurosawa, Hideki Imai
    An Efficient Compiler from Sigma-Protocol to 2-Move Deniable Zero-Knowledge. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:46-57 [Conf]
  6. Damien Vergnaud
    New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:58-69 [Conf]
  7. Daniele Micciancio, Saurabh Panjwani
    Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:70-82 [Conf]
  8. Pedro Adão, Cédric Fournet
    Cryptographically Sound Implementations for Communicating Processes. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:83-94 [Conf]
  9. Detlef Kähler, Ralf Küsters, Thomas Wilke
    A Dolev-Yao-Based Definition of Abuse-Free Protocols. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:95-106 [Conf]
  10. Rajeev Alur, Pavol Cerný, Steve Zdancewic
    Preserving Secrecy Under Refinement. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:107-118 [Conf]
  11. Michele Boreale
    Quantifying Information Leakage in Process Calculi. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:119-131 [Conf]
  12. Stéphanie Delaune, Pascal Lafourcade, Denis Lugiez, Ralf Treinen
    Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:132-143 [Conf]
  13. Vadim Lyubashevsky, Daniele Micciancio
    Generalized Compact Knapsacks Are Collision Resistant. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:144-155 [Conf]
  14. Vivien Dubois, Louis Granboulan, Jacques Stern
    An Efficient Provable Distinguisher for HFE. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:156-167 [Conf]
  15. Krzysztof Pietrzak
    A Tight Bound for EMAC. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:168-179 [Conf]
  16. Frederik Armknecht, Matthias Krause
    Constructing Single- and Multi-output Boolean Functions with Maximal Algebraic Immunity. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:180-191 [Conf]
  17. Danny Harnik, Moni Naor
    On Everlasting Security in the Hybrid Bounded Storage Model. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:192-203 [Conf]
  18. Yevgeniy Dodis, Renato Renner
    On the Impossibility of Extracting Classical Randomness Using a Quantum Computer. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:204-215 [Conf]
  19. Akinori Kawachi, Tomoyuki Yamakami
    Quantum Hardcore Functions by Complexity-Theoretical Quantum List Decoding. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:216-227 [Conf]
  20. Iftach Haitner, Danny Harnik, Omer Reingold
    Efficient Pseudorandom Generators from Exponentially Hard One-Way Functions. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:228-239 [Conf]
  21. Pierre-Alain Fouque, David Pointcheval, Jacques Stern, Sébastien Zimmer
    Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:240-251 [Conf]
  22. Ricardo Corin, Jerry den Hartog
    A Probabilistic Hoare-style Logic for Game-Based Cryptographic Proofs. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:252-263 [Conf]
  23. Duong Hieu Phan, Reihaneh Safavi-Naini, Dongvu Tonien
    Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:264-275 [Conf]
  24. Douglas Wikström, Jens Groth
    An Adaptively Secure Mix-Net Without Erasures. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:276-287 [Conf]
  25. Tamir Tassa, Nira Dyn
    Multipartite Secret Sharing by Bivariate Interpolation. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:288-299 [Conf]
  26. Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart
    Identity-Based Encryption Gone Wild. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:300-311 [Conf]
  27. Hugo Gimbert, Wieslaw Zielonka
    Deterministic Priority Mean-Payoff Games as Limits of Discounted Games. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:312-323 [Conf]
  28. Kousha Etessami, Mihalis Yannakakis
    Recursive Concurrent Stochastic Games. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:324-335 [Conf]
  29. Eryk Kopczynski
    Half-Positional Determinacy of Infinite Games. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:336-347 [Conf]
  30. Colin Stirling
    A Game-Theoretic Approach to Deciding Higher-Order Matching. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:348-359 [Conf]
  31. Kohei Honda, Martin Berger, Nobuko Yoshida
    Descriptive and Relative Completeness of Logics for Higher-Order Functions. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:360-371 [Conf]
  32. Rasmus Ejlers Møgelberg
    Interpreting Polymorphic FPC into Domain Theoretic Models of Parametric Polymorphism. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:372-383 [Conf]
  33. Esfandiar Haghverdi
    Typed GoI for Exponentials. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:384-395 [Conf]
  34. Stefano Guerrini, Patrizia Marzuoli
    Commutative Locative Quantifiers for Multiplicative Linear Logic. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:396-407 [Conf]
  35. Filip Murlak
    The Wadge Hierarchy of Deterministic Tree Languages. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:408-419 [Conf]
  36. Patricia Bouyer, Serge Haddad, Pierre-Alain Reynier
    Timed Petri Nets and Timed Automata: On the Discriminating Power of Zeno Sequences. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:420-431 [Conf]
  37. Tomasz Jurdzinski
    On Complexity of Grammars Related to the Safety Problem. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:432-443 [Conf]
  38. Paul Blain Levy
    Jumbo lambda-Calculus. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:444-455 [Conf]
  39. Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, James Riely
    lambda-RBAC: Programming with Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:456-467 [Conf]
  40. Juhani Karhumäki, Michal Kunc, Alexander Okhotin
    Communication of Two Stacks and Rewriting. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:468-479 [Conf]
  41. Luca Aceto, Taolue Chen, Wan Fokkink, Anna Ingólfsdóttir
    On the Axiomatizability of Priority. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:480-491 [Conf]
  42. Luca Aceto, Wan Fokkink, Anna Ingólfsdóttir, Bas Luttik
    A Finite Equational Base for CCS with Left Merge and Communication Merge. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:492-503 [Conf]
  43. Markus Lohrey, Géraud Sénizergues
    Theories of HNN-Extensions and Amalgamated Products. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:504-515 [Conf]
  44. Wong Karianto, Aloys Krieg, Wolfgang Thomas
    On Intersection Problems for Polynomially Generated Sets. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:516-527 [Conf]
  45. Ittai Balaban, Amir Pnueli, Lenore D. Zuck
    Invisible Safety of Distributed Protocols. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:528-539 [Conf]
  46. Piero A. Bonatti, Carsten Lutz, Aniello Murano, Moshe Y. Vardi
    The Complexity of Enriched µ-Calculi. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:540-551 [Conf]
  47. Michael Benedikt, Christoph Koch
    Interpreting Tree-to-Tree Queries. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:552-564 [Conf]
  48. Blaise Genest, Anca Muscholl
    Constructing Exponential-Size Deterministic Zielonka Automata. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:565-576 [Conf]
  49. Marius Bozga, Radu Iosif, Yassine Lakhnech
    Flat Parametric Counter Automata. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:577-588 [Conf]
  50. Qiqi Yan
    Lower Bounds for Complementation of omega-Automata Via the Full Automata Technique. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:589-600 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002