Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ima/ima2003.bht:"
@inproceedings{DBLP:conf/ima/Al-RiyamiP03, author = {Sattam S. Al{-}Riyami and Kenneth G. Paterson}, editor = {Kenneth G. Paterson}, title = {Tripartite Authenticated Key Agreement Protocols from Pairings}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {332--359}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_27}, doi = {10.1007/978-3-540-40974-8\_27}, timestamp = {Wed, 18 Mar 2020 16:01:02 +0100}, biburl = {https://dblp.org/rec/conf/ima/Al-RiyamiP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/BarnettS03, author = {Adam Barnett and Nigel P. Smart}, editor = {Kenneth G. Paterson}, title = {Mental Poker Revisited}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {370--383}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_29}, doi = {10.1007/978-3-540-40974-8\_29}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/BarnettS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/BlackburnGGS03, author = {Simon R. Blackburn and Domingo G{\'{o}}mez{-}P{\'{e}}rez and Jaime Gutierrez and Igor E. Shparlinski}, editor = {Kenneth G. Paterson}, title = {Predicting the Inversive Generator}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {264--275}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_21}, doi = {10.1007/978-3-540-40974-8\_21}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ima/BlackburnGGS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/BorissovBNP03, author = {Yuri L. Borissov and An Braeken and Svetla Nikova and Bart Preneel}, editor = {Kenneth G. Paterson}, title = {On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {82--92}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_8}, doi = {10.1007/978-3-540-40974-8\_8}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/BorissovBNP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Dent03, author = {Alexander W. Dent}, editor = {Kenneth G. Paterson}, title = {A Designer's Guide to KEMs}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {133--151}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_12}, doi = {10.1007/978-3-540-40974-8\_12}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Dent03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/FagooneeH03, author = {Lina Fagoonee and Bahram Honary}, editor = {Kenneth G. Paterson}, title = {A Multifunctional Turbo-Based Receiver Using Partial Unit Memory Codes}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {24--34}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_3}, doi = {10.1007/978-3-540-40974-8\_3}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/FagooneeH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Farrell03, author = {Patrick Guy Farrell}, editor = {Kenneth G. Paterson}, title = {Recent Developments in Array Error-Control Codes: (Invited Paper)}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {1--3}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_1}, doi = {10.1007/978-3-540-40974-8\_1}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Farrell03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/GeisslerS03, author = {Katharina Gei{\ss}ler and Nigel P. Smart}, editor = {Kenneth G. Paterson}, title = {Computing the {M} = {U} U\({}^{\mbox{t}}\) Integer Matrix Decomposition}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {223--233}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_18}, doi = {10.1007/978-3-540-40974-8\_18}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/GeisslerS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Granger03, author = {Robert Granger}, editor = {Kenneth G. Paterson}, title = {Estimates for Discrete Logarithm Computations in Finite Fields of Small Characteristic}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {190--206}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_16}, doi = {10.1007/978-3-540-40974-8\_16}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Granger03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/HattoriHY03, author = {Mitsuhiro Hattori and Shoichi Hirose and Susumu Yoshida}, editor = {Kenneth G. Paterson}, title = {Analysis of Double Block Length Hash Functions}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {290--302}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_23}, doi = {10.1007/978-3-540-40974-8\_23}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/HattoriHY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/HoltD03, author = {Andrew J. Holt and James H. Davenport}, editor = {Kenneth G. Paterson}, title = {Resolving Large Prime(s) Variants for Discrete Logarithm Computation}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {207--222}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_17}, doi = {10.1007/978-3-540-40974-8\_17}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/HoltD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Horadam03, author = {Kathy J. Horadam}, editor = {Kenneth G. Paterson}, title = {Differential Uniformity for Arrays}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {115--124}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_10}, doi = {10.1007/978-3-540-40974-8\_10}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Horadam03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/IwataK03, author = {Tetsu Iwata and Kaoru Kurosawa}, editor = {Kenneth G. Paterson}, title = {On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {306--318}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_25}, doi = {10.1007/978-3-540-40974-8\_25}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/IwataK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Johansson03, author = {Thomas Johansson}, editor = {Kenneth G. Paterson}, title = {Analysis and Design of Modern Stream Ciphers: (Invited Paper) p}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {66}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_6}, doi = {10.1007/978-3-540-40974-8\_6}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Johansson03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/KiltzM03, author = {Eike Kiltz and John Malone{-}Lee}, editor = {Kenneth G. Paterson}, title = {A General Construction of {IND-CCA2} Secure Public Key Encryption}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {152--166}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_13}, doi = {10.1007/978-3-540-40974-8\_13}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/KiltzM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Mitchell03, author = {Chris J. Mitchell}, editor = {Kenneth G. Paterson}, title = {Remote User Authentication Using Public Information}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {360--369}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_28}, doi = {10.1007/978-3-540-40974-8\_28}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Mitchell03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/MollandMH03, author = {H{\aa}vard Molland and John Erik Mathiassen and Tor Helleseth}, editor = {Kenneth G. Paterson}, title = {Improved Fast Correlation Attack Using Low Rate Codes}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {67--81}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_7}, doi = {10.1007/978-3-540-40974-8\_7}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/MollandMH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/NiederreiterS03, author = {Harald Niederreiter and Igor E. Shparlinski}, editor = {Kenneth G. Paterson}, title = {Periodic Sequences with Maximal Linear Complexity and Almost Maximal k-Error Linear Complexity}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {183--189}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_15}, doi = {10.1007/978-3-540-40974-8\_15}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ima/NiederreiterS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Niemi03, author = {Valtteri Niemi}, editor = {Kenneth G. Paterson}, title = {Cryptography in Wireless Standards: (Invited Paper)}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {303--305}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_24}, doi = {10.1007/978-3-540-40974-8\_24}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Niemi03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Pasalic03, author = {Enes Pasalic}, editor = {Kenneth G. Paterson}, title = {Degree Optimized Resilient Boolean Functions from Maiorana-McFarland Class}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {93--114}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_9}, doi = {10.1007/978-3-540-40974-8\_9}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Pasalic03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Petrides03, author = {George Petrides}, editor = {Kenneth G. Paterson}, title = {Cryptanalysis of the Public Key Cryptosystem Based on the Word Problem on the Grigorchuk Groups}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {234--244}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_19}, doi = {10.1007/978-3-540-40974-8\_19}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Petrides03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Price03, author = {Geraint Price}, editor = {Kenneth G. Paterson}, title = {A General Attack Model on Hash-Based Client Puzzles}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {319--331}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_26}, doi = {10.1007/978-3-540-40974-8\_26}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Price03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/RosnesY03, author = {Eirik Rosnes and {\O}yvind Ytrehus}, editor = {Kenneth G. Paterson}, title = {High Rate Convolutional Codes with Optimal Cycle Weights}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {4--23}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_2}, doi = {10.1007/978-3-540-40974-8\_2}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/RosnesY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/SchaathunH03, author = {Hans Georg Schaathun and Tor Helleseth}, editor = {Kenneth G. Paterson}, title = {Separating and Intersecting Properties of {BCH} and Kasami Codes}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {52--65}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_5}, doi = {10.1007/978-3-540-40974-8\_5}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/SchaathunH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Schindler03, author = {Werner Schindler}, editor = {Kenneth G. Paterson}, title = {A Stochastical Model and Its Analysis for a Physical Random Number Generator Presented At {CHES} 2002}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {276--289}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_22}, doi = {10.1007/978-3-540-40974-8\_22}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Schindler03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/SchindlerW03, author = {Werner Schindler and Colin D. Walter}, editor = {Kenneth G. Paterson}, title = {More Detail for a Combined Timing and Power Attack against Implementations of {RSA}}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {245--263}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_20}, doi = {10.1007/978-3-540-40974-8\_20}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/SchindlerW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Walton03, author = {Richard Walton}, editor = {Kenneth G. Paterson}, title = {Uses and Abuses of Cryptography (Invited Paper)}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {125--132}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_11}, doi = {10.1007/978-3-540-40974-8\_11}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Walton03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/WinterNI03, author = {Andreas J. Winter and Anderson C. A. Nascimento and Hideki Imai}, editor = {Kenneth G. Paterson}, title = {Commitment Capacity of Discrete Memoryless Channels}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {35--51}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_4}, doi = {10.1007/978-3-540-40974-8\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ima/WinterNI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/YumL03, author = {Dae Hyun Yum and Pil Joong Lee}, editor = {Kenneth G. Paterson}, title = {Efficient Key Updating Signature Schemes Based on {IBS}}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {167--182}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_14}, doi = {10.1007/978-3-540-40974-8\_14}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/YumL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ima/2003, editor = {Kenneth G. Paterson}, title = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/b93924}, doi = {10.1007/B93924}, isbn = {3-540-20663-9}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.