Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/cans/cans2005.bht:"
@inproceedings{DBLP:conf/cans/AndoT05, author = {Ruo Ando and Yoshiyasu Takefuji}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {85--95}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_8}, doi = {10.1007/11599371\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/AndoT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/BaoCQ05, author = {Haiyong Bao and Zhenfu Cao and Haifeng Qian}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {26--34}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_3}, doi = {10.1007/11599371\_3}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/BaoCQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/CimatoGGMT05, author = {Stelvio Cimato and Clemente Galdi and Raffaella Giordano and Barbara Masucci and Gildo Tomasco}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {Design and Implementation of an Inline Certified E-mail Service}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {186--199}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_16}, doi = {10.1007/11599371\_16}, timestamp = {Thu, 01 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/CimatoGGMT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/CurtmolaSA05, author = {Reza Curtmola and Aniello Del Sorbo and Giuseppe Ateniese}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {On the Performance and Analysis of {DNS} Security Extensions}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {288--303}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_24}, doi = {10.1007/11599371\_24}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/CurtmolaSA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/GaoY05, author = {Chong{-}zhi Gao and Zheng{-}an Yao}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {How to Authenticate Real Time Streams Using Improved Online/Offline Signatures}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {134--146}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_12}, doi = {10.1007/11599371\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/GaoY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/GuFH05, author = {Limin Gu and Yanmei Fang and Jiwu Huang}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {Revaluation of Error Correcting Coding in Watermarking Channel}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {274--287}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_23}, doi = {10.1007/11599371\_23}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/GuFH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/HuWCL05, author = {Yuh{-}Hua Hu and Lih{-}Chung Wang and Chun{-}yen Chou and Feipei Lai}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {Similar Keys of Multivariate Quadratic Public Key Cryptosystems}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {211--222}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_18}, doi = {10.1007/11599371\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/HuWCL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/HuangCW05, author = {Zhenjie Huang and Kefei Chen and Yumin Wang}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {Efficient Identity-Based Signatures and Blind Signatures}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {120--133}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_11}, doi = {10.1007/11599371\_11}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/HuangCW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/HuangSMZ05, author = {Xinyi Huang and Willy Susilo and Yi Mu and Futai Zhang}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {On the Security of Certificateless Signature Schemes from Asiacrypt 2003}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {13--25}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_2}, doi = {10.1007/11599371\_2}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/HuangSMZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/KeLW05, author = {Pinhui Ke and Tailin Liu and Qiao{-}Yan Wen}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {Constructions of Almost Resilient Functions}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {236--246}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_20}, doi = {10.1007/11599371\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/KeLW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/KongL05, author = {Fanyu Kong and Daxing Li}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {223--235}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_19}, doi = {10.1007/11599371\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/KongL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/LiLL05, author = {Tao Li and XiaoJie Liu and Hongbin Li}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {An Immune-Based Model for Computer Virus Detection}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {59--71}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_6}, doi = {10.1007/11599371\_6}, timestamp = {Sun, 30 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/LiLL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/LiLL05a, author = {Tao Li and XiaoJie Liu and Hongbin Li}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {A New Model for Dynamic Intrusion Detection}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {72--84}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_7}, doi = {10.1007/11599371\_7}, timestamp = {Sun, 30 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/LiLL05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/LuSHS05, author = {Liang Lu and Reihaneh Safavi{-}Naini and Jeffrey Horton and Willy Susilo}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {On Securing RTP-Based Streaming Content with Firewalls}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {304--319}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_25}, doi = {10.1007/11599371\_25}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/LuSHS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/LuT05, author = {Wei Lu and Issa Traor{\'{e}}}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {96--109}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_9}, doi = {10.1007/11599371\_9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/LuT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/OverlierBA05, author = {Lasse {\O}verlier and T{\o}nnes Brekne and Andr{\'{e}} {\AA}rnes}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {Non-expanding Transaction Specific Pseudonymization for {IP} Traffic Monitoring}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {261--273}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_22}, doi = {10.1007/11599371\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/OverlierBA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/PengDNOL05, author = {Kun Peng and Ed Dawson and Juanma Gonz{\'{a}}lez Nieto and Eiji Okamoto and Javier L{\'{o}}pez}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {A Novel Method to Maintain Privacy in Mobile Agent Applications}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {247--260}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_21}, doi = {10.1007/11599371\_21}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/PengDNOL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ShimS05, author = {Kyung{-}Ah Shim and Seung{-}Hyun Seo}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {Security Analysis of Password-Authenticated Key Agreement Protocols}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {49--58}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_5}, doi = {10.1007/11599371\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/ShimS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/WangC05, author = {Qin Wang and Zhenfu Cao}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {Two Proxy Signcryption Schemes from Bilinear Pairings}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {161--171}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_14}, doi = {10.1007/11599371\_14}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/WangC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/XiangZ05, author = {Yang Xiang and Wanlei Zhou}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {320--333}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_26}, doi = {10.1007/11599371\_26}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/XiangZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/XuZF05, author = {Jing Xu and Zhenfeng Zhang and Dengguo Feng}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {ID-Based Aggregate Signatures from Bilinear Pairings}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {110--119}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_10}, doi = {10.1007/11599371\_10}, timestamp = {Wed, 18 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/XuZF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/YoonY05, author = {Eun{-}Jun Yoon and Kee{-}Young Yoo}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {147--160}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_13}, doi = {10.1007/11599371\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/YoonY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/YuWZW05, author = {Hongbo Yu and Gaoli Wang and Guoyan Zhang and Xiaoyun Wang}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {The Second-Preimage Attack on {MD4}}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {1--12}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_1}, doi = {10.1007/11599371\_1}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/YuWZW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ZhangXF05, author = {Zhenfeng Zhang and Jing Xu and Dengguo Feng}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {Efficient Identity-Based Protocol for Fair Certified E-mail Delivery}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {200--210}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_17}, doi = {10.1007/11599371\_17}, timestamp = {Wed, 18 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/ZhangXF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ZhouCL05, author = {Yuan Zhou and Zhenfu Cao and Rongxing Lu}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {Constructing Secure Warrant-Based Proxy Signcryption Schemes}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {172--185}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_15}, doi = {10.1007/11599371\_15}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/ZhouCL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/Zhu05, author = {Wen Tao Zhu}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {Cryptanalysis of Two Group Key Management Protocols for Secure Multicast}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {35--48}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_4}, doi = {10.1007/11599371\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/Zhu05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ZhuWHL05, author = {Xian Zhu and Shaobin Wang and Fan Hong and Junguo Liao}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {334--348}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_27}, doi = {10.1007/11599371\_27}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/ZhuWHL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cans/2005, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371}, doi = {10.1007/11599371}, isbn = {3-540-30849-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.