Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

24 Publications


2021 | Conference Paper | IST-REx-ID: 10041 | OA
Kamath Hosdurg C, Klein K, Pietrzak KZ, Wichs D. 2021. Limits on the Adaptive Security of Yao’s Garbling. 41st Annual International Cryptology Conference, Part II . CRYPTO: Annual International Cryptology Conference, Lecture Notes in Computer Science, vol. 12826, 486–515.
View | DOI | Download Preprint (ext.)
 

2020 | Conference Paper | IST-REx-ID: 7966 | OA
Auerbach B, Giacon F, Kiltz E. 2020. Everybody’s a target: Scalability in public-key encryption. Advances in Cryptology – EUROCRYPT 2020. EUROCRYPT: Theory and Applications of Cryptographic Techniques, LNCS, vol. 12107, 475–506.
View | DOI | Download Submitted Version (ext.)
 

2020 | Conference Paper | IST-REx-ID: 8195 | OA
Kragl B, Qadeer S, Henzinger TA. 2020. Refinement for structured concurrent programs. Computer Aided Verification. , LNCS, vol. 12224, 275–298.
View | Files available | DOI
 

2020 | Conference Paper | IST-REx-ID: 8623 | OA
Henzinger TA, Sarac NE. 2020. Monitorability under assumptions. Runtime Verification. RV: Runtime Verification, LNCS, vol. 12399, 3–18.
View | Files available | DOI
 

2020 | Conference Paper | IST-REx-ID: 8732
Arroyo Guevara AM, Klute F, Parada I, Seidel R, Vogtenhuber B, Wiedera T. 2020. Inserting one edge into a simple drawing is hard. Graph-Theoretic Concepts in Computer Science. WG: Workshop on Graph-Theoretic Concepts in Computer Science, LNCS, vol. 12301, 325–338.
View | DOI
 

2020 | Conference Paper | IST-REx-ID: 8728 | OA
Asadi A, Chatterjee K, Goharshady AK, Mohammadi K, Pavlogiannis A. 2020. Faster algorithms for quantitative analysis of MCs and MDPs with small treewidth. Automated Technology for Verification and Analysis. ATVA: Automated Technology for Verification and Analysis, LNCS, vol. 12302, 253–270.
View | Files available | DOI
 

2019 | Conference Paper | IST-REx-ID: 7411 | OA
Abusalah HM, Kamath Hosdurg C, Klein K, Pietrzak KZ, Walter M. 2019. Reversible proofs of sequential work. Advances in Cryptology – EUROCRYPT 2019. International Conference on the Theory and Applications of Cryptographic Techniques, LNCS, vol. 11477, 277–291.
View | DOI | Download Submitted Version (ext.)
 

2019 | Book Chapter | IST-REx-ID: 7453 | OA
Alur R, Giacobbe M, Henzinger TA, Larsen KG, Mikučionis M. 2019.Continuous-time models for system design and analysis. In: Computing and Software Science. LNCS, vol. 10000, 452–477.
View | DOI | Download Published Version (ext.)
 

2019 | Conference Paper | IST-REx-ID: 6163
Biswas R, Largeteau-Skapin G, Zrour R, Andres E. 2019. Rhombic dodecahedron grid—coordinate system and 3D digital object definitions. Lecture Notes in Computer Science. DGCI: International Conference on Discrete Geometry for Computer Imagery, LNCS, vol. 11414, 27–37.
View | DOI
 

2019 | Conference Paper | IST-REx-ID: 6482 | OA
Sun R, Lampert C. 2019. KS(conf): A light-weight test if a ConvNet operates outside of Its specifications. GCPR: Conference on Pattern Recognition, LNCS, vol. 11269, 244–259.
View | Files available | DOI | Download Preprint (ext.) | arXiv
 

2019 | Book Chapter | IST-REx-ID: 6726 | OA
Walter M. 2019.Sampling the integers with low relative error. In: Progress in Cryptology – AFRICACRYPT 2019. vol. 11627, 157–180.
View | DOI | Download Preprint (ext.)
 

2018 | Conference Paper | IST-REx-ID: 8298
Androulaki E, Cachin C, De Caro A, Kokoris Kogias E. 2018. Channels: Horizontal scaling and confidentiality on permissioned blockchains. Computer Security. ESORICS: European Symposium on Research in Computer Security, LNCS, vol. 11098, 111–131.
View | DOI
 

2018 | Conference Paper | IST-REx-ID: 6164
Koshti G, Biswas R, Largeteau-Skapin G, Zrour R, Andres E, Bhowmick P. 2018. Sphere construction on the FCC grid interpreted as layered hexagonal grids in 3D. Lecture Notes in Computer Science. IWCIA: International Workshop on Combinatorial Image Analysis, LNCS, vol. 11255, 82–96.
View | DOI
 

2018 | Conference Paper | IST-REx-ID: 6941 | OA
Park S, Kwon A, Fuchsbauer G, Gazi P, Alwen JF, Pietrzak KZ. 2018. SpaceMint: A cryptocurrency based on proofs of space. 22nd International Conference on Financial Cryptography and Data Security. FC: Financial Cryptography and Data Security, LNCS, vol. 10957, 480–499.
View | DOI | Download Submitted Version (ext.)
 

2017 | Conference Paper | IST-REx-ID: 5801
Dwivedi S, Gupta A, Roy S, Biswas R, Bhowmick P. 2017. Fast and Efficient Incremental Algorithms for Circular and Spherical Propagation in Integer Space. 10502, 347–359.
View | DOI
 

2017 | Conference Paper | IST-REx-ID: 5802
Andres E, Biswas R, Bhowmick P. 2017. Digital Primitives Defined by Weighted Focal Set. 10502, 388–398.
View | DOI
 

2017 | Book Chapter | IST-REx-ID: 5803
Biswas R, Bhowmick P. 2017.Construction of Persistent Voronoi Diagram on 3D Digital Plane. In: Combinatorial image analysis. vol. 10256, 93–104.
View | DOI
 

2016 | Book Chapter | IST-REx-ID: 5805
Sen N, Biswas R, Bhowmick P. 2016.On Some Local Topological Properties of Naive Discrete Sphere. In: Computational Topology in Image Context. vol. 9667, 253–264.
View | DOI
 

2016 | Conference Paper | IST-REx-ID: 5806
Biswas R, Bhowmick P. 2016. On Functionality of Quadraginta Octants of Naive Sphere with Application to Circle Drawing. Discrete Geometry for Computer Imagery. DGCI: International Conference on Discrete Geometry for Computer ImageryLecture Notes in Computer Science vol. 9647, 256–267.
View | DOI
 

2016 | Book Chapter | IST-REx-ID: 5809
Biswas R, Bhowmick P, Brimkov VE. 2016.On the Connectivity and Smoothness of Discrete Spherical Circles. In: Combinatorial image analysis. vol. 9448, 86–100.
View | DOI
 

Filters and Search Terms

issn=1611-3349

Search

Filter Publications