The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Merkle with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1978-1982 (15) 1984-1993 (15) 1994-1997 (19) 1998-2000 (22) 2001 (18) 2002 (22) 2003 (17) 2004 (23) 2005 (33) 2006 (44) 2007 (35) 2008 (57) 2009 (49) 2010 (32) 2011 (25) 2012 (21) 2013 (30) 2014 (26) 2015 (17) 2016 (28) 2017 (37) 2018 (44) 2019 (54) 2020 (52) 2021 (61) 2022 (51) 2023 (51) 2024 (7)
Publication types (Num. hits)
article(387) book(1) incollection(9) inproceedings(492) phdthesis(9) proceedings(7)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 252 occurrences of 153 keywords

Results
Found 944 publication records. Showing 905 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
91Gilles Brassard, Louis Salvail Quantum Merkle Puzzles. Search on Bibsonomy ICQNM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Merkle Puzzles, Public Key Distribution, Quantum Cryptography
78Kan Yasuda How to Fill Up Merkle-Damgård Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Merkle-Damgård, second-preimage resistance, one-wayness, hash function, padding
78Johannes Buchmann 0001, Erik Dahmen, Elena Klintsevich, Katsuyuki Okeya, Camille Vuillaume Merkle Signatures with Virtually Unlimited Signature Capacity. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SSL, post-quantum cryptography, Merkle signatures
78Attila Altay Yavuz, Emin Anarim, Fatih Alagöz Improved Merkle Cryptosystem (IMC). Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Merkle Cryptosystem, Cryptography, Encryption, Key Establishment
78Michael Szydlo Merkle Tree Traversal in Log Space and Time. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF authentication path, tail zipping, fractal traversal, binary tree, pebbling, Merkle tree, amortization
71Johannes Buchmann 0001, Erik Dahmen, Michael Schneider 0002 Merkle Tree Traversal Revisited. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication path computation, Merkle tree traversal, digital signatures, post-quantum cryptography, Merkle signatures
65Kan Yasuda Boosting Merkle-Damgård Hashing for Message Authentication. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Merkle-Damgård, hash function, message authentication code, mode of operation, HMAC, related-key attack, pseudo-random function, compression function, NMAC
65Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Merkle-Damgård construction, MBCA, 3C, 3C+
65Johannes Buchmann 0001, Luis Carlos Coronado García, Erik Dahmen, Martin Döring, Elena Klintsevich CMSS - An Improved Merkle Signature Scheme. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Java Cryptography Architecture, Post-Quantum Signatures, Tree Authentication, One-Time-Signatures, Merkle Signatures
65Mizuhito Ogawa, Eiichi Horita, Satoshi Ono Proving Properties of Incremental Merkle Trees. Search on Bibsonomy CADE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF temporal authentication, theorem prover, Merkle tree
65Markus Jakobsson, Frank Thomson Leighton, Silvio Micali, Michael Szydlo Fractal Merkle Tree Representation and Traversal. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF authentication, fractal, Merkle tree, Amortization
59Eli Biham, Yaron J. Goren, Yuval Ishai Basing Weak Public-Key Cryptography on Strong One-Way Functions. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Merkle’s puzzles, quantum computing, Public-key cryptography, one-way functions, bounded storage model
59Sebastian Rohde, Thomas Eisenbarth 0001, Erik Dahmen, Johannes Buchmann 0001, Christof Paar Fast Hash-Based Signatures on Constrained Devices. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash based cryptography, Merkle signature scheme, digital signatures, Embedded security
59HongKi Lee, DaeHun Nyang, JooSeok Song Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sensor networks, authentication, aggregation, hash chain, Merkle tree
59Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton Salvaging Merkle-Damgård for Practical Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
59Brian Rogers, Siddhartha Chhabra, Milos Prvulovic, Yan Solihin Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly. Search on Bibsonomy MICRO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
59Dan Williams, Emin Gün Sirer Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees. Search on Bibsonomy NCA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
52Yusuke Naito 0001, Kazuki Yoneyama, Lei Wang 0031, Kazuo Ohta How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Indifferentiability, Merkle-Damgård hash function, Variants of Random Oracle, Cryptosystems Security
52Roberto J. Bayardo, Jeffrey S. Sorensen Merkle tree authentication of HTTP responses. Search on Bibsonomy WWW (Special interest tracks and posters) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF web content distribution, authenticity, merkle hash tree
52Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano Certificate revocation system implementation based on the Merkle hash tree. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Public-key infrastructure, Certificate revocation, Merkle hash tree
48Wolfgang Merkle, Nenad Mihailovic On the Construction of Effective Random Sets. Search on Bibsonomy MFCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
46Kan Yasuda "Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Merkle-Damgård, Envelope MAC, RFC1828, MAC, Hash Function, Message Authentication Code, HMAC, Compression Function
46Duo Lei, Chao Li Extended Multi-Property-Preserving and ECM-Construction. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Merkle-Damgård, almost uniform distribution, Hash functions, random oracle, pseudo random function, collision resistance
46Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou 0001 Authenticating Query Results in Data Publishing. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, data publishing, aggregated signature, merkle hash tree
46Palash Sarkar 0001, Paul J. Schellenberg A Parallel Algorithm for Extending Cryptographic Hash Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Merkle-Damgard construction, parallel algorithm, cryptographic hash function, collision resistance
46Josep Domingo-Ferrer Mobile Agent Route Protection through Hash-Based Mechanisms. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF agent route protection, Mobile agent security, Merkle trees, hash collisions
45Praveen Gauravaram, John Kelsey Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle Hashes from Generic Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45Lakshmi Santhanam, Bin Xie 0001, Dharma P. Agrawal Secure and efficient authentication in Wireless Mesh Networks using merkle trees. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45Daniel Joscák, Jirí Tuma Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damgård Construction. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multi-block collision attack, 3C and 3C+ constructions, hash functions
45Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya Merkle-Damgård Revisited: How to Construct a Hash Function. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
45Phong Q. Nguyen, Jacques Stern Merkle-Hellman Revisited: A Cryptanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
44Milan Merkle, Monica Moulin Ribeiro Merkle Krull's theory for the double gamma function. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
40Siddhartha Chhabra, Brian Rogers, Yan Solihin, Milos Prvulovic Making secure processors OS- and performance-friendly. Search on Bibsonomy ACM Trans. Archit. Code Optim. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Secure processor architectures, memory encryption, memory integrity verification, virtualization
38Hector Sanjuan, Samuli Poyhtari, Pedro Teixeira, Ioannis Psaras Merkle-CRDTs: Merkle-DAGs meet CRDTs. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
38Jehan-François Pâris, Thomas J. E. Schwarz Merkle Hash Grids Instead of Merkle Trees. Search on Bibsonomy MASCOTS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
33Markus Rückert Verifiably Encrypted Signatures from RSA without NIZKs. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Online contract signing, RSA, Merkle hash trees
33Rui Xue 0001, Ninghui Li, Jiangtao Li 0001 Algebraic Construction for Zero-Knowledge Sets. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF zero knowledge set, accumulator strong RSA assumption, random oracle, Merkle tree
33Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume Digital Signatures Out of Second-Preimage Resistant Hash Functions. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF second-preimage resistance, provable security, Merkle signatures
33Camille Vuillaume, Katsuyuki Okeya, Erik Dahmen, Johannes Buchmann 0001 Public Key Authentication with Memory Tokens. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF low-cost implementation, authentication, Merkle signatures
33David Bauer, Douglas M. Blough, David Cash Minimal information disclosure with efficiently verifiable credentials. Search on Bibsonomy Digital Identity Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash-tree, identity assertion, privacy, PKI, identity management, credential, merkle tree
33Christophe Tartary, Huaxiong Wang, Josef Pieprzyk An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Unsecured Channel, Erasure Code, Stream Authentication, Merkle Hash Tree, Polynomial Reconstruction
33Reouven Elbaz, David Champagne, Ruby B. Lee, Lionel Torres, Gilles Sassatelli, Pierre Guillemin TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Memory Integrity, Physical Attacks, Tamper Evidence, Parallelizability, Confidentiality, Replay Attacks, Merkle Trees
33Mihir Bellare, Thomas Ristenpart Multi-Property-Preserving Hash Domain Extension and the EMD Transform. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Merkle-Damgård, Hash functions, random oracle, pseudorandom function, collision-resistance
33Wenliang Du, Ronghua Wang, Peng Ning An efficient scheme for authenticating public keys in sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2005 DBLP  DOI  BibTeX  RDF deployment knowledge, wireless sensor networks, public key, merkle tree
33Markus Jakobsson, Susanne Wetzel Efficient attribute authentication with applications to ad hoc networks. Search on Bibsonomy Vehicular Ad Hoc Networks The full citation details ... 2004 DBLP  DOI  BibTeX  RDF attribute authority, hash graphs, light-weight, spatial Merkle tree, cryptography, recommendation, certificate
33Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong Shao A flexible and scalable authentication scheme for JPEG2000 image codestreams. Search on Bibsonomy ACM Multimedia The full citation details ... 2003 DBLP  DOI  BibTeX  RDF message digest, authentication, data integrity, digital signature, image compression, JPEG2000, one-way hash function, merkle hash tree
33Markus Jakobsson, David Pointcheval, Adam L. Young Secure Mobile Gambling. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Merkle, publicly verifiable, robust, Fair, lightweight, gambling
32 Merkle Hash Trees. Search on Bibsonomy Encyclopedia of Database Systems The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Elena Andreeva 0001, Charles Bouillaguet, Orr Dunkelman, John Kelsey Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Herding attack, Trojan message attack, Zipper hash, Concatenated hash, Tree hash, Second preimage attack
32Boaz Barak, Mohammad Mahmoody-Ghidary Merkle Puzzles Are Optimal - An O(n2)-Query Attack on Any Key Exchange from a Random Oracle. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Emmanuel Bresson, Benoît Chevallier-Mames, Christophe Clavier, Aline Gouget, Pascal Paillier, Thomas Peyrin How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Fabien Coelho An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol Based on Merkle Trees. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Shoichi Hirose, Je Hong Park, Aaram Yun A Simple Variant of the Merkle-Damgård Scheme with a Permutation. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Jose L. Muñoz, Jordi Forné, Oscar Esparza, Manel Rey Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT). Search on Bibsonomy TrustBus The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Bruce Christianson, David Wheeler Merkle Puzzles Revisited - Finding Matching Elements Between Lists. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
32J. C. Lagarias 0001 Performance Analysis of Shamir's Attack on the Basic Merkle-Hellman Knapsack Cryptosystem. Search on Bibsonomy ICALP The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
26Jonathan J. Hoch, Adi Shamir On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptographic combiners, indifferentiability, hash functions
26Viet Hung Nguyen, Tran Khanh Dang, Nguyen Thanh Son, Josef Küng Query Assurance Verification for Dynamic Outsourced XML Databases. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Yevgeniy Dodis, Krzysztof Pietrzak Improving the Security of MACs Via Randomized Message Preprocessing. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26John Kelsey, Tadayoshi Kohno Herding Hash Functions and the Nostradamus Attack. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26William Eric Hall, Charanjit S. Jutla Parallelizable Authentication Trees. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26John Kelsey, Bruce Schneier Second Preimages on n-Bit Hash Functions for Much Less than 2n Work. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Phong Q. Nguyen, Igor E. Shparlinski On the Insecurity of a Server-Aided RSA Protocol. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Server-aided protocol, Cryptanalysis, Lattices, RSA signature
26Josef Pieprzyk On Public-Key Cryptosystems Built using Polynomial Rings. Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
26P. Schöbe, James L. Massey Fast Authentication in a Trapdoor - Knapsack Public Key Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
22Jan Thomas Jung, Dominik Merkle, Alexander Reiterer Automated Camera Pose Generation for High-Resolution 3D Reconstruction of Bridges by Unmanned Aerial Vehicles. Search on Bibsonomy Remote. Sens. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Dominik Merkle, Alexander Reiterer Automated Method for SLAM Evaluation in GNSS-Denied Areas. Search on Bibsonomy Remote. Sens. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Christian Rathgeb, Johannes Merkle, Benjamin Tams, Matthias Neu, Ulrike Korte Multi-biometrische Kryptosysteme. Search on Bibsonomy Datenschutz und Datensicherheit The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Laurent Bienvenu, Valentino Delle Rose, Wolfgang Merkle Relativized depth. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Dominik Merkle, Johannes Solass, Annette Schmitt, Julia Rosin, Alexander Reiterer, Alexander Stolz Semi-automatic 3D crack map generation and width evaluation for structural monitoring of reinforced concrete structures. Search on Bibsonomy J. Inf. Technol. Constr. The full citation details ... 2023 DBLP  BibTeX  RDF
22Roland Rauter, Martin Nocker, Florian Merkle, Pascal Schöttle On the Effect of Adversarial Training Against Invariance-based Adversarial Examples. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Christian Rathgeb, Benjamin Tams, Johannes Merkle, Vanessa Nesterowicz, Ulrike Korte, Matthias Neu Multi-Biometric Fuzzy Vault based on Face and Fingerprints. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Jakob L. Andersen, Sissel Banke, Rolf Fagerberg, Christoph Flamm, Daniel Merkle, Peter F. Stadler On the Realisability of Chemical Pathways. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Casper Asbjørn Eriksen, Jakob Lykke Andersen, Rolf Fagerberg, Daniel Merkle Reconciling Inconsistent Molecular Structures from Biochemical Databases. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Nicole Merkle, Ralf Mikut Context-Aware Composition of Agent Policies by Markov Decision Process Entity Embeddings and Agent Ensembles. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Nina Merkle, Reza Bahmanyar, Corentin Henry, Seyed Majid Azimi, Xiangtian Yuan, Simon Schopferer, Veronika Gstaiger, Stefan Auer, Anne Schneibel, Marc Wieland, Thomas Kraft Drones4Good: Supporting Disaster Relief Through Remote Sensing and AI. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22David Weber, Florian Merkle, Pascal Schöttle, Stephan Schlögl Less is More: The Influence of Pruning on the Explainability of CNNs. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Christian Rathgeb, Benjamin Tams, Johannes Merkle, Vanessa Nesterowicz, Ulrike Korte, Matthias Neu Multi-Biometric Fuzzy Vault based on Face and Fingerprints. Search on Bibsonomy IJCB The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Cristian Alves dos Santos, Leandro Loffi, Carla Merkle Westphall Ensuring Data Security in the Context of IoT Forensics Evidence Preservation with Blockchain and Self-Sovereign Identities. Search on Bibsonomy ICISS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Roland Rauter, Martin Nocker, Florian Merkle, Pascal Schöttle On the Effect of Adversarial Training Against Invariance-based Adversarial Examples. Search on Bibsonomy ICMLT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Florian Merkle, Mihaela Roxana Sirbu, Martin Nocker, Pascal Schöttle Generating Invariance-Based Adversarial Examples: Bringing Humans Back into the Loop. Search on Bibsonomy ICIAP Workshops (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Laurenz John, Thomas Merkle, Arnulf Leuther, Jaehoon Chung Multi-Channel PA, LNA, and Switch MMICs for Beam-Switching Applications at 160 GHz, Based on an InGaAs mHEMT Technology. Search on Bibsonomy BCICTS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Fabricio Bortoluzzi, Barry Irwin, Lucas Silvero Beiler, Carla Merkle Westphall Cloud Telescope: A distributed architecture for capturing Internet Background Radiation. Search on Bibsonomy CloudNet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Casper Asbjørn Eriksen, Jakob Lykke Andersen, Rolf Fagerberg, Daniel Merkle Reconciling Inconsistent Molecular Structures from Biochemical Databases. Search on Bibsonomy ISBRA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Jakob L. Andersen, Sissel Banke, Rolf Fagerberg, Christoph Flamm, Daniel Merkle, Peter F. Stadler On the Realisability of Chemical Pathways. Search on Bibsonomy ISBRA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Nina Merkle, Reza Bahmanyar, Corentin Henry, Seyed Majid Azimi, Xiangtian Yuan, Simon Schopferer, Veronika Gstaiger, Stefan Auer, Anne Schneibel, Marc Wieland, Thomas Kraft Drones4Good: Supporting Disaster Relief Through Remote Sensing and AI. Search on Bibsonomy ICCV (Workshops) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Thomas Widmann, Florian Merkle, Martin Nocker, Pascal Schöttle Pruning for Power: Optimizing Energy Efficiency in IoT with Neural Network Pruning. Search on Bibsonomy EANN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Marc Wieland, Nina Merkle, Anne Schneibel, Corentin Henry, Konstanze Lechner, Xiangtian Yuan, Seyed Majid Azimi, Veronika Gstaiger, Sandro Martinis AD-HOC Situational Awareness During Floods Using Remote Sensing Data and Machine Learning Methods. Search on Bibsonomy IGARSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Sebastian Gapp, Nina Merkle, Corentin Henry Satellite Image Augmentation Via Seamless Instance Blending For Building Damage Segmentation. Search on Bibsonomy IGARSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Anish Bhattacharya, Akshit Gandhi, Lukas Merkle, Rohan Tiwari, Karun Warrior, Stanley Winata, Andrew Saba, Kevin Zhang 0002, Oliver Kroemer, Sebastian A. Scherer Mission-level Robustness with Rapidly-deployed, Autonomous Aerial Vehicles by Carnegie Mellon Team Tartan at MBZIRC 2020. Search on Bibsonomy Field Robotics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Cristiano Antonio de Souza, Carlos Becker Westphall, Renato Bobsin Machado, Leandro Loffi, Carla Merkle Westphall, Guilherme Arthur Geronimo Intrusion detection and prevention in fog based IoT environments: A systematic literature review. Search on Bibsonomy Comput. Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Christoph Flamm, Marc Hellmuth, Daniel Merkle, Nikolai Nøjgaard, Peter F. Stadler Generic Context-Aware Group Contributions. Search on Bibsonomy IEEE ACM Trans. Comput. Biol. Bioinform. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Jakob L. Andersen, Rolf Fagerberg, Christoph Flamm, Walter Fontana, Juraj Kolcák, Christophe V. F. P. Laurent, Daniel Merkle, Nikolai Nøjgaard Representing Catalytic Mechanisms with Rule Composition. Search on Bibsonomy J. Chem. Inf. Model. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Cheng Huang, Christopher R. Wentland, Karthik Duraisamy, Charles L. Merkle Model reduction for multi-scale transport problems using model-form preserving least-squares projections with variable transformation. Search on Bibsonomy J. Comput. Phys. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Larry Merkle, Maureen Doyle SIGCSE TS 2022 report. Search on Bibsonomy ACM SIGCSE Bull. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Larry Merkle, Maureen Doyle SIGCSE Technical Symposium 2022 call for participation. Search on Bibsonomy ACM SIGCSE Bull. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Klaus Ambos-Spies, Wolfgang Merkle, Sebastiaan A. Terwijn Normalized information distance and the oscillation hierarchy. Search on Bibsonomy J. Comput. Syst. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Jakob L. Andersen, Rolf Fagerberg, Juraj Kolcák, Christophe V. F. P. Laurent, Daniel Merkle, Nikolai Nøjgaard Efficient Modular Graph Transformation Rule Application. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
22Wesley dos Reis Bezerra, Cristiano Antonio de Souza, Carla Merkle Westphall, Carlos Becker Westphall A Bibliometrics Analysis on 28 years of Authentication and Threat Model Area. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 905 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license