Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

2543 Publications


2016 | Conference Paper | IST-REx-ID: 1227 | OA
Kong H, Bartocci E, Bogomolov S, Grosu R, Henzinger TA, Jiang Y, Schilling C. 2016. Discrete abstraction of multiaffine systems. HSB: Hybrid Systems Biology, LNCS, vol. 9957, 128–144.
View | Files available | DOI
 

2016 | Conference Paper | IST-REx-ID: 1229 | OA
Abusalah HM, Fuchsbauer G, Pietrzak KZ. 2016. Offline witness encryption. ACNS: Applied Cryptography and Network Security, LNCS, vol. 9696, 285–303.
View | Files available | DOI
 

2016 | Conference Paper | IST-REx-ID: 1230 | OA
Daca P, Gupta A, Henzinger TA. 2016. Abstraction-driven concolic testing. VMCAI: Verification, Model Checking and Abstract Interpretation, LNCS, vol. 9583, 328–347.
View | Files available | DOI | Download Preprint (ext.)
 

2016 | Conference Paper | IST-REx-ID: 1231 | OA
Alwen JF, Chen B, Kamath Hosdurg C, Kolmogorov V, Pietrzak KZ, Tessaro S. 2016. On the complexity of scrypt and proofs of space in the parallel random oracle model. EUROCRYPT: Theory and Applications of Cryptographic Techniques, LNCS, vol. 9666, 358–387.
View | DOI | Download Submitted Version (ext.)
 

2016 | Conference Paper | IST-REx-ID: 1233 | OA
Fuchsbauer G, Heuer F, Kiltz E, Pietrzak KZ. 2016. Standard security does imply security against selective opening for markov distributions. TCC: Theory of Cryptography Conference, LNCS, vol. 9562, 282–305.
View | DOI | Download Submitted Version (ext.)
 

2016 | Conference Paper | IST-REx-ID: 1234 | OA
Daca P, Henzinger TA, Kretinsky J, Petrov T. 2016. Faster statistical model checking for unbounded temporal properties. TACAS: Tools and Algorithms for the Construction and Analysis of Systems, LNCS, vol. 9636, 112–129.
View | Files available | DOI | Download Preprint (ext.)
 

2016 | Conference Paper | IST-REx-ID: 1235 | OA
Abusalah HM, Fuchsbauer G. 2016. Constrained PRFs for unbounded inputs with short keys. ACNS: Applied Cryptography and Network Security, LNCS, vol. 9696, 445–463.
View | Files available | DOI | Download Submitted Version (ext.)
 

2016 | Conference Paper | IST-REx-ID: 1236 | OA
Abusalah HM, Fuchsbauer G, Pietrzak KZ. 2016. Constrained PRFs for unbounded inputs. CT-RSA: Topics in Cryptology, LNCS, vol. 9610, 413–428.
View | Files available | DOI
 

2016 | Journal Article | IST-REx-ID: 1238 | OA
von Wangenheim D, Rosero A, Komis G, Šamajová O, Ovečka M, Voigt B, Šamaj J. 2016. Endosomal interactions during root hair growth. Frontiers in Plant Science. 6(JAN2016), 1262.
View | Files available | DOI
 

2016 | Journal Article | IST-REx-ID: 1240 | OA
Kornienko A, Dotter C, Guenzl P, Gisslinger H, Gisslinger B, Cleary C, Kralovics R, Pauler F, Barlow D. 2016. Long non-coding RNAs display higher natural expression variation than protein-coding genes in healthy humans. Genome Biology. 17(1), 14.
View | Files available | DOI
 

Filters and Search Terms

oa=1

extern<>1

Search

Filter Publications