Search dblp for Publications

export results for "careful analysis"

 download as .bib file

@inproceedings{DBLP:conf/eurosp/GuntherM23,
  author       = {Felix G{\"{u}}nther and
                  Marc Ilunga Tshibumbu Mukendi},
  title        = {Careful with MAc-then-SIGn: {A} Computational Analysis of the {EDHOC}
                  Lightweight Authenticated Key Exchange Protocol},
  booktitle    = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023, Delft, Netherlands, July 3-7, 2023},
  pages        = {773--796},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSP57164.2023.00051},
  doi          = {10.1109/EUROSP57164.2023.00051},
  timestamp    = {Mon, 07 Aug 2023 15:56:23 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/GuntherM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wons/PalamaAGB22,
  author       = {Ivan Palam{\`{a}} and
                  Alessandro Amici and
                  Francesco Gringoli and
                  Giuseppe Bianchi},
  editor       = {Michael Welzl and
                  Gunnar Karlsson and
                  {\"{O}}zg{\"{u}} Alay and
                  Chunyi Peng},
  title        = {"Careful with that Roam, Edu": experimental analysis of Eduroam credential
                  stealing attacks},
  booktitle    = {17th Wireless On-Demand Network Systems and Services Conference, {WONS}
                  2022, Oppdal, Norway, March 30 - April 1, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.23919/WONS54113.2022.9764586},
  doi          = {10.23919/WONS54113.2022.9764586},
  timestamp    = {Mon, 09 May 2022 09:35:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wons/PalamaAGB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuntherM22,
  author       = {Felix G{\"{u}}nther and
                  Marc Ilunga Tshibumbu Mukendi},
  title        = {Careful with MAc-then-SIGn: {A} Computational Analysis of the {EDHOC}
                  Lightweight Authenticated Key Exchange Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1705},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1705},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GuntherM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-01451,
  author       = {Koichi Kano and
                  Takashi Segi and
                  Hiroshi Ozono},
  title        = {Careful analysis of {XRD} patterns with Attention},
  journal      = {CoRR},
  volume       = {abs/2006.01451},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.01451},
  eprinttype    = {arXiv},
  eprint       = {2006.01451},
  timestamp    = {Tue, 09 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-01451.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esslli/Gabrovska18,
  author       = {Ekaterina Gabrovska},
  editor       = {Jennifer Sikos and
                  Eric Pacuit},
  title        = {Towards an Analysis of the Agent-Oriented Manner Adverbial sorgf{\"{a}}ltig
                  ('carefully')},
  booktitle    = {At the Intersection of Language, Logic, and Information - {ESSLLI}
                  2018 Student Session, Sofia, Bulgaria, August 6-17, 2018, Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11667},
  pages        = {42--61},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-662-59620-3\_3},
  doi          = {10.1007/978-3-662-59620-3\_3},
  timestamp    = {Wed, 14 Aug 2019 15:37:34 +0200},
  biburl       = {https://dblp.org/rec/conf/esslli/Gabrovska18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/solarjla/HowleyR16,
  author       = {Iris K. Howley and
                  Carolyn Penstein Ros{\'{e}}},
  title        = {Towards Careful Practices for Automated Linguistic Analysis of Group
                  Learning},
  journal      = {J. Learn. Anal.},
  volume       = {3},
  number       = {3},
  pages        = {239--262},
  year         = {2016},
  url          = {https://doi.org/10.18608/jla.2016.33.12},
  doi          = {10.18608/JLA.2016.33.12},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/solarjla/HowleyR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcbi/CarraraLCBPDCZ15,
  author       = {Matteo Carrara and
                  Josephine Lum and
                  Francesca Cordero and
                  Marco Beccuti and
                  Michael Poidinger and
                  Susanna Donatelli and
                  Raffaele A. Calogero and
                  Francesca Zolezzi},
  title        = {Alternative splicing detection workflow needs a careful combination
                  of sample prep and bioinformatics analysis},
  journal      = {{BMC} Bioinform.},
  volume       = {16},
  number       = {{S-9}},
  pages        = {S2},
  year         = {2015},
  url          = {https://doi.org/10.1186/1471-2105-16-S9-S2},
  doi          = {10.1186/1471-2105-16-S9-S2},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bmcbi/CarraraLCBPDCZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drr/LamiroyLKH11,
  author       = {Bart Lamiroy and
                  Daniel P. Lopresti and
                  Henry F. Korth and
                  Jeff Heflin},
  editor       = {Gady Agam and
                  Christian Viard{-}Gaudin},
  title        = {How carefully designed open resource sharing can help and expand document
                  analysis research},
  booktitle    = {Document Recognition and Retrieval XVIII, part of the IS{\&}T-SPIE
                  Electronic Imaging Symposium, San Jose, CA, USA, January 26-27, 2011,
                  Proceedings},
  series       = {{SPIE} Proceedings},
  volume       = {7874},
  pages        = {78740O},
  publisher    = {{SPIE}},
  year         = {2011},
  url          = {https://doi.org/10.1117/12.876483},
  doi          = {10.1117/12.876483},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drr/LamiroyLKH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iat/OnodaSY10,
  author       = {Takashi Onoda and
                  Miho Sakai and
                  Seiji Yamada},
  title        = {Careful Seeding Based on Independent Component Analysis for k-Means
                  Clustering},
  booktitle    = {Proceedings of the 2010 {IEEE/WIC/ACM} International Conference on
                  Web Intelligence and International Conference on Intelligent Agent
                  Technology - Workshops, Toronto, Canada, August 31 - September 3,
                  2010},
  pages        = {112--115},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/WI-IAT.2010.102},
  doi          = {10.1109/WI-IAT.2010.102},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iat/OnodaSY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jit/TozawaH99,
  author       = {Akihiko Tozawa and
                  Masami Hagiya},
  editor       = {Clemens H. Cap},
  title        = {Careful Analysis of Type Spoofing},
  booktitle    = {{JIT} '99, Java-Informations-Tage 1999, D{\"{u}}sseldorf 20./21.
                  September 1999},
  series       = {Informatik Aktuell},
  pages        = {290--296},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-642-60247-4\_27},
  doi          = {10.1007/978-3-642-60247-4\_27},
  timestamp    = {Tue, 25 Jun 2019 12:38:54 +0200},
  biburl       = {https://dblp.org/rec/conf/jit/TozawaH99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/HeiskanenH82,
  author       = {Ari Heiskanen and
                  Jaana Helanter{\"{a}}},
  title        = {Towards better software management through careful analysis of current
                  application systems},
  journal      = {Inf. Manag.},
  volume       = {5},
  number       = {3},
  pages        = {175--184},
  year         = {1982},
  url          = {https://doi.org/10.1016/0378-7206(82)90024-6},
  doi          = {10.1016/0378-7206(82)90024-6},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/HeiskanenH82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics