Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
47 | Xiangqian Wu 0002, David Zhang 0001, Kuanquan Wang |
A Palmprint Cryptosystem. |
ICB |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer |
Analyzing network traffic to detect self-decrypting exploit code. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
exploit code, static analysis, emulation, detection, polymorphic, decryption |
40 | Nick Howgrave-Graham, Jean-Pierre Seifert |
Extending Wiener's Attack in the Presence of Many Decrypting Exponents. |
CQRE |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Manjinder Singh, Sarabjit Singh |
Network Security (Security in Large Networks). |
LCN |
2000 |
DBLP DOI BibTeX RDF |
secure broadcasting, secure communication channel, legal receiving principals, secure broadcasting protocol, broadcast packet size, cryptography, cryptography, protocols, network security, broadcasting, computer networks, computer networks, packet switching, telecommunication security, decrypting, large networks, packet transmission, encryption algorithm |
32 | Changyu Dong, Giovanni Russello, Naranker Dulay |
Shared and Searchable Encrypted Data for Untrusted Servers. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Li Zhang, Shiming Ji, Yi Xie, Qiaoling Yuan, Yuehua Wan, Guanjun Bao |
Principle of Image Encrypting Algorithm Based on Magic Cube Transformation. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Weidong Shi, Hsien-Hsin S. Lee, Mrinmoy Ghosh, Chenghuai Lu, Alexandra Boldyreva |
High Efficiency Counter Mode Security Architecture via Prediction and Precomputation. |
ISCA |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Giyoon Kim, Soojin Kang, Seungjun Baek 0002, Kimoon Kim, Jongsung Kim |
A Method for Decrypting Data Infected with Rhysida Ransomware. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
24 | Wei-Cheng Huang, Wei-Ting Lin, Ming-Shiu Hung, Jinq-Chyi Lee, Chun-Wei Tung |
Decrypting orphan GPCR drug discovery via multitask learning. |
J. Cheminformatics |
2024 |
DBLP DOI BibTeX RDF |
|
24 | Matheus Bichara de Assumpção, Marcelo Abdalla dos Reis, Marcos Roberto Marcondes, Pedro Monteiro da Silva Eleuterio, Victor Hugo Vieira |
Forensic method for decrypting TPM-protected BitLocker volumes using Intel DCI. |
Forensic Sci. Int. Digit. Investig. |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Govind Lal Sidhardh, Manik Banik |
A Cryptography Inspired Model for Non-local Correlations: Decrypting the Enigmas. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Robin Strässer, Sebastian Schlor, Frank Allgöwer |
Decrypting Nonlinearity: Koopman Interpretation and Analysis of Cryptosystems. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Tudorica Radu, Rares Radu, Emil Simion |
A way of decrypting particular malware payloads found in MZPE files. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
24 | Jianfeng Wang, Zhonghao Chen, Yiming Chen, Yixin Xu, Tianyi Wang, Yao Yu, Vijaykrishnan Narayanan, Sumitha George, Huazhong Yang, Xueqing Li |
WeightLock: A Mixed-Grained Weight Encryption Approach Using Local Decrypting Units for Ciphertext Computing in DNN Accelerators. |
AICAS |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Giyoon Kim, Soram Kim, Soojin Kang, Jongsung Kim |
A method for decrypting data infected with Hive ransomware. |
J. Inf. Secur. Appl. |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Stewart Sentanoe, Hans P. Reiser |
SSHkex: Leveraging virtual machine introspection for extracting SSH keys and decrypting SSH network traffic. |
Digit. Investig. |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Giyoon Kim, Soram Kim, Soojin Kang, Jongsung Kim |
A Method for Decrypting Data Infected with Hive Ransomware. |
CoRR |
2022 |
DBLP BibTeX RDF |
|
24 | Peter Alexander Earls Davis |
Decrypting Australia's 'Anti-Encryption' legislation: The meaning and effect of the 'systemic weakness' limitation. |
Comput. Law Secur. Rev. |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Mark C. Ballandies, Marcus M. Dapp, Evangelos Pournaras |
Decrypting distributed ledger design - taxonomy, classification and blockchain community evaluation. |
Clust. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Marie-Judith Saint Martin, Frédérique Frouin, Caroline Malhaire, Fanny Orlhac |
Decrypting the information captured by MRI-radiomic features in predicting the response to neoadjuvant chemotherapy in breast cancer. |
EMBC |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Florentijn van Kampen |
Thomson's Telegram Decrypting a Secret Message from Albania, 1914. |
HistoCrypt |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Giyoon Kim, Soram Kim, Myungseo Park, Younjai Park, Insoo Lee, Jongsung Kim |
Forensic analysis of instant messaging apps: Decrypting Wickr and private text messaging data. |
Digit. Investig. |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Myungseo Park, Giyoon Kim, Younjai Park, Insoo Lee, Jongsung Kim |
Corrigendum to "Decrypting password-based encrypted backup data for Huawei smartphones" [Digital Investigation 28 (2019) 200890]. |
Digit. Investig. |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Soojin Kang, Giyoon Kim, Myungseo Park, Jongsung Kim |
Methods for decrypting the data encrypted by the latest Samsung smartphone backup programs in Windows and macOS. |
Digit. Investig. |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Nguyen Thon Da, Ho Trung Thanh |
Enhancing the Time Performance of Encrypting and Decrypting Large Tabular Data. |
Appl. Artif. Intell. |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Josh Rozner, Christopher Potts, Kyle Mahowald |
Decrypting Cryptic Crosswords: Semantically Complex Wordplay Puzzles as a Target for NLP. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
24 | Motiur Rahaman, Jaikrishna Komanapalli, Mandrita Mukherjee, Prasanna Kumar Byram, Sunanda Sahoo, Nishant Chakravorty |
Decrypting the role of predicted SARS-CoV-2 miRNAs in COVID-19 pathogenesis: A bioinformatics approach. |
Comput. Biol. Medicine |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Josh Rozner, Christopher Potts, Kyle Mahowald |
Decrypting Cryptic Crosswords: Semantically Complex Wordplay Puzzles as a Target for NLP. |
NeurIPS |
2021 |
DBLP BibTeX RDF |
|
24 | Hiroki Hiraga, Hiroaki Nishi |
Network Transparent Decrypting of Cryptographic Stream Considering Service Provision at the Edge. |
INDIN |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Sarah Scheffler |
Decrypting legal dilemmas |
|
2021 |
RDF |
|
24 | Anita Mehta, Jean-Marc Luck |
Hearings and Mishearings: Decrypting the spoken Word. |
Adv. Complex Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
24 | R. Kuppan, L. Shobana, Ismail Naci Cangül |
Encrypting and decrypting algorithms using strong face graph of a tree. |
Int. J. Comput. Math. Comput. Syst. Theory |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Anita Mehta, Jean-Marc Luck |
Hearings and mishearings: decrypting the spoken word. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
24 | Mingjie Liu, Keren Zhu 0001, Jiaqi Gu, Linxiao Shen, Xiyuan Tang, Nan Sun 0001, David Z. Pan |
Towards Decrypting the Art of Analog Layout: Placement Quality Prediction via Transfer Learning. |
DATE |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Günter Fahrnberger |
The Ultimate Victory of White- over Blacklisting for the Editing of Encrypted Instant Messages Without Decrypting Nor Understanding Them. |
I4CS |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Gabriele Partel |
Image and Data Analysis for Spatially Resolved Transcriptomics: Decrypting fine-scale spatial heterogeneity of tissue's molecular architecture. |
|
2020 |
RDF |
|
24 | Myungseo Park, Giyoon Kim, Younjai Park, Insoo Lee, Jongsung Kim |
Decrypting password-based encrypted backup data for Huawei smartphones. |
Digit. Investig. |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Peter McLaren, Gordon Russell 0001, William J. Buchanan, Zhiyuan Tan 0001 |
Decrypting live SSH traffic in virtual environments. |
Digit. Investig. |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Adrian Taylor |
Decrypting SSL traffic: best practices for security, compliance and productivity. |
Netw. Secur. |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Seyed Abolfazl Valizadeh, Robert Riener, Stefan Elmer, Lutz Jäncke |
Decrypting the electrophysiological individuality of the human brain: Identification of individuals based on resting-state EEG activity. |
NeuroImage |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Tamara Radivilova, Lyudmyla Kirichenko, Dmytro Ageyev, Maxim Tawalbeh, Vitalii Bulakh |
Decrypting SSL/TLS traffic for hidden threats detection. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
24 | Peter McLaren, Gordon Russell 0001, William J. Buchanan, Zhiyuan Tan 0001 |
Decrypting live SSH traffic in virtual environments. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
24 | Guang Cheng 0001, Chunsheng Guo, Yongning Tang |
dptCry: an approach to decrypting ransomware WannaCry based on API hooking. |
CCF Trans. Netw. |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Florent Dewez, Valentin Montmirail |
Decrypting the Hill Cipher via a Restricted Search over the Text-Space. |
HistoCrypt |
2019 |
DBLP BibTeX RDF |
|
24 | Günter Fahrnberger |
Editing Encrypted Messages Without Decrypting Nor Understanding Them. |
|
2019 |
RDF |
|
24 | Peter McLaren |
Investigations into decrypting live secure traffic in virtual environments. |
|
2019 |
RDF |
|
24 | Abdulla Shahid, Mohd Wahab, Nidal Rafiuddin, M. Saad Bin Arif, Hasmat Malik |
Decrypting wrist movement from MEG signal using SVM classifier. |
J. Intell. Fuzzy Syst. |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Mark C. Ballandies, Marcus M. Dapp, Evangelos Pournaras |
Decrypting Distributed Ledger Design - Taxonomy, Classification and Blockchain Community Evaluation. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
24 | Song Bian 0001, Masayuki Hiromoto, Takashi Sato |
DWE: decrypting learning with errors with errors. |
DAC |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Wen-Ran Zhang |
Programming the mind and decrypting the universe - A bipolar quantum-neuro-fuzzy associative memory model for quantum cognition and quantum intelligence. |
IJCNN |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Benjamin Taubmann, Christoph Frädrich, Dominik Dusold, Hans P. Reiser |
TLSkex: Harnessing virtual machine introspection for decrypting TLS communication. |
Digit. Investig. |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Bilal Ahmed, Thomas Thesen, Karen E. Blackmon, Ruben Kuzniecky, Orrin Devinsky, Carla E. Brodley |
Decrypting "Cryptogenic" Epilepsy: Semi-supervised Hierarchical Conditional Random Fields For Detecting Cortical Lesions In MRI-Negative Patients. |
J. Mach. Learn. Res. |
2016 |
DBLP BibTeX RDF |
|
24 | Aggelos Liapis, Mieke Haesen, Julia Kantorovitch, Jesús Muñoz Alcántara |
Decrypting the IT Needs of the Designer During the Creative Stages of the Design Process. |
Collaboration in Creative Design |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Mathy Vanhoef, Frank Piessens |
Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys. |
USENIX Security Symposium |
2016 |
DBLP BibTeX RDF |
|
24 | Hubert Plociniczak |
Decrypting Local Type Inference. |
|
2016 |
DOI RDF |
|
24 | Filip Karpísek, Ibrahim M. Baggili, Frank Breitinger |
WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages. |
Digit. Investig. |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Patrik Lantz, Björn Johansson 0006, Martin Hell, Ben J. M. Smeets |
Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality. |
Financial Cryptography Workshops |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Étienne André, Laure Petrucci |
Decrypting cryptography. |
ITHET |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Wenbo Yang, Yuanyuan Zhang 0002, Juanru Li, Junliang Shu, Bodong Li, Wenjun Hu, Dawu Gu |
AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Tam V. Nguyen 0002, Si Liu 0001, Bingbing Ni, Jun Tan, Yong Rui, Shuicheng Yan |
Towards decrypting attractiveness via multi-modality cues. |
ACM Trans. Multim. Comput. Commun. Appl. |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Jian Chen, Jeffrey S. Rosenthal |
Decrypting classical cipher text using Markov chain Monte Carlo. |
Stat. Comput. |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Ko-Chi Kuo, Hsun-Chia Hsu |
Power line communication chip design with data error detecting/correcting and data encrypting/decrypting ability. |
ISPACS |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Wenjun Zheng, Anthony Auerbach |
Decrypting the Sequence of Structural Events during the Gating Transition of Pentameric Ligand-Gated Ion Channels Based on an Interpolated Elastic Network Model. |
PLoS Comput. Biol. |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Benno Lomb, Tim Güneysu |
Decrypting HDCP-protected Video Streams Using Reconfigurable Hardware. |
ReConFig |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Natasa Zivic, Esad Kadusic, Mirko Skrbic |
Mathematical optimization of decrypting algorithm for soft input decryption. |
ICAT |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Guangyu Zeng, Min Fan, Qingbao Li, Li Zhou |
Research on the Algorithm of Decrypting Encrypted Synchronous Sequential Machine. |
ISCSCT (1) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | T. T. Sreekumar |
Decrypting E-Governance: Narratives, Power play and Participation in the Gyandoot Intranet. |
Electron. J. Inf. Syst. Dev. Ctries. |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Sebastien Marion, Richard E. Jones, Chris Ryder |
Decrypting the Java gene pool. |
ISMM |
2007 |
DBLP DOI BibTeX RDF |
micro-patterns, pretenuring, Java, garbage collection |
24 | Hilmar-Detlef Brückner |
Germany's First Cryptanalysis on the Western Front: Decrypting British and French Naval Ciphers in World War I. |
Cryptologia |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Thomas Werner |
Finding and decrypting of promoters contributes to the elucidation of gene function. |
Silico Biol. |
2002 |
DBLP BibTeX RDF |
|
24 | Thomas Werner |
Finding and decrypting of promoters contributes to the elucidation of gene function. |
German Conference on Bioinformatics |
2001 |
DBLP BibTeX RDF |
|
24 | Lei Tang |
Methods for Encrypting and Decrypting MPEG Video Data Efficiently. |
ACM Multimedia |
1996 |
DBLP DOI BibTeX RDF |
|
24 | R. A. Bustos, Tamás D. Gedeon |
Decrypting Neural Network Data: A Gis Case Study. |
ICANNGA |
1995 |
DBLP DOI BibTeX RDF |
|
24 | John Perry Barlow |
Decrypting the Puzzle Palace. |
Commun. ACM |
1992 |
DBLP DOI BibTeX RDF |
|
24 | Thomas Siegenthaler |
Decrypting a Class of Stream Ciphers Using Ciphertext Only. |
IEEE Trans. Computers |
1985 |
DBLP DOI BibTeX RDF |
pseudonoise generator, exhaustive trials, cryptanalysis, Correlation |
24 | Frank Rubin |
Decrypting a Stream Cipher Based on j-k Flip-Flops. |
Cryptologia |
1981 |
DBLP DOI BibTeX RDF |
|
24 | Frank Rubin |
Decrypting a Stream Cipher Based on J-K Flop-Flops. |
IEEE Trans. Computers |
1979 |
DBLP DOI BibTeX RDF |
J?K flip-flop, linear shift register, cryptography, stream cipher, Boolean equations, code breaking |
24 | Frank Rubin |
Computer Methods for Decrypting Multiplex Ciphers. |
Cryptologia |
1978 |
DBLP DOI BibTeX RDF |
|
24 | Frank Rubin |
Computer Methods for Decrypting Random Stream Ciphers. |
Cryptologia |
1978 |
DBLP DOI BibTeX RDF |
|
16 | Michalis Foukarakis, Demetres Antoniades, Michalis Polychronakis |
Deep packet anonymization. |
EUROSEC |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Melissa Chase, Sherman S. M. Chow |
Improving privacy and security in multi-authority attribute-based encryption. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
multi-authority, removing trusted party, privacy, attribute based encryption, anonymous credential |
16 | Hao Yuan, Mikhail J. Atallah |
Efficient and secure distribution of massive geo-spatial data. |
GIS |
2009 |
DBLP DOI BibTeX RDF |
geo-spatial access control, key assignment and derivation, key management |
16 | David Galindo |
Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
non-interactive proofs, standard model, public key encryption, identity-based encryption |
16 | Murat Kantarcioglu, Wei Jiang, Ying Liu 0007, Bradley A. Malin |
A Cryptographic Approach to Securely Share and Query Genomic Sequences. |
IEEE Trans. Inf. Technol. Biomed. |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara |
Anonymous Fingerprinting for Predelivery of Contents. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Wenlue Chen, Zhihua Hu |
A Color Digital Watermark Method Based on NAM-CTC Model. |
CSSE (6) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Ivan Damgård, Dennis Hofheinz, Eike Kiltz, Rune Thorbek |
Public-Key Encryption with Non-interactive Opening. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Murat Kantarcioglu, Wei Jiang, Bradley A. Malin |
A Privacy-Preserving Framework for Integrating Person-Specific Databases. |
Privacy in Statistical Databases |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Eli Biham, Yaniv Carmeli, Adi Shamir |
Bug Attacks. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
Bug attack, Pohlig-Hellman, RSA, ECC, Fault attack |
16 | Chih-Hsu Yen, Yu-Shiang Lin, Bing-Fei Wu |
An efficient implementation of a low-complexity MP3 algorithm with a stream cipher. |
Multim. Tools Appl. |
2007 |
DBLP DOI BibTeX RDF |
DSP, DRM, MP3, Multimedia security, Low complexity |
16 | Xinyang Huang, Ming Yang, Yong Tong |
An efficient and secure aggregation of encrypted data for wireless sensor network based on dynamic cluster. |
SpringSim (1) |
2007 |
DBLP BibTeX RDF |
wireless sensor network, aggregation, dynamic clustering, perfect security, privacy homomorphism |
16 | Rami El Sawda, Ayman Alfalou, Habib Hamam |
RGB Colored Image Encryption Processes Using Several Colored Keys Images. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Kazuto Ogawa, Goichiro Hanaoka, Kazukuni Kobara, Kanta Matsuura, Hideki Imai |
Anonymous Pay-TV System with Secure Revenue Sharing. |
KES (3) |
2007 |
DBLP DOI BibTeX RDF |
secure revenue sharing, anonymity, privacy preservation, homomorphic encryption, Pay-TV |
16 | Holger Schmidt 0002, Chi-Tai Dang, Franz J. Hauck |
Proxy-based Security for the Session Initiation Protocol (SIP). |
ICSNC |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Hongxia Jin, Jeffery Lotspiech |
Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
anti-piracy, broadcast encryption, traitor tracing, Content protection |
16 | Andrey Bogdanov, Thomas Eisenbarth 0001, Andy Rupp |
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
A5/2, SMITH, cryptanalysis, GSM, Gaussian elimination, special-purpose hardware, linear systems of equations |
16 | José M. Rodrigues, William Puech, Adrian G. Bors |
Selective Encryption of Human Skin in JPEG Images. |
ICIP |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Sun S. Chung, Gultekin Özsoyoglu |
Anti-Tamper Databases: Processing Aggregate Queries over Encrypted Databases. |
ICDE Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Ravi Chandra Jammalamadaka, Sharad Mehrotra |
Querying Encrypted XML Documents. |
IDEAS |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Sunghyuck Hong, Noé Lopez-Benitez |
Enhanced Group Key Generation Algorithm. |
NOMS |
2006 |
DBLP DOI BibTeX RDF |
|