Search dblp for Publications

export results for "interpolation attack"

 download as .bib file

@article{DBLP:journals/corr/abs-2402-16586,
  author       = {Kefu Guo and
                  Fengfan Zhou and
                  Hefei Ling and
                  Ping Li and
                  Hui Liu},
  title        = {Improving the JPEG-resistance of Adversarial Attacks on Face Recognition
                  by Interpolation Smoothing},
  journal      = {CoRR},
  volume       = {abs/2402.16586},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.16586},
  doi          = {10.48550/ARXIV.2402.16586},
  eprinttype    = {arXiv},
  eprint       = {2402.16586},
  timestamp    = {Mon, 25 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-16586.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangWHZZ23,
  author       = {Xinlei Wang and
                  Xiaojuan Wang and
                  Mingshu He and
                  Min Zhang and
                  Zhao Zhang},
  title        = {A Manifold Consistency Interpolation Method of Poisoning Attacks Against
                  Semi-Supervised Model},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {5272--5285},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3268882},
  doi          = {10.1109/TIFS.2023.3268882},
  timestamp    = {Tue, 12 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WangWHZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-06540,
  author       = {Junpei Liao and
                  Zhikai Chen and
                  Liang Yi and
                  Wenyuan Yang and
                  Baoyuan Wu and
                  Xiaochun Cao},
  title        = {Inter-frame Accelerate Attack against Video Interpolation Models},
  journal      = {CoRR},
  volume       = {abs/2305.06540},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.06540},
  doi          = {10.48550/ARXIV.2305.06540},
  eprinttype    = {arXiv},
  eprint       = {2305.06540},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-06540.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/AlmseidinA22,
  author       = {Mohammad Almseidin and
                  Mouhammd Alkasassbeh},
  title        = {An Accurate Detection Approach for IoT Botnet Attacks Using Interpolation
                  Reasoning Method},
  journal      = {Inf.},
  volume       = {13},
  number       = {6},
  pages        = {300},
  year         = {2022},
  url          = {https://doi.org/10.3390/info13060300},
  doi          = {10.3390/INFO13060300},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/AlmseidinA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/XuHF0P22,
  author       = {Jisheng Xu and
                  Zhiyu He and
                  Chongrong Fang and
                  Jianping He and
                  Yunfeng Peng},
  title        = {Inference Attack in Distributed Optimization via Interpolation and
                  Manipulation},
  booktitle    = {61st {IEEE} Conference on Decision and Control, {CDC} 2022, Cancun,
                  Mexico, December 6-9, 2022},
  pages        = {2250--2255},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CDC51059.2022.9993236},
  doi          = {10.1109/CDC51059.2022.9993236},
  timestamp    = {Wed, 18 Jan 2023 15:37:37 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/XuHF0P22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhouZDJM21,
  author       = {Haibo Zhou and
                  Rui Zong and
                  Xiaoyang Dong and
                  Keting Jia and
                  Willi Meier},
  title        = {Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff},
  journal      = {Comput. J.},
  volume       = {64},
  number       = {4},
  pages        = {628--638},
  year         = {2021},
  url          = {https://doi.org/10.1093/comjnl/bxaa101},
  doi          = {10.1093/COMJNL/BXAA101},
  timestamp    = {Thu, 20 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhouZDJM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/es/NaikSJS21,
  author       = {Nitin Naik and
                  Changjing Shang and
                  Paul Jenkins and
                  Qiang Shen},
  title        = {Building a cognizant honeypot for detecting active fingerprinting
                  attacks using dynamic fuzzy rule interpolation},
  journal      = {Expert Syst. J. Knowl. Eng.},
  volume       = {38},
  number       = {5},
  year         = {2021},
  url          = {https://doi.org/10.1111/exsy.12557},
  doi          = {10.1111/EXSY.12557},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/es/NaikSJS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcasII/ChenXZML21,
  author       = {Jinyin Chen and
                  Hui Xiong and
                  Haibin Zheng and
                  Zhaoyan Ming and
                  Yi Liu},
  title        = {Anti-Interpolation: An Attack Facilitator Hiding Adversaries Into
                  Images},
  journal      = {{IEEE} Trans. Circuits Syst. {II} Express Briefs},
  volume       = {68},
  number       = {7},
  pages        = {2670--2674},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCSII.2021.3061154},
  doi          = {10.1109/TCSII.2021.3061154},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcasII/ChenXZML21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/Al-KasassbehAAK20,
  author       = {Mouhammd Al{-}Kasassbeh and
                  Mohammad Almseidin and
                  Khaled Alrfou and
                  Szilveszter Kov{\'{a}}cs},
  title        = {Detection of IoT-botnet attacks using fuzzy rule interpolation},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {39},
  number       = {1},
  pages        = {421--431},
  year         = {2020},
  url          = {https://doi.org/10.3233/JIFS-191432},
  doi          = {10.3233/JIFS-191432},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/Al-KasassbehAAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intap/SinghR020,
  author       = {Jag Mohan Singh and
                  Raghavendra Ramachandra and
                  Christoph Busch},
  editor       = {Sule Yildirim Yayilgan and
                  Imran Sarwar Bajwa and
                  Filippo Sanfilippo},
  title        = {Hierarchical Interpolation of Imagenet Features for Cross-Dataset
                  Presentation Attack Detection},
  booktitle    = {Intelligent Technologies and Applications - Third International Conference,
                  {INTAP} 2020, Gj{\o}vik, Norway, September 28-30, 2020, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1382},
  pages        = {203--214},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-71711-7\_17},
  doi          = {10.1007/978-3-030-71711-7\_17},
  timestamp    = {Tue, 16 Aug 2022 16:54:22 +0200},
  biburl       = {https://dblp.org/rec/conf/intap/SinghR020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouZDJM20,
  author       = {Haibo Zhou and
                  Rui Zong and
                  Xiaoyang Dong and
                  Keting Jia and
                  Willi Meier},
  title        = {Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {781},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/781},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouZDJM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Kell19,
  author       = {Christian Kell},
  title        = {A Structure-based Attack on the Linearized Braid Group-based Diffie-Hellman
                  Conjugacy Problem in Combination with an Attack using Polynomial Interpolation
                  and the Chinese Remainder Theorem},
  school       = {University of Passau, Germany},
  year         = {2019},
  url          = {https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/647},
  urn          = {urn:nbn:de:bvb:739-opus4-6476},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Kell19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotais/Pan19,
  author       = {Jonathan Pan},
  title        = {Physical Integrity Attack Detection of Surveillance Camera with Deep
                  Learning based Video Frame Interpolation},
  booktitle    = {2019 {IEEE} International Conference on Internet of Things and Intelligence
                  System, IoTaIS 2019, Bali, Indonesia, November 5-7, 2019},
  pages        = {79--85},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IoTaIS47347.2019.8980385},
  doi          = {10.1109/IOTAIS47347.2019.8980385},
  timestamp    = {Mon, 09 Mar 2020 13:24:15 +0100},
  biburl       = {https://dblp.org/rec/conf/iotais/Pan19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/LiP19,
  author       = {Chaoyun Li and
                  Bart Preneel},
  editor       = {Kenneth G. Paterson and
                  Douglas Stebila},
  title        = {Improved Interpolation Attacks on Cryptographic Primitives of Low
                  Algebraic Degree},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference,
                  Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11959},
  pages        = {171--193},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-38471-5\_8},
  doi          = {10.1007/978-3-030-38471-5\_8},
  timestamp    = {Tue, 07 May 2024 20:12:23 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/LiP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-06475,
  author       = {Jonathan Pan},
  title        = {Physical Integrity Attack Detection of Surveillance Camera with Deep
                  Learning Based Video Frame Interpolation},
  journal      = {CoRR},
  volume       = {abs/1906.06475},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.06475},
  eprinttype    = {arXiv},
  eprint       = {1906.06475},
  timestamp    = {Mon, 24 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-06475.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiP19,
  author       = {Chaoyun Li and
                  Bart Preneel},
  title        = {Improved Interpolation Attacks on Cryptographic Primitives of Low
                  Algebraic Degree},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {812},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/812},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DinurLMW15,
  author       = {Itai Dinur and
                  Yunwen Liu and
                  Willi Meier and
                  Qingju Wang},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Optimized Interpolation Attacks on LowMC},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9453},
  pages        = {535--560},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48800-3\_22},
  doi          = {10.1007/978-3-662-48800-3\_22},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DinurLMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurLMW15,
  author       = {Itai Dinur and
                  Yunwen Liu and
                  Willi Meier and
                  Qingju Wang},
  title        = {Optimized Interpolation Attacks on LowMC},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {418},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/418},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurLMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CaoH14,
  author       = {Weiwei Cao and
                  Lei Hu},
  title        = {Projective interpolation of polynomial vectors and improved key recovery
                  attack on {SFLASH}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {719--730},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9819-2},
  doi          = {10.1007/S10623-013-9819-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CaoH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/LiuCZ13,
  author       = {Jingmei Liu and
                  Shaopeng Chen and
                  Linsen Zhao},
  title        = {Lagrange Interpolation Attack against 6 Rounds of Rijndael-128},
  booktitle    = {2013 5th International Conference on Intelligent Networking and Collaborative
                  Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages        = {652--655},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INCoS.2013.122},
  doi          = {10.1109/INCOS.2013.122},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/LiuCZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShresthaHMPS11,
  author       = {Pradhumna Shrestha and
                  Michael Hempel and
                  Tao Ma and
                  Dongming Peng and
                  Hamid Sharif},
  title        = {A general attack method for steganography removal using Pseudo-CFA
                  re-interpolation},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {454--459},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148481/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ShresthaHMPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Canniere11e,
  author       = {Christophe De Canni{\`{e}}re},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Interpolation Attack},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {620},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_584},
  doi          = {10.1007/978-1-4419-5906-5\_584},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Canniere11e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KurosawaID05,
  author       = {Kaoru Kurosawa and
                  Tetsu Iwata and
                  Quang Viet Duong},
  title        = {How to Improve Interpolation Attack},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {1},
  pages        = {9--15},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_9\&category=D\&year=2005\&lang=E\&abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KurosawaID05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Canniere05e,
  author       = {Christophe De Canni{\`{e}}re},
  editor       = {Henk C. A. van Tilborg},
  title        = {Interpolation Attack},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_203},
  doi          = {10.1007/0-387-23483-7\_203},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Canniere05e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/SuKH01,
  author       = {Karen Su and
                  Deepa Kundur and
                  Dimitrios Hatzinakos},
  title        = {A content dependent spatially localized video watermark for resistance
                  to collusion and interpolation attacks},
  booktitle    = {Proceedings of the 2001 International Conference on Image Processing,
                  {ICIP} 2001, Thessaloniki, Greece, October 7-10, 2001},
  pages        = {818--821},
  publisher    = {{IEEE}},
  year         = {2001},
  url          = {https://doi.org/10.1109/ICIP.2001.959171},
  doi          = {10.1109/ICIP.2001.959171},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/SuKH01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/YoussefG00,
  author       = {Amr M. Youssef and
                  Guang Gong},
  editor       = {Bruce Schneier},
  title        = {On the Interpolation Attacks on Block Ciphers},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {109--120},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_8},
  doi          = {10.1007/3-540-44706-7\_8},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/YoussefG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/KurosawaIQ00,
  author       = {Kaoru Kurosawa and
                  Tetsu Iwata and
                  Quang Viet Duong},
  editor       = {Douglas R. Stinson and
                  Stafford E. Tavares},
  title        = {Root Finding Interpolation Attack},
  booktitle    = {Selected Areas in Cryptography, 7th Annual International Workshop,
                  {SAC} 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2012},
  pages        = {303--314},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44983-3\_22},
  doi          = {10.1007/3-540-44983-3\_22},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/KurosawaIQ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MoriaiSK99,
  author       = {Shiho Moriai and
                  Takeshi Shimoyama and
                  Toshinobu Kaneko},
  editor       = {Lars R. Knudsen},
  title        = {Interpolation Attacks of the Block Cipher: {SNAKE}},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {275--289},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_20},
  doi          = {10.1007/3-540-48519-8\_20},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MoriaiSK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Aoki99,
  author       = {Kazumaro Aoki},
  editor       = {Howard M. Heys and
                  Carlisle M. Adams},
  title        = {Efficient Evaluation of Security against Generalized Interpolation
                  Attack},
  booktitle    = {Selected Areas in Cryptography, 6th Annual International Workshop,
                  SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1758},
  pages        = {135--146},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46513-8\_10},
  doi          = {10.1007/3-540-46513-8\_10},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Aoki99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JakobsenK97,
  author       = {Thomas Jakobsen and
                  Lars R. Knudsen},
  editor       = {Eli Biham},
  title        = {The Interpolation Attack on Block Ciphers},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {28--40},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052332},
  doi          = {10.1007/BFB0052332},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JakobsenK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics