|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3849 occurrences of 1722 keywords
|
|
|
Results
Found 4942 publication records. Showing 4919 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
92 | Michael A. Bender, Haodong Hu, Bradley C. Kuszmaul |
Performance guarantees for B-trees with different-sized atomic keys. |
PODS |
2010 |
DBLP DOI BibTeX RDF |
B-tree with different-sized keys, atomic keys, dynamic programming |
71 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
time-limited services, cryptographic keys management, time-bound keys, one-way mappings, broadcast encryption, pseudorandom number generators |
55 | José A. Ramírez-Ruiz, Carlos F. Pfeiffer, Juan Arturo Nolazco-Flores |
Cryptographic Keys Generation Using FingerCodes. |
IBERAMIA-SBIA |
2006 |
DBLP DOI BibTeX RDF |
FingerCode, Support Vector Machine, Biometrics, Cryptographic Keys |
54 | Donggang Liu, Qi Dong 0001 |
Detecting Misused Keys in Wireless Sensor Networks. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Shari Trewin, Helen Pain |
A Model of Keyboard Configuration Requirements. |
International ACM Conference on Assistive Technologies |
1998 |
DBLP DOI BibTeX RDF |
Bounce Keys, Repeat Keys, Sticky Keys, keyboard configuration, empirical studies, user modelling, keyboards, motor disabilities |
49 | Kapali Viswanathan, Ashutosh Saxena |
Towards Logically and Physically Secure Public-Key Infrastructures. |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
critical keys, private keys, controlled use, PKI, backup |
48 | Amitanand S. Aiyer, Lorenzo Alvisi, Mohamed G. Gouda |
Key Grids: A Protocol Family for Assigning Symmetric Keys. |
ICNP |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Sayyed Arash Ostadzadeh, M. Amir Moulavi, Zeinab Zeinalpour |
Massive Concurrent Deletion of Keys in B*-Tree. |
PPAM |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki |
1-out-of-n Signatures from a Variety of Keys. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
46 | Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein Harn |
Location-aware key management scheme for wireless sensor networks. |
SASN |
2004 |
DBLP DOI BibTeX RDF |
sensor networks, key management, probabilistic key sharing |
45 | Peter Buneman, Susan B. Davidson, Wenfei Fan, Carmem S. Hara, Wang Chiew Tan |
Keys for XML. |
WWW |
2001 |
DBLP DOI BibTeX RDF |
relative keys, XML, keys |
45 | Georg Lausen |
Relational Databases in RDF: Keys and Foreign Keys. |
SWDB-ODBIS |
2007 |
DBLP DOI BibTeX RDF |
|
43 | Hongbo Li, Li Zhou |
Use Closure of Relevant Sets of Attributes to Efficiently Find Candidate Keys. |
CSSE (1) |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Gösta Grahne, Jianfei Zhu |
Discovering approximate keys in XML data. |
CIKM |
2002 |
DBLP DOI BibTeX RDF |
|
43 | Peter Buneman, Susan B. Davidson, Wenfei Fan, Carmem S. Hara, Wang Chiew Tan |
Reasoning about Keys for XML. |
DBPL |
2001 |
DBLP DOI BibTeX RDF |
|
43 | Eiji Okamoto, K. Nakamura |
Lifetimes of Keys in Cryptographic Key Management Systems. |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
|
42 | Ehab S. Elmallah, Mohamed G. Gouda, Sandeep S. Kulkarni |
Logarithmic keying. |
ACM Trans. Auton. Adapt. Syst. |
2008 |
DBLP DOI BibTeX RDF |
keying scheme, Secure communications, symmetric keys |
42 | Mohamed G. Gouda, Sandeep S. Kulkarni, Ehab S. Elmallah |
Logarithmic Keying of Communication Networks. |
SSS |
2006 |
DBLP DOI BibTeX RDF |
keying scheme, Secure communications, symmetric keys |
41 | Gianni Franceschini, Roberto Grossi |
No Sorting? Better Searching! |
FOCS |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Benny Pinkas |
Efficient State Updates for Key Management. |
Digital Rights Management Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
41 | Tok Wang Ling, Ge Yu 0001, Jiaheng Lu, Wei Wang 0011 (eds.) |
Proceedings of the Third International Workshop on Keyword Search on Structured Data, KEYS 2012, Scottsdale, AZ, USA, May 20, 2012 |
KEYS |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Rajvardhan Patil, Zhengxin Chen |
STRUCT: incorporating contextual information for English query search on relational databases. |
KEYS |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Jaime Iván López-Veyna, Víctor Jesús Sosa Sosa, Ivan López-Arévalo |
KESOSD: keyword search over structured data. |
KEYS |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Carlos Garcia-Alvarado, Carlos Ordonez 0001 |
Integrating and querying source code of programs working on a database. |
KEYS |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Sina Fakhraee, Farshad Fotouhi |
DBSemSXplorer: semantic-based keyword search system over relational databases for knowledge discovery. |
KEYS |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Cong Yu 0001 |
Towards a high quality and web-scalable table search engine. |
KEYS |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Hany Azzam, Sirvan Yahyaei, Marco Bonzanini, Thomas Roelleke |
A schema-driven approach for knowledge-oriented retrieval and query formulation. |
KEYS |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Aggeliki Dimitriou, Dimitri Theodoratos |
Efficient keyword search on large tree structured datasets. |
KEYS |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Yufei Tao 0001 |
Theoretical results on keyword search and related problems. |
KEYS |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Zhong Zeng, Zhifeng Bao, Tok Wang Ling, Mong-Li Lee |
iSearch: an interpretation based framework for keyword search in relational databases. |
KEYS |
2012 |
DBLP DOI BibTeX RDF |
|
41 | Yong Zeng, Zhifeng Bao, Tok Wang Ling, Luochen Li |
MALEX: a MAp-like exploration model on XML database. |
KEYS |
2012 |
DBLP DOI BibTeX RDF |
|
41 | |
Proceedings of the Second International Workshop on Keyword Search on Structured Data, KEYS 2010, Indianapolis, Indiana, USA, June 6, 2010 |
KEYS |
2010 |
DBLP DOI BibTeX RDF |
|
41 | Truls Amundsen Bjørklund, Michaela Götz, Johannes Gehrke |
Search in social networks with access control. |
KEYS |
2010 |
DBLP DOI BibTeX RDF |
|
41 | Carlos Garcia-Alvarado, Carlos Ordonez 0001 |
Keyword search across databases and documents. |
KEYS |
2010 |
DBLP DOI BibTeX RDF |
|
41 | Carlos Garcia-Alvarado, Carlos Ordonez 0001, Zhibo Chen 0002 |
Query recommendation in digital libraries using OLAP. |
KEYS |
2010 |
DBLP DOI BibTeX RDF |
|
41 | Joel Coffman, Alfred C. Weaver |
Structured data retrieval using cover density ranking. |
KEYS |
2010 |
DBLP DOI BibTeX RDF |
|
41 | Ilaria Bartolini, Paolo Ciaccia |
Multi-dimensional keyword-based image annotation and search. |
KEYS |
2010 |
DBLP DOI BibTeX RDF |
|
41 | Hannah Bast, Marjan Celikik |
Efficient two-sided error-tolerant search. |
KEYS |
2010 |
DBLP DOI BibTeX RDF |
|
41 | M. Tamer Özsu, Yi Chen, Lei Chen 0002 (eds.) |
Proceedings of the First International Workshop on Keyword Search on Structured Data, KEYS 2009, Providence, Rhode Island, USA, June 28, 2009 |
KEYS |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Elena Demidova, Irina Oelze, Peter Fankhauser |
Do we mean the same?: disambiguation of extracted keyword queries for database search. |
KEYS |
2009 |
DBLP DOI BibTeX RDF |
extracted keyword queries, keyword disambiguation |
41 | Xiaohui Yu 0001, Huxia Shi |
Query segmentation using conditional random fields. |
KEYS |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Ken Q. Pu |
Keyword query cleaning using hidden Markov models. |
KEYS |
2009 |
DBLP DOI BibTeX RDF |
query cleaning, segmentation, hidden Markov models, keyword search |
41 | Surajit Chaudhuri |
Structured data and web documents: better together? |
KEYS |
2009 |
DBLP DOI BibTeX RDF |
World Wide Web (WWW) |
41 | Shiyuan Wang, Jun'ichi Tatemura, Arsany Sawires, Oliver Po, Divyakant Agrawal, Amr El Abbadi |
Hierarchical result views for keyword queries over relational databases. |
KEYS |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Jiaheng Lu, Zhifeng Bao, Tok Wang Ling, Xiaofeng Meng 0001 |
XML keyword query refinement. |
KEYS |
2009 |
DBLP DOI BibTeX RDF |
XML, keyword search, query refinement |
41 | Arash Termehchy, Marianne Winslett |
Generic and effective semi-structured keyword search. |
KEYS |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Tommy Ellkvist, Lena Strömbäck, Lauro Didier Lins, Juliana Freire |
A first study on strategies for generating workflow snippets. |
KEYS |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Rares Vernica, Chen Li 0001 |
Efficient top-k algorithms for fuzzy search in string collections. |
KEYS |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Carlos Garcia-Alvarado, Carlos Ordonez 0001, Zhibo Chen 0002 |
DBDOC: querying and browsing databases and interrelated documents. |
KEYS |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Ron Avnur |
Building search applications with Marklogic Server. |
KEYS |
2009 |
DBLP DOI BibTeX RDF |
XML |
41 | Shady Elbassuoni, Maya Ramanath, Gerhard Weikum |
Language-model-based ranking in entity-relation graphs. |
KEYS |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Luis Gravano |
Querying text databases and the web: beyond traditional keyword search. |
KEYS |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Kiyoshi Yanagimoto, Takaaki Hasegawa, Makoto Takano |
A New Encoding Approach Realizing High Security and High Performance Based on Double Common Encryption Using Static Keys and Dynamic Keys. |
APNOMS |
2006 |
DBLP DOI BibTeX RDF |
Common key encryption, Security, Network security, Database security |
39 | Subhamoy Maitra, Santanu Sarkar 0001 |
Revisiting Wiener's Attack - New Weak Keys in RSA. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, RSA, Factorization, Weak Keys |
39 | Dhilak Damodaran, Rohit Singh 0004, Phu Dung Le |
Group Key Management in Wireless Networks Using Session Keys. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
Forward and Backward Secrecy, Multicast, Wireless, Portable, Group Key, Session Keys |
39 | Michal Ren, Tanmoy Kanti Das, Jianying Zhou 0001 |
Diverging Keys in Wireless Sensor Networks. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Node Compromise Attack, Diverging Keys, Sensor Network Security |
39 | Aviel D. Rubin |
Extending NCP for protocols using public keys. |
ICCCN |
1995 |
DBLP DOI BibTeX RDF |
nonmonotonic cryptographic protocols, asymmetric keys, update function, principals, binding requirements, public key protocol, protocols, certificates, inference rules |
38 | Caimei Wang, Zhengmao Li |
Self-selecting Sub-secret Keys Sharing Scheme Based on Polynomials over Elliptic Curve. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Sven Hartmann, Sebastian Link |
Expressive, yet tractable XML keys. |
EDBT |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Yi-Ru Liu, Wen-Guey Tzeng |
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
Broadcast encryption, collusion, polynomial interpolation |
38 | Orhun Kara, Cevat Manap |
A New Class of Weak Keys for Blowfish. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Blowfish, key dependent S-Box, self similarity analysis, cryptanalysis, fixed point, weak key, reflection attack |
38 | Sven Hartmann, Sebastian Link |
Unlocking Keys for XML Trees. |
ICDT |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Aggelos Kiayias, Serdar Pehlivanoglu |
Pirate Evolution: How to Make the Most of Your Traitor Keys. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Wai Kuan Yip, Alwyn Goh, David Ngo Chek Ling, Andrew Teoh Beng Jin |
Generation of Replaceable Cryptographic Keys from Dynamic Handwritten Signatures. |
ICB |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Joan Daemen, René Govaerts, Joos Vandewalle |
Weak Keys for IDEA. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
38 | Marc Girault |
Self-Certified Public Keys. |
EUROCRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
36 | Hector Ouilhet |
Google Sky Map: using your phone as an interface. |
Mobile HCI |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Muhammad J. Bohio, Ali Miri |
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network. |
CNSR |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Ranjan Sinha |
Using Compact Tries for Cache-Efficient Sorting of Integers. |
WEA |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Marcelo Arenas, Wenfei Fan, Leonid Libkin |
On Verifying Consistency of XML Specifications. (PDF / PS) |
PODS |
2002 |
DBLP DOI BibTeX RDF |
XML |
36 | Rolf Blom |
An Optimal Class of Symmetric Key Generation Systems. |
EUROCRYPT |
1984 |
DBLP DOI BibTeX RDF |
|
35 | Martin Necaský, Irena Mlýnková |
Discovering XML keys and foreign keys in queries. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
XML schema, integrity constraints, DTD, schema inference |
35 | Luca Cabibbo |
On keys, foreign keys and nullable attributes in relational mapping systems. |
EDBT |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Steve Mann 0001 |
"fl Huge UId streams": fountains that are keyboards with nozzle spray as keys that give rich tactile feedback and are more expressive and more fun than plastic keys. |
ACM Multimedia |
2005 |
DBLP DOI BibTeX RDF |
FUNtain, computer mediated reality, direct user interfaces, frolic in the fountains, funits (units of fun), poseidophone, water-based immersive multimedia, immersive, fluid-user-interfaces |
34 | Waraporn Viyanon, Sanjay Kumar Madria |
XML-SIM: Structure and Content Semantic Similarity Detection Using Keys. |
OTM Conferences (2) |
2009 |
DBLP DOI BibTeX RDF |
XML Similarity Detection, clustering, matching, keys |
34 | David Toman 0001, Grant E. Weddell |
On Keys and Functional Dependencies as First-Class Citizens in Description Logics. |
J. Autom. Reason. |
2008 |
DBLP DOI BibTeX RDF |
Path-functional dependency, Relational keys, Description logics |
34 | Waraporn Viyanon, Sanjay Kumar Madria, Sourav S. Bhowmick |
XML Data Integration Based on Content and Structure Similarity Using Keys. |
OTM Conferences (1) |
2008 |
DBLP DOI BibTeX RDF |
clustering, XML, Similarity, keys |
34 | Heiko Stamer |
Completion Attacks and Weak Keys of Oleshchuk's Public Key Cryptosystem. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
completion attack, Knuth-Bendix completion, Cryptanalysis, weak keys, Church-Rosser property, string-rewriting systems |
34 | Tzu-Chiang Chiang, Yueh-Min Huang |
Group Keys and the Multicast Security in Ad Hoc Networks. |
ICPP Workshops |
2003 |
DBLP DOI BibTeX RDF |
Prüfer, ad hoc networks, network security, multicast routing, group keys |
33 | Cleopas O. Angaye, Paul S. Fisher |
Application of FI sequences for authentication in a network. |
ACM Southeast Regional Conference |
2007 |
DBLP DOI BibTeX RDF |
finite induction, private keys, security, public keys |
33 | Stefan Katzenbeisser 0001, Klaus Kursawe, Frederic Stumpf |
Revocation of TPM Keys. |
TRUST |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Christopher James Hargreaves, Howard Chivers |
Recovery of Encryption Keys from Memory Using a Linear Scan. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Live Forensics, Encryption, Digital Evidence, Forensic Computing |
33 | Xianping Wu, Phu Dung Le, Balasubramaniam Srinivasan 0002 |
Dynamic Keys Based Sensitive Information System. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Fang Fang, Robert L. Grossman, Xiangjun Liu |
An Algorithm for Assigning Unique Keys to Metabolic Pathways. |
BIBM |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Gicheol Wang, Dongsun Park |
Utilizing Secure Three Hop Links to Agree Pairwise Keys in Wireless Sensor Networks. |
UIC |
2006 |
DBLP DOI BibTeX RDF |
|
33 | John Patrick McGregor, Ruby B. Lee |
Protecting cryptographic keys and computations via virtual secure coprocessing. |
SIGARCH Comput. Archit. News |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle |
A Note on Weak Keys of PES, IDEA, and Some Extended Variants. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Peeter Laud, Ricardo Corin |
Sound Computational Interpretation of Formal Encryption with Composed Keys. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Heejin Park, Kunsoo Park, Yookun Cho |
Deleting Keys of B-trees in Parallel. |
IPDPS |
2002 |
DBLP DOI BibTeX RDF |
balanced search trees, dictionary operations, parallel algorithms, B-trees |
33 | Horst H. von Brand |
On the Distribution of Keys by Hashing. |
SCCC |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Wenfei Fan, Peter Schwenzer, Kun Wu |
Keys with Upward Wildcards for XML. |
DEXA |
2001 |
DBLP DOI BibTeX RDF |
|
33 | Adi Shamir, Nicko van Someren |
Playing "Hide and Seek" with Stored Keys. |
Financial Cryptography |
1999 |
DBLP DOI BibTeX RDF |
lunchtime attacks, authenticode, key hiding, Cryptanalysis, RSA |
33 | Raymond Fadous, John Forsyth |
Finding Candidate Keys for Relational Data Bases. |
SIGMOD Conference |
1975 |
DBLP DOI BibTeX RDF |
|
32 | Moti Yung |
How to Guard the Guards Themselves. |
FCT |
2009 |
DBLP DOI BibTeX RDF |
Key Evolving Cryptosystems, Proactive Cryptosystems, Public Key cryptography, Attacks, Leakage, Countermeasures, Physical Security, Threshold cryptosystems, Cryptographic Keys |
32 | Cristina Marinescu |
Discovering the Objectual Meaning of Foreign Key Constraints in Enterprise Applications. |
WCRE |
2007 |
DBLP DOI BibTeX RDF |
foreign keys, RDBMS model, object-oriented model, enterprise applications, data reverse engineering |
32 | Jixue Liu, Millist W. Vincent, Chengfei Liu |
Local XML functional dependencies. |
WIDM |
2003 |
DBLP DOI BibTeX RDF |
local functional dependency, relative keys, XML |
32 | Goce Jakimoski, Yvo Desmedt |
Related-Key Differential Cryptanalysis of 192-bit Key AES Variants. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
related keys, Markov ciphers, Advanced Encryption Standard, Differential cryptanalysis |
32 | Yingjiu Li, Vipin Swarup, Sushil Jajodia |
Constructing a virtual primary key for fingerprinting relational data. |
Digital Rights Management Workshop |
2003 |
DBLP DOI BibTeX RDF |
primary keys, robustness, relational databases, fingerprinting |
32 | Krisztián Tichler |
Extremal Theorems for Databases. |
FoIKS |
2002 |
DBLP DOI BibTeX RDF |
antikeys, labelled directed tree, extremal problems, cliques, keys, maximal independent sets, relational database model |
32 | Alex Biryukov, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle |
New Weak-Key Classes of IDEA. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
IDEA cipher, weak keys, NESSIE, boomerang attack |
Displaying result #1 - #100 of 4919 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|