Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/tcc/tcc2017-1.bht:"
@inproceedings{DBLP:conf/tcc/0001D17, author = {Ling Ren and Srinivas Devadas}, editor = {Yael Kalai and Leonid Reyzin}, title = {Bandwidth Hard Functions for {ASIC} Resistance}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {466--492}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_16}, doi = {10.1007/978-3-319-70500-2\_16}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/0001D17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/0009Z17, author = {Bo Tang and Jiapeng Zhang}, editor = {Yael Kalai and Leonid Reyzin}, title = {Barriers to Black-Box Constructions of Traitor Tracing Systems}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {3--30}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_1}, doi = {10.1007/978-3-319-70500-2\_1}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/0009Z17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AgrawalR17, author = {Shweta Agrawal and Alon Rosen}, editor = {Yael Kalai and Leonid Reyzin}, title = {Functional Encryption for Bounded Collusions, Revisited}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {173--205}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_7}, doi = {10.1007/978-3-319-70500-2\_7}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AgrawalR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AlwenT17, author = {Jo{\"{e}}l Alwen and Bj{\"{o}}rn Tackmann}, editor = {Yael Kalai and Leonid Reyzin}, title = {Moderately Hard Functions: Definition, Instantiations, and Applications}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {493--526}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_17}, doi = {10.1007/978-3-319-70500-2\_17}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AlwenT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Ananth017, author = {Prabhanjan Ananth and Abhishek Jain}, editor = {Yael Kalai and Leonid Reyzin}, title = {On Secure Two-Party Computation in Three Rounds}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {612--644}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_21}, doi = {10.1007/978-3-319-70500-2\_21}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/Ananth017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BadrinarayananG17, author = {Saikrishna Badrinarayanan and Vipul Goyal and Abhishek Jain and Dakshita Khurana and Amit Sahai}, editor = {Yael Kalai and Leonid Reyzin}, title = {Round Optimal Concurrent {MPC} via Strong Simulation}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {743--775}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_25}, doi = {10.1007/978-3-319-70500-2\_25}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BadrinarayananG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BlockiZ17, author = {Jeremiah Blocki and Samson Zhou}, editor = {Yael Kalai and Leonid Reyzin}, title = {On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {445--465}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_15}, doi = {10.1007/978-3-319-70500-2\_15}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BlockiZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BonehKW17, author = {Dan Boneh and Sam Kim and David J. Wu}, editor = {Yael Kalai and Leonid Reyzin}, title = {Constrained Keys for Invertible Pseudorandom Functions}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {237--263}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_9}, doi = {10.1007/978-3-319-70500-2\_9}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BonehKW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BrakerskiHP17, author = {Zvika Brakerski and Shai Halevi and Antigoni Polychroniadou}, editor = {Yael Kalai and Leonid Reyzin}, title = {Four Round Secure Computation Without Setup}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {645--677}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_22}, doi = {10.1007/978-3-319-70500-2\_22}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BrakerskiHP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BrakerskiTVW17, author = {Zvika Brakerski and Rotem Tsabary and Vinod Vaikuntanathan and Hoeteck Wee}, editor = {Yael Kalai and Leonid Reyzin}, title = {Private Constrained PRFs (and More) from {LWE}}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {264--302}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_10}, doi = {10.1007/978-3-319-70500-2\_10}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BrakerskiTVW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BrodyDFP17, author = {Joshua Brody and Stefan Dziembowski and Sebastian Faust and Krzysztof Pietrzak}, editor = {Yael Kalai and Leonid Reyzin}, title = {Position-Based Cryptography and Multiparty Communication Complexity}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {56--81}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_3}, doi = {10.1007/978-3-319-70500-2\_3}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BrodyDFP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CiampiOSV17, author = {Michele Ciampi and Rafail Ostrovsky and Luisa Siniscalchi and Ivan Visconti}, editor = {Yael Kalai and Leonid Reyzin}, title = {Round-Optimal Secure Two-Party Computation from Trapdoor Permutations}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {678--710}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_23}, doi = {10.1007/978-3-319-70500-2\_23}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CiampiOSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CiampiOSV17a, author = {Michele Ciampi and Rafail Ostrovsky and Luisa Siniscalchi and Ivan Visconti}, editor = {Yael Kalai and Leonid Reyzin}, title = {Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {711--742}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_24}, doi = {10.1007/978-3-319-70500-2\_24}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CiampiOSV17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DazaM17, author = {Vanesa Daza and Nikolaos Makriyannis}, editor = {Yael Kalai and Leonid Reyzin}, title = {Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {581--611}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_20}, doi = {10.1007/978-3-319-70500-2\_20}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DazaM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DottlingG17, author = {Nico D{\"{o}}ttling and Sanjam Garg}, editor = {Yael Kalai and Leonid Reyzin}, title = {From Selective {IBE} to Full {IBE} and Selective {HIBE}}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {372--408}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_13}, doi = {10.1007/978-3-319-70500-2\_13}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/DottlingG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GargMM17, author = {Sanjam Garg and Mohammad Mahmoody and Ameer Mohammed}, editor = {Yael Kalai and Leonid Reyzin}, title = {When Does Functional Encryption Imply Obfuscation?}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {82--115}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_4}, doi = {10.1007/978-3-319-70500-2\_4}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/GargMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoldwasserKW17, author = {Shafi Goldwasser and Saleet Klein and Daniel Wichs}, editor = {Yael Kalai and Leonid Reyzin}, title = {The Edited Truth}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {305--340}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_11}, doi = {10.1007/978-3-319-70500-2\_11}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/GoldwasserKW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoyalG17, author = {Rishab Goyal and Vipul Goyal}, editor = {Yael Kalai and Leonid Reyzin}, title = {Overcoming Cryptographic Impossibility Results Using Blockchains}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {529--561}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_18}, doi = {10.1007/978-3-319-70500-2\_18}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/GoyalG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HofheinzHK17, author = {Dennis Hofheinz and Kathrin H{\"{o}}velmanns and Eike Kiltz}, editor = {Yael Kalai and Leonid Reyzin}, title = {A Modular Analysis of the Fujisaki-Okamoto Transformation}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {341--371}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_12}, doi = {10.1007/978-3-319-70500-2\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HofheinzHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/JagerSSW17, author = {Tibor Jager and Martijn Stam and Ryan Stanley{-}Oakes and Bogdan Warinschi}, editor = {Yael Kalai and Leonid Reyzin}, title = {Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {409--441}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_14}, doi = {10.1007/978-3-319-70500-2\_14}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/JagerSSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KiyoshimaLV17, author = {Susumu Kiyoshima and Huijia Lin and Muthuramakrishnan Venkitasubramaniam}, editor = {Yael Kalai and Leonid Reyzin}, title = {A Unified Approach to Constructing Black-Box {UC} Protocols in Trusted Setup Models}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {776--809}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_26}, doi = {10.1007/978-3-319-70500-2\_26}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/KiyoshimaLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LindellR17, author = {Yehuda Lindell and Tal Rabin}, editor = {Yael Kalai and Leonid Reyzin}, title = {Secure Two-Party Computation with Fairness - {A} Necessary Design Principle}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {565--580}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_19}, doi = {10.1007/978-3-319-70500-2\_19}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/LindellR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LiuZ17, author = {Qipeng Liu and Mark Zhandry}, editor = {Yael Kalai and Leonid Reyzin}, title = {Decomposable Obfuscation: {A} Framework for Building Applications of Obfuscation from Polynomial Hardness}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {138--169}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_6}, doi = {10.1007/978-3-319-70500-2\_6}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/LiuZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LombardiV17, author = {Alex Lombardi and Vinod Vaikuntanathan}, editor = {Yael Kalai and Leonid Reyzin}, title = {Limits on the Locality of Pseudorandom Generators and Applications to Indistinguishability Obfuscation}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {119--137}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_5}, doi = {10.1007/978-3-319-70500-2\_5}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/LombardiV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LovettZ17, author = {Shachar Lovett and Jiapeng Zhang}, editor = {Yael Kalai and Leonid Reyzin}, title = {On the Impossibility of Entropy Reversal, and Its Application to Zero-Knowledge Proofs}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {31--55}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_2}, doi = {10.1007/978-3-319-70500-2\_2}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/LovettZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Wee17, author = {Hoeteck Wee}, editor = {Yael Kalai and Leonid Reyzin}, title = {Attribute-Hiding Predicate Encryption in Bilinear Groups, Revisited}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {206--233}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_8}, doi = {10.1007/978-3-319-70500-2\_8}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/Wee17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2017-1, editor = {Yael Kalai and Leonid Reyzin}, title = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2}, doi = {10.1007/978-3-319-70500-2}, isbn = {978-3-319-70499-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2017-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.