default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 155 matches
- 2025
- J. Jackson, R. Perumal:
An algebraic attack on the key exchange protocol based upon a modified tropical structure. Inf. Comput. 303: 105259 (2025) - 2024
- Anh-Tu Nguyen, Thanh-Lam Bui, Huy Anh Bui, Sy-Tai Nguyen, Xuan-Thuan Nguyen:
Application of hedge algebras algorithm for mobile robot controller via hand gestures and wireless protocol. J. Intell. Fuzzy Syst. 46(1): 1201-1212 (2024) - Chad Nester, Niels F. W. Voorneveld:
Protocol choice and iteration for the free cornering. J. Log. Algebraic Methods Program. 137: 100942 (2024) - Sulaiman Alhussaini, Craig Collett, Sergei Sergeev:
On the tropical two-sided discrete logarithm and a key exchange protocol based on the tropical algebra of pairs. IACR Cryptol. ePrint Arch. 2024: 10 (2024) - 2023
- N. Suresh Kumar, G. Santhosh Kumar:
Abstracting IoT protocols using timed process algebra and SPIN model checker. Clust. Comput. 26(2): 1611-1629 (2023) - Lars-Åke Fredlund, Clara Benac Earle, Thomas Arts, Hans Svensson:
Gaining trust by tracing security protocols. J. Log. Algebraic Methods Program. 130: 100829 (2023) - Raúl López-Rueda, Santiago Escobar, Julia Sapiña:
An efficient canonical narrowing implementation with irreducibility and SMT constraints for generic symbolic protocol analysis. J. Log. Algebraic Methods Program. 135: 100895 (2023) - Zorica Savanovic, Letterio Galletta:
A type language for distributed reactive components governed by communication protocols. J. Log. Algebraic Methods Program. 132: 100848 (2023) - Andreia Mordido, Janek Spaderna, Peter Thiemann, Vasco T. Vasconcelos:
Parameterized Algebraic Protocols. Proc. ACM Program. Lang. 7(PLDI): 1389-1413 (2023) - Andreia Mordido, Janek Spaderna, Peter Thiemann, Vasco T. Vasconcelos:
Parameterized Algebraic Protocols. CoRR abs/2304.03764 (2023) - 2022
- Lassaad Cheikhrouhou:
Inductive verification of cryptographic protocols based on message algebras - trace and indistinguishability properties. Saarland University, Saarbrücken, Germany, 2022 - Sarah Bordage:
Efficient protocols for testing proximity to algebraic codes. (Protocoles efficaces pour tester la proximité à des codes algébriques). Polytechnic Institute of Paris, Palaiseau, France, 2022 - Kai Bavendiek, Sibylle Schupp:
A process calculus for privacy-preserving protocols in location-based service systems. J. Log. Algebraic Methods Program. 125: 100735 (2022) - Dexter Kozen, Matvey Soloviev:
Coalgebraic tools for randomness-conserving protocols. J. Log. Algebraic Methods Program. 125: 100734 (2022) - Mohammad Anagreh, Peeter Laud:
A Parallel Privacy-Preserving Shortest Path Protocol from a Path Algebra Problem. DPM/CBT@ESORICS 2022: 120-135 - Junhui Xiao, Ashish Neupane, Hiba F. Fayoumi, Weiqing Sun:
A Novel Key Exchange Protocol using Logic Algebra for the Factorization Problem. ICISSP 2022: 396-403 - Oleksandr A. Letychevskyi, Volodymyr Peschanenko, Serhii Horbatiuk:
Consensus protocol security analysis using an algebraic virtual machine. IntelITSIS 2022: 484-493 - Mohammad Anagreh, Peeter Laud:
A Parallel Privacy-Preserving Shortest Path Protocol from a Path Algebra Problem. CoRR abs/2207.07964 (2022) - Giorgio Sonnino, Alberto Sonnino:
Efficient Multiparty Protocols Using Generalized Parseval's Identity and the Theta Algebra. CoRR abs/2208.09852 (2022) - Matvei Kotov, Alexander Treier, Ivan Buchinskiy:
An attack on a key exchange protocol based on max-times and min-times algebras. IACR Cryptol. ePrint Arch. 2022: 1644 (2022) - 2021
- Zbigniew Lipinski:
Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra. Appl. Algebra Eng. Commun. Comput. 32(1): 81-96 (2021) - Benjamin Aziz:
A process algebraic mutation framework with application to a vehicle charging protocol. Veh. Commun. 30: 100352 (2021) - Muhammad Ziyad Almalik, Sepha Siswantyo:
Modified Dass-Om Protocol for Preventing Algebraic Replay Attacks. IWBIS 2021: 103-108 - A. S. Sitdikov, A. S. Nikitin:
Quantum protocols at presence of non-abelian superselection rules in the framework of algebraic model. CoRR abs/2104.05238 (2021) - 2020
- David Lucas:
Secure and efficient outsourced computation protocols for linear algebra. (Protocoles de calculs externalisés efficaces et sécurisés pour l'algèbre linéaire). Grenoble Alpes University, France, 2020 - Silvia Berenice Fajardo Flores, Jorge Rafael Gutierrez-Pulido, María Andrade-Aréchiga:
Keyboard-Based Protocol for Typing Algebraic Expressions. Interact. Comput. 32(1): 52-65 (2020) - 2019
- Matthew L. Daggitt:
An algebraic perspective on the convergence of vector-based routing protocols. University of Cambridge, UK, 2019 - Yehia Abd Alrahman, Hugo Torres Vieira:
A coordination protocol language for power grid operation control. J. Log. Algebraic Methods Program. 109 (2019) - Rui Wang, Lars Michael Kristensen, Hein Meling, Volker Stolz:
Automated test case generation for the Paxos single-decree protocol using a Coloured Petri Net model. J. Log. Algebraic Methods Program. 104: 254-273 (2019) - Rob van Glabbeek, Peter Höfner, Michael Markl:
A Process Algebra for Link Layer Protocols. ESOP 2019: 668-693
skipping 125 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-02-11 06:50 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint