Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Anton Mityagin
@inproceedings{DBLP:conf/sigir/YangMSM10, author = {Hui Yang and Anton Mityagin and Krysta M. Svore and Sergey Markov}, editor = {Fabio Crestani and St{\'{e}}phane Marchand{-}Maillet and Hsin{-}Hsi Chen and Efthimis N. Efthimiadis and Jacques Savoy}, title = {Collecting high quality overlapping labels at low cost}, booktitle = {Proceeding of the 33rd International {ACM} {SIGIR} Conference on Research and Development in Information Retrieval, {SIGIR} 2010, Geneva, Switzerland, July 19-23, 2010}, pages = {459--466}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1835449.1835526}, doi = {10.1145/1835449.1835526}, timestamp = {Thu, 17 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigir/YangMSM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/LawMC09, author = {Edith Law and Anton Mityagin and David Maxwell Chickering}, editor = {Dan R. Olsen Jr. and Richard B. Arthur and Ken Hinckley and Meredith Ringel Morris and Scott E. Hudson and Saul Greenberg}, title = {Intentions: a game for classifying search query intent}, booktitle = {Proceedings of the 27th International Conference on Human Factors in Computing Systems, {CHI} 2009, Extended Abstracts Volume, Boston, MA, USA, April 4-9, 2009}, pages = {3805--3810}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1520340.1520575}, doi = {10.1145/1520340.1520575}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/LawMC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/BennettCM09, author = {Paul N. Bennett and David Maxwell Chickering and Anton Mityagin}, editor = {Paul N. Bennett and Raman Chandrasekar and Max Chickering and Panagiotis G. Ipeirotis and Edith Law and Anton Mityagin and Foster J. Provost and Luis von Ahn}, title = {Picture this: preferences for image search}, booktitle = {Proceedings of the {ACM} {SIGKDD} Workshop on Human Computation, Paris, France, June 28, 2009}, pages = {25--26}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1600150.1600157}, doi = {10.1145/1600150.1600157}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kdd/BennettCM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/BennettCM09, author = {Paul N. Bennett and David Maxwell Chickering and Anton Mityagin}, editor = {Juan Quemada and Gonzalo Le{\'{o}}n and Yo{\"{e}}lle S. Maarek and Wolfgang Nejdl}, title = {Learning consensus opinion: mining data from a labeling game}, booktitle = {Proceedings of the 18th International Conference on World Wide Web, {WWW} 2009, Madrid, Spain, April 20-24, 2009}, pages = {121--130}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1526709.1526727}, doi = {10.1145/1526709.1526727}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/BennettCM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/kdd/2009hcomp, editor = {Paul N. Bennett and Raman Chandrasekar and Max Chickering and Panagiotis G. Ipeirotis and Edith Law and Anton Mityagin and Foster J. Provost and Luis von Ahn}, title = {Proceedings of the {ACM} {SIGKDD} Workshop on Human Computation, Paris, France, June 28, 2009}, publisher = {{ACM}}, year = {2009}, isbn = {978-1-60558-672-4}, timestamp = {Thu, 29 Oct 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kdd/2009hcomp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/RaghavanPM07, author = {Barath Raghavan and Saurabh Panjwani and Anton Mityagin}, title = {Analysis of the {SPV} secure routing protocol: weaknesses and lessons}, journal = {Comput. Commun. Rev.}, volume = {37}, number = {2}, pages = {29--38}, year = {2007}, url = {https://doi.org/10.1145/1232919.1232923}, doi = {10.1145/1232919.1232923}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/RaghavanPM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LaMacchiaLM07, author = {Brian A. LaMacchia and Kristin E. Lauter and Anton Mityagin}, editor = {Willy Susilo and Joseph K. Liu and Yi Mu}, title = {Stronger Security of Authenticated Key Exchange}, booktitle = {Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4784}, pages = {1--16}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75670-5\_1}, doi = {10.1007/978-3-540-75670-5\_1}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/LaMacchiaLM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/ChellapillaMC07, author = {Kumar Chellapilla and Anton Mityagin and Denis Xavier Charles}, editor = {Carey L. Williamson and Mary Ellen Zurko and Peter F. Patel{-}Schneider and Prashant J. Shenoy}, title = {GigaHash: scalable minimal perfect hashing for billions of urls}, booktitle = {Proceedings of the 16th International Conference on World Wide Web, {WWW} 2007, Banff, Alberta, Canada, May 8-12, 2007}, pages = {1165--1166}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1242572.1242747}, doi = {10.1145/1242572.1242747}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/ChellapillaMC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Mityagin06, author = {Anton Mityagin}, title = {Protocols and security proofs for data authentication}, school = {University of California, San Diego, {USA}}, year = {2006}, url = {http://www.escholarship.org/uc/item/767372fz}, timestamp = {Wed, 22 Mar 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/basesearch/Mityagin06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ants/MironovMN06, author = {Ilya Mironov and Anton Mityagin and Kobbi Nissim}, editor = {Florian Hess and Sebastian Pauli and Michael E. Pohst}, title = {Hard Instances of the Constrained Discrete Logarithm Problem}, booktitle = {Algorithmic Number Theory, 7th International Symposium, ANTS-VII, Berlin, Germany, July 23-28, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4076}, pages = {582--598}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11792086\_41}, doi = {10.1007/11792086\_41}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ants/MironovMN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LauterM06, author = {Kristin E. Lauter and Anton Mityagin}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Security Analysis of {KEA} Authenticated Key Exchange Protocol}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {378--394}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_25}, doi = {10.1007/11745853\_25}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LauterM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-math-0606771, author = {Ilya Mironov and Anton Mityagin and Kobbi Nissim}, title = {Hard Instances of the Constrained Discrete Logarithm Problem}, journal = {CoRR}, volume = {abs/math/0606771}, year = {2006}, url = {http://arxiv.org/abs/math/0606771}, eprinttype = {arXiv}, eprint = {math/0606771}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-math-0606771.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaMacchiaLM06, author = {Brian A. LaMacchia and Kristin E. Lauter and Anton Mityagin}, title = {Stronger Security of Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {73}, year = {2006}, url = {http://eprint.iacr.org/2006/073}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaMacchiaLM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RaghavanPM06, author = {Barath Raghavan and Saurabh Panjwani and Anton Mityagin}, title = {Analysis of the {SPV} Secure Routing Protocol: Weaknesses and Lessons}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {87}, year = {2006}, url = {http://eprint.iacr.org/2006/087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RaghavanPM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MironovMN06, author = {Ilya Mironov and Anton Mityagin and Kobbi Nissim}, title = {Hard Instances of the Constrained Discrete Logarithm Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {253}, year = {2006}, url = {http://eprint.iacr.org/2006/253}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MironovMN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/KiltzMPR05, author = {Eike Kiltz and Anton Mityagin and Saurabh Panjwani and Barath Raghavan}, editor = {Lu{\'{\i}}s Caires and Giuseppe F. Italiano and Lu{\'{\i}}s Monteiro and Catuscia Palamidessi and Moti Yung}, title = {Append-Only Signatures}, booktitle = {Automata, Languages and Programming, 32nd International Colloquium, {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3580}, pages = {434--445}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11523468\_36}, doi = {10.1007/11523468\_36}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/KiltzMPR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/CamenischM05, author = {Jan Camenisch and Anton Mityagin}, editor = {George Danezis and David M. Martin Jr.}, title = {Mix-Network with Stronger Security}, booktitle = {Privacy Enhancing Technologies, 5th International Workshop, {PET} 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3856}, pages = {128--146}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11767831\_9}, doi = {10.1007/11767831\_9}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/CamenischM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiltzMPR05, author = {Eike Kiltz and Anton Mityagin and Saurabh Panjwani and Barath Raghavan}, title = {Append-Only Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {124}, year = {2005}, url = {http://eprint.iacr.org/2005/124}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiltzMPR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LauterM05, author = {Kristin E. Lauter and Anton Mityagin}, title = {Security Analysis of {KEA} Authenticated Key Exchange Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {265}, year = {2005}, url = {http://eprint.iacr.org/2005/265}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LauterM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/Mityagin04, author = {Anton Mityagin}, title = {On the complexity of finding a local maximum of functions on discrete planar subsets}, journal = {Theor. Comput. Sci.}, volume = {310}, number = {1-3}, pages = {355--363}, year = {2004}, url = {https://doi.org/10.1016/S0304-3975(03)00426-2}, doi = {10.1016/S0304-3975(03)00426-2}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/Mityagin04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareGM04, author = {Mihir Bellare and Oded Goldreich and Anton Mityagin}, title = {The Power of Verification Queries in Message Authentication and Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2004}, url = {http://eprint.iacr.org/2004/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareGM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/Mityagin03, author = {Anton Mityagin}, editor = {Helmut Alt and Michel Habib}, title = {On the Complexity of Finding a Local Maximum of Functions on Discrete Planar Subsets}, booktitle = {{STACS} 2003, 20th Annual Symposium on Theoretical Aspects of Computer Science, Berlin, Germany, February 27 - March 1, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2607}, pages = {203--211}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36494-3\_19}, doi = {10.1007/3-540-36494-3\_19}, timestamp = {Thu, 14 Oct 2021 10:38:16 +0200}, biburl = {https://dblp.org/rec/conf/stacs/Mityagin03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KlimovMS02, author = {Alexander Klimov and Anton Mityagin and Adi Shamir}, editor = {Yuliang Zheng}, title = {Analysis of Neural Cryptography}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2501}, pages = {288--298}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36178-2\_18}, doi = {10.1007/3-540-36178-2\_18}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/KlimovMS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.