Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Sam Kim
@phdthesis{DBLP:phd/us/Kim21d, author = {Sam Kim}, title = {Pseudorandom functions with new properties from hard lattice problems}, school = {Stanford University, {USA}}, year = {2021}, url = {https://searchworks.stanford.edu/view/13826060}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Kim21d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KimW21, author = {Sam Kim and David J. Wu}, title = {Watermarking Cryptographic Functionalities from Standard Lattice Assumptions}, journal = {J. Cryptol.}, volume = {34}, number = {3}, pages = {28}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09391-2}, doi = {10.1007/S00145-021-09391-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KimW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GoyalKWW21, author = {Rishab Goyal and Sam Kim and Brent Waters and David J. Wu}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13092}, pages = {250--280}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92078-4\_9}, doi = {10.1007/978-3-030-92078-4\_9}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GoyalKWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-12032, author = {Jason I. Hong and Yuvraj Agarwal and Matt Fredrikson and Mike Czapik and Shawn Hanna and Swarup Sahoo and Judy Chun and Won{-}Woo Chung and Aniruddh Iyer and Ally Liu and Shen Lu and Rituparna Roychoudhury and Qian Wang and Shan Wang and Siqi Wang and Vida Zhang and Jessica Zhao and Yuan Jiang and Haojian Jin and Sam Kim and Evelyn Kuo and Tianshi Li and Jinping Liu and Yile Liu and Robert Zhang}, title = {The Design of the User Interfaces for Privacy Enhancements for Android}, journal = {CoRR}, volume = {abs/2104.12032}, year = {2021}, url = {https://arxiv.org/abs/2104.12032}, eprinttype = {arXiv}, eprint = {2104.12032}, timestamp = {Mon, 03 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-12032.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KimW20, author = {Sam Kim and David J. Wu}, title = {Multi-theorem Preprocessing NIZKs from Lattices}, journal = {J. Cryptol.}, volume = {33}, number = {3}, pages = {619--702}, year = {2020}, url = {https://doi.org/10.1007/s00145-019-09324-0}, doi = {10.1007/S00145-019-09324-0}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KimW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KimW20, author = {Sam Kim and David J. Wu}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12492}, pages = {66--97}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64834-3\_3}, doi = {10.1007/978-3-030-64834-3\_3}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KimW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BonehEKS20, author = {Dan Boneh and Saba Eskandarian and Sam Kim and Maurice Shih}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Improving Speed and Security in Updatable Encryption Schemes}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {559--589}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_19}, doi = {10.1007/978-3-030-64840-4\_19}, timestamp = {Thu, 10 Dec 2020 10:11:44 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BonehEKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Kim20, author = {Sam Kim}, editor = {Anne Canteaut and Yuval Ishai}, title = {Key-Homomorphic Pseudorandom Functions from {LWE} with Small Modulus}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {576--607}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_20}, doi = {10.1007/978-3-030-45724-2\_20}, timestamp = {Mon, 04 May 2020 14:32:28 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Kim20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehEKS20, author = {Dan Boneh and Saba Eskandarian and Sam Kim and Maurice Shih}, title = {Improving Speed and Security in Updatable Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {222}, year = {2020}, url = {https://eprint.iacr.org/2020/222}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehEKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kim20, author = {Sam Kim}, title = {Key-Homomorphic Pseudorandom Functions from {LWE} with a Small Modulus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {233}, year = {2020}, url = {https://eprint.iacr.org/2020/233}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kim20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalKWW20, author = {Rishab Goyal and Sam Kim and Brent Waters and David J. Wu}, title = {Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2020}, url = {https://eprint.iacr.org/2020/316}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalKWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KimW19, author = {Sam Kim and David J. Wu}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {335--366}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_11}, doi = {10.1007/978-3-030-26954-8\_11}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KimW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalKMWW19, author = {Rishab Goyal and Sam Kim and Nathan Manohar and Brent Waters and David J. Wu}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Watermarking Public-Key Cryptographic Primitives}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {367--398}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_12}, doi = {10.1007/978-3-030-26954-8\_12}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalKMWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kim19, author = {Sam Kim}, title = {Multi-Authority Attribute-Based Encryption from {LWE} in the {OT} Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {280}, year = {2019}, url = {https://eprint.iacr.org/2019/280}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kim19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalKMWW19, author = {Rishab Goyal and Sam Kim and Nathan Manohar and Brent Waters and David J. Wu}, title = {Watermarking Public-Key Cryptographic Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {628}, year = {2019}, url = {https://eprint.iacr.org/2019/628}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalKMWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimW19, author = {Sam Kim and David J. Wu}, title = {Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {984}, year = {2019}, url = {https://eprint.iacr.org/2019/984}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehGGJKRS18, author = {Dan Boneh and Rosario Gennaro and Steven Goldfeder and Aayush Jain and Sam Kim and Peter M. R. Rasmussen and Amit Sahai}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Threshold Cryptosystems from Threshold Fully Homomorphic Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {565--596}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_19}, doi = {10.1007/978-3-319-96884-1\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehGGJKRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KimW18, author = {Sam Kim and David J. Wu}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Multi-Theorem Preprocessing NIZKs from Lattices}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {733--765}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_25}, doi = {10.1007/978-3-319-96881-0\_25}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KimW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KimLMM0W18, author = {Sam Kim and Kevin Lewi and Avradip Mandal and Hart Montgomery and Arnab Roy and David J. Wu}, editor = {Dario Catalano and Roberto De Prisco}, title = {Function-Hiding Inner Product Encryption Is Practical}, booktitle = {Security and Cryptography for Networks - 11th International Conference, {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11035}, pages = {544--562}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98113-0\_29}, doi = {10.1007/978-3-319-98113-0\_29}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/KimLMM0W18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimW18, author = {Sam Kim and David J. Wu}, title = {Multi-Theorem Preprocessing NIZKs from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {272}, year = {2018}, url = {https://eprint.iacr.org/2018/272}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimW18a, author = {Sam Kim and David J. Wu}, title = {Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {986}, year = {2018}, url = {https://eprint.iacr.org/2018/986}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimW18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BonehKN17, author = {Dan Boneh and Sam Kim and Valeria Nikolaenko}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {Lattice-Based {DAPS} and Generalizations: Self-enforcement in Signature Schemes}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {457--477}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_23}, doi = {10.1007/978-3-319-61204-1\_23}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/BonehKN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KimW17, author = {Sam Kim and David J. Wu}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Access Control Encryption for General Policies from Standard Assumptions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10624}, pages = {471--501}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70694-8\_17}, doi = {10.1007/978-3-319-70694-8\_17}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KimW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KimW17, author = {Sam Kim and David J. Wu}, editor = {Jonathan Katz and Hovav Shacham}, title = {Watermarking Cryptographic Functionalities from Standard Lattice Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {503--536}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_17}, doi = {10.1007/978-3-319-63688-7\_17}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KimW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehKM17, author = {Dan Boneh and Sam Kim and Hart William Montgomery}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Private Puncturable PRFs from Standard Lattice Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {415--445}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_15}, doi = {10.1007/978-3-319-56620-7\_15}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BonehKW17, author = {Dan Boneh and Sam Kim and David J. Wu}, editor = {Yael Kalai and Leonid Reyzin}, title = {Constrained Keys for Invertible Pseudorandom Functions}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {237--263}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_9}, doi = {10.1007/978-3-319-70500-2\_9}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BonehKW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehKM17, author = {Dan Boneh and Sam Kim and Hart William Montgomery}, title = {Private Puncturable PRFs From Standard Lattice Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {100}, year = {2017}, url = {http://eprint.iacr.org/2017/100}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehGGK17, author = {Dan Boneh and Rosario Gennaro and Steven Goldfeder and Sam Kim}, title = {A Lattice-Based Universal Thresholdizer for Cryptographic Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2017}, url = {http://eprint.iacr.org/2017/251}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehGGK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimW17, author = {Sam Kim and David J. Wu}, title = {Watermarking Cryptographic Functionalities from Standard Lattice Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {380}, year = {2017}, url = {http://eprint.iacr.org/2017/380}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimW17a, author = {Sam Kim and David J. Wu}, title = {Access Control Encryption for General Policies from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {467}, year = {2017}, url = {http://eprint.iacr.org/2017/467}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimW17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehKW17, author = {Dan Boneh and Sam Kim and David J. Wu}, title = {Constrained Keys for Invertible Pseudorandom Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {477}, year = {2017}, url = {http://eprint.iacr.org/2017/477}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehKW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehGGJKRS17, author = {Dan Boneh and Rosario Gennaro and Steven Goldfeder and Aayush Jain and Sam Kim and Peter M. R. Rasmussen and Amit Sahai}, title = {Threshold Cryptosystems From Threshold Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {956}, year = {2017}, url = {http://eprint.iacr.org/2017/956}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehGGJKRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimLMMRW16, author = {Sam Kim and Kevin Lewi and Avradip Mandal and Hart William Montgomery and Arnab Roy and David J. Wu}, title = {Function-Hiding Inner Product Encryption is Practical}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {440}, year = {2016}, url = {http://eprint.iacr.org/2016/440}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimLMMRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/ShinK05, author = {Sung W. Shin and Sam Kim}, title = {A new algorithm for detecting low-complexity regions in protein sequences}, journal = {Bioinform.}, volume = {21}, number = {2}, pages = {160--170}, year = {2005}, url = {https://doi.org/10.1093/bioinformatics/bth497}, doi = {10.1093/BIOINFORMATICS/BTH497}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/ShinK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/SkolnickKO88, author = {Michael M. Skolnick and Sam Kim and Robert M. O'Bara}, title = {Morphological Algorithms For Computing Non-planar Point Neighborhoods On Cellular Automata}, booktitle = {Second International Conference on Computer Vision, {ICCV} 1988. Tampa, Florida, USA, 5-8 December, 1988, Proceedings}, pages = {106--111}, publisher = {{IEEE}}, year = {1988}, url = {https://doi.org/10.1109/CCV.1988.589978}, doi = {10.1109/CCV.1988.589978}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/iccv/SkolnickKO88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.